메뉴 건너뛰기




Volumn 94, Issue 12, 2009, Pages 1927-1941

Intelligence and impact contests in systems with redundancy, false targets, and partial protection

Author keywords

Attack; Damage; Defense; Elements; False targets; Intelligence; Optimization; Protection; Redundancy; Survivability; System demand

Indexed keywords

ATTACK; DAMAGE; DEFENSE; ELEMENTS; FALSE TARGETS; INTELLIGENCE; PROTECTION; SURVIVABILITY; SYSTEM DEMAND;

EID: 69249212146     PISSN: 09518320     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ress.2009.06.010     Document Type: Article
Times cited : (33)

References (32)
  • 2
    • 22544461899 scopus 로고    scopus 로고
    • Production and conflict models versus rent seeking models
    • Hausken K. Production and conflict models versus rent seeking models. Public Choice 123 (2005) 59-93
    • (2005) Public Choice , vol.123 , pp. 59-93
    • Hausken, K.1
  • 3
    • 24144493745 scopus 로고    scopus 로고
    • Collective versus unilateral response to terrorism
    • Sandler T. Collective versus unilateral response to terrorism. Public Choice 124 (2005) 75-93
    • (2005) Public Choice , vol.124 , pp. 75-93
    • Sandler, T.1
  • 4
    • 52449126619 scopus 로고    scopus 로고
    • Efficiency of even separation of parallel elements with variable contest intensity
    • Hausken K., and Levitin G. Efficiency of even separation of parallel elements with variable contest intensity. Risk Analysis 28 5 (2008) 1477-1486
    • (2008) Risk Analysis , vol.28 , Issue.5 , pp. 1477-1486
    • Hausken, K.1    Levitin, G.2
  • 5
    • 33947146473 scopus 로고    scopus 로고
    • Optimal resource allocation for security in reliability systems
    • Azaiez N., and Bier V.M. Optimal resource allocation for security in reliability systems. European Journal of Operational Research 181 (2007) 773-786
    • (2007) European Journal of Operational Research , vol.181 , pp. 773-786
    • Azaiez, N.1    Bier, V.M.2
  • 6
    • 9444279581 scopus 로고    scopus 로고
    • Protection of simple series and parallel systems with components of different values
    • Bier V.M., Nagaraj A., and Abhichandani V. Protection of simple series and parallel systems with components of different values. Reliability Engineering and System Safety 87 (2005) 315-323
    • (2005) Reliability Engineering and System Safety , vol.87 , pp. 315-323
    • Bier, V.M.1    Nagaraj, A.2    Abhichandani, V.3
  • 7
    • 69249236917 scopus 로고    scopus 로고
    • Bier VM, Abhichandani V. Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries. In: Proceedings of the engineering foundation conference on risk-based decision making in water resources X. Santa Barbara, CA: American Society of Civil Engineers; 2002.
    • Bier VM, Abhichandani V. Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries. In: Proceedings of the engineering foundation conference on risk-based decision making in water resources X. Santa Barbara, CA: American Society of Civil Engineers; 2002.
  • 8
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: strategic defense allocation against an unknown attacker
    • Bier V.M., Oliveros S., and Samuelson L. Choosing what to protect: strategic defense allocation against an unknown attacker. Journal of Public Economic Theory 9 4 (2006) 563-587
    • (2006) Journal of Public Economic Theory , vol.9 , Issue.4 , pp. 563-587
    • Bier, V.M.1    Oliveros, S.2    Samuelson, L.3
  • 12
    • 35348950536 scopus 로고    scopus 로고
    • Strategic defense and attack for series and parallel reliability systems
    • Hausken K. Strategic defense and attack for series and parallel reliability systems. European Journal of Operational Research 186 2 (2008) 856-881
    • (2008) European Journal of Operational Research , vol.186 , Issue.2 , pp. 856-881
    • Hausken, K.1
  • 14
    • 5244284341 scopus 로고
    • Perfect aggregation for a class of general reliability models with Bayesian updating
    • Bier V.M. Perfect aggregation for a class of general reliability models with Bayesian updating. Applied Mathematics and Computation 73 (1995) 281-302
    • (1995) Applied Mathematics and Computation , vol.73 , pp. 281-302
    • Bier, V.M.1
  • 15
    • 0033177990 scopus 로고    scopus 로고
    • Challenges to the acceptance of probabilistic risk analysis
    • Bier V.M. Challenges to the acceptance of probabilistic risk analysis. Risk Analysis 19 (1999) 703-710
    • (1999) Risk Analysis , vol.19 , pp. 703-710
    • Bier, V.M.1
  • 16
    • 0035254919 scopus 로고    scopus 로고
    • On the state of the art: risk communication to the public
    • Bier V.M. On the state of the art: risk communication to the public. Reliability Engineering and System Safety 71 (2001) 139-150
    • (2001) Reliability Engineering and System Safety , vol.71 , pp. 139-150
    • Bier, V.M.1
  • 18
    • 34547425437 scopus 로고    scopus 로고
    • Applying analytical methods to study terrorism
    • Sandler T., and Enders W. Applying analytical methods to study terrorism. International Studies Perspectives 8 3 (2007) 287-302
    • (2007) International Studies Perspectives , vol.8 , Issue.3 , pp. 287-302
    • Sandler, T.1    Enders, W.2
  • 20
    • 33750462334 scopus 로고    scopus 로고
    • Global terrorism: deterrence versus pre-emption
    • Sandler T., and Siqueira K. Global terrorism: deterrence versus pre-emption. Canadian Journal of Economics 39 4 (2006) 1370-1387
    • (2006) Canadian Journal of Economics , vol.39 , Issue.4 , pp. 1370-1387
    • Sandler, T.1    Siqueira, K.2
  • 21
    • 54049127070 scopus 로고    scopus 로고
    • Terrorist backlash, terrorism mitigation, and policy delegation
    • Siqueira K., and Sandler T. Terrorist backlash, terrorism mitigation, and policy delegation. Journal of Public Economics 91 9 (2007) 1800-1815
    • (2007) Journal of Public Economics , vol.91 , Issue.9 , pp. 1800-1815
    • Siqueira, K.1    Sandler, T.2
  • 22
    • 36049023055 scopus 로고    scopus 로고
    • Allocating defensive resources with private information about vulnerability
    • Powell R. Allocating defensive resources with private information about vulnerability. American Political Science Review 101 (2007) 799-809
    • (2007) American Political Science Review , vol.101 , pp. 799-809
    • Powell, R.1
  • 23
    • 34547479862 scopus 로고    scopus 로고
    • Defending against terrorist attacks with limited resources
    • Powell R. Defending against terrorist attacks with limited resources. American Political Science Review 101 (2007) 527-541
    • (2007) American Political Science Review , vol.101 , pp. 527-541
    • Powell, R.1
  • 24
    • 69249233564 scopus 로고    scopus 로고
    • Powell R. Allocating defensive resources prior to attack. Paper presented at the annual meeting of the ISA's 49th annual convention, Bridging Multiple Divides, Hilton San Francisco, San Francisco, CA, 〈http://www.allacademic.com/meta/p250775_index.html〉, 2007.
    • Powell R. Allocating defensive resources prior to attack. Paper presented at the annual meeting of the ISA's 49th annual convention, Bridging Multiple Divides, Hilton San Francisco, San Francisco, CA, 〈http://www.allacademic.com/meta/p250775_index.html〉, 2007.
  • 25
    • 43249094557 scopus 로고    scopus 로고
    • Protection vs. redundancy in homogeneous parallel systems
    • Levitin G., and Hausken K. Protection vs. redundancy in homogeneous parallel systems. Reliability Engineering & System Safety 93 10 (2008) 1444-1451
    • (2008) Reliability Engineering & System Safety , vol.93 , Issue.10 , pp. 1444-1451
    • Levitin, G.1    Hausken, K.2
  • 27
    • 63149134856 scopus 로고    scopus 로고
    • Redundancy vs. protection vs. false targets for systems under attack
    • Levitin G., and Hausken K. Redundancy vs. protection vs. false targets for systems under attack. IEEE Transactions on Reliability 58 1 (2009) 58-68
    • (2009) IEEE Transactions on Reliability , vol.58 , Issue.1 , pp. 58-68
    • Levitin, G.1    Hausken, K.2
  • 28
    • 69249227452 scopus 로고    scopus 로고
    • Intelligence and impact contests in systems with fake targets
    • Levitin G., and Hausken K. Intelligence and impact contests in systems with fake targets. Defense and Security Analysis 25 2 (2009) 157-173
    • (2009) Defense and Security Analysis , vol.25 , Issue.2 , pp. 157-173
    • Levitin, G.1    Hausken, K.2
  • 29
    • 54049128831 scopus 로고    scopus 로고
    • Minmax defense strategy for complex multi-state systems
    • Hausken K., and Levitin G. Minmax defense strategy for complex multi-state systems. Reliability Engineering & System Safety 94 2 (2009) 577-587
    • (2009) Reliability Engineering & System Safety , vol.94 , Issue.2 , pp. 577-587
    • Hausken, K.1    Levitin, G.2
  • 30
    • 0002782259 scopus 로고
    • Efficient rent-seeking
    • Buchanan J.M., Tollison R.D., and Tullock G. (Eds), M. University Press, College Station
    • Tullock G. Efficient rent-seeking. In: Buchanan J.M., Tollison R.D., and Tullock G. (Eds). Toward a theory of the rent-seeking society, Texas A (1980), M. University Press, College Station 97-112
    • (1980) Toward a theory of the rent-seeking society, Texas A , pp. 97-112
    • Tullock, G.1
  • 31
    • 0030304298 scopus 로고    scopus 로고
    • Contest success functions
    • Skaperdas S. Contest success functions. Economic Theory 7 (1996) 283-290
    • (1996) Economic Theory , vol.7 , pp. 283-290
    • Skaperdas, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.