메뉴 건너뛰기




Volumn 95, Issue 1, 2010, Pages 29-42

Defense and attack of complex and dependent systems

Author keywords

Attack; Complex infrastructures; Complex systems; Contest success function; Defense; Dependent systems; Game theory; Interdependent systems; Parallel system; Protection; Reliability theory; Series system; Terrorism

Indexed keywords

ATTACK; COMPLEX INFRASTRUCTURES; COMPLEX SYSTEMS; CONTEST SUCCESS FUNCTION; DEFENSE; DEPENDENT SYSTEMS; INTERDEPENDENT SYSTEMS; PARALLEL SYSTEM; PROTECTION; SERIES SYSTEM; TERRORISM;

EID: 70349451957     PISSN: 09518320     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ress.2009.07.006     Document Type: Article
Times cited : (64)

References (34)
  • 2
    • 33847259790 scopus 로고    scopus 로고
    • Subsidies in interdependent security with heterogeneous discount rates
    • Zhuang J., Bier V.M., and Gupta A. Subsidies in interdependent security with heterogeneous discount rates. Engineering Economist 52 1 (2007) 1-19
    • (2007) Engineering Economist , vol.52 , Issue.1 , pp. 1-19
    • Zhuang, J.1    Bier, V.M.2    Gupta, A.3
  • 3
    • 33751256271 scopus 로고    scopus 로고
    • Income, interdependence, and substitution effects affecting incentives for security investment
    • Hausken K. Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy 25 6 (2006) 629-665
    • (2006) Journal of Accounting and Public Policy , vol.25 , Issue.6 , pp. 629-665
    • Hausken, K.1
  • 4
    • 84906628863 scopus 로고    scopus 로고
    • What do we know about the substitution effect in transnational terrorism?
    • Silke A, Ilardi G, editors, UK: Frank Cass
    • Enders W, Sandler T. What do we know about the substitution effect in transnational terrorism? In: Silke A, Ilardi G, editors. Researching terrorism: trends, achievements, failures. Ilfords, UK: Frank Cass, 2003.
    • (2003) Researching terrorism: Trends, achievements, failures. Ilfords
    • Enders, W.1    Sandler, T.2
  • 6
    • 9444279581 scopus 로고    scopus 로고
    • Protection of simple series and parallel systems with components of different values
    • Bier V.M., Nagaraj A., and Abhichandani V. Protection of simple series and parallel systems with components of different values. Reliability Engineering and System Safety 87 (2005) 315-323
    • (2005) Reliability Engineering and System Safety , vol.87 , pp. 315-323
    • Bier, V.M.1    Nagaraj, A.2    Abhichandani, V.3
  • 7
    • 33947146473 scopus 로고    scopus 로고
    • Optimal resource allocation for security in reliability systems
    • Azaiez M.N., and Bier V.M. Optimal resource allocation for security in reliability systems. European Journal of Operational Research 181 (2007) 773-786
    • (2007) European Journal of Operational Research , vol.181 , pp. 773-786
    • Azaiez, M.N.1    Bier, V.M.2
  • 9
    • 84954529870 scopus 로고    scopus 로고
    • Game theory models of intelligent actors in reliability analysis: a state of the art review
    • Bier V.M., and Azaiez M.N. (Eds), Springer, New York
    • Guikema S.D. Game theory models of intelligent actors in reliability analysis: a state of the art review. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 13-31
    • (2009) Game theoretic risk analysis of security threats , pp. 13-31
    • Guikema, S.D.1
  • 10
    • 84954502885 scopus 로고    scopus 로고
    • Optimizing defense strategies for complex multi-state systems
    • Bier V.M., and Azaiez M.N. (Eds), Springer, New York
    • Levitin G. Optimizing defense strategies for complex multi-state systems. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 33-64
    • (2009) Game theoretic risk analysis of security threats , pp. 33-64
    • Levitin, G.1
  • 11
    • 84954516300 scopus 로고    scopus 로고
    • Defending against terrorism, natural disaster, and all hazards
    • Bier V.M., and Azaiez M.N. (Eds), Springer, New York
    • Hausken K., Bier V., and Zhuang J. Defending against terrorism, natural disaster, and all hazards. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 65-97
    • (2009) Game theoretic risk analysis of security threats , pp. 65-97
    • Hausken, K.1    Bier, V.2    Zhuang, J.3
  • 12
    • 84954501198 scopus 로고    scopus 로고
    • A Bayesian model for a game of information in optimal attack/defense strategies
    • Bier V.M., and Azaiez M.N. (Eds), Springer, New York
    • Azaiez M.N. A Bayesian model for a game of information in optimal attack/defense strategies. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 99-123
    • (2009) Game theoretic risk analysis of security threats , pp. 99-123
    • Azaiez, M.N.1
  • 13
    • 84954471197 scopus 로고    scopus 로고
    • Search for a malevolent needle in a Benign Haystack
    • Bier V.M., and Azaiez M.N. (Eds), Springer, New York
    • Gaver D.P., Glazebrook K.D., and Jacobs P.A. Search for a malevolent needle in a Benign Haystack. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 125-146
    • (2009) Game theoretic risk analysis of security threats , pp. 125-146
    • Gaver, D.P.1    Glazebrook, K.D.2    Jacobs, P.A.3
  • 14
    • 84954528259 scopus 로고    scopus 로고
    • Games and risk analysis: three examples of single and alternate moves
    • Bier V.M., and Azaiez M.N. (Eds), Springer, New York
    • Paté-Cornell M.E., Garber R., Guikema S., and Kucik P. Games and risk analysis: three examples of single and alternate moves. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 147-173
    • (2009) Game theoretic risk analysis of security threats , pp. 147-173
    • Paté-Cornell, M.E.1    Garber, R.2    Guikema, S.3    Kucik, P.4
  • 15
    • 84954565890 scopus 로고    scopus 로고
    • Making telecommunications networks resilient against terrorist attacks
    • Bier V.M., and Azaiez M.N. (Eds), Springer, New York
    • Cox T. Making telecommunications networks resilient against terrorist attacks. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 175-197
    • (2009) Game theoretic risk analysis of security threats , pp. 175-197
    • Cox, T.1
  • 16
    • 84954474479 scopus 로고    scopus 로고
    • Improving reliability through multi-path routing and link defence: an application of game theory to transport
    • Bier V.M., and Azaiez M.N. (Eds), Springer, New York
    • Kanturska U., Schmöcker J.D., Fonzone A., and Bell M.G.H. Improving reliability through multi-path routing and link defence: an application of game theory to transport. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 199-227
    • (2009) Game theoretic risk analysis of security threats , pp. 199-227
    • Kanturska, U.1    Schmöcker, J.D.2    Fonzone, A.3    Bell, M.G.H.4
  • 19
    • 0002782259 scopus 로고
    • Efficient rent-seeking
    • Buchanan J.M., Tollison R.D., and Tullock G. (Eds), Texas A&M University Press, College Station
    • Tullock G. Efficient rent-seeking. In: Buchanan J.M., Tollison R.D., and Tullock G. (Eds). Toward a theory of the rent-seeking society (1980), Texas A&M University Press, College Station 97-112
    • (1980) Toward a theory of the rent-seeking society , pp. 97-112
    • Tullock, G.1
  • 20
    • 5244284341 scopus 로고
    • Perfect aggregation for a class of general reliability models with Bayesian updating
    • Azaiez M.N., and Bier V.M. Perfect aggregation for a class of general reliability models with Bayesian updating. Applied Mathematics and Computation 73 (1995) 281-302
    • (1995) Applied Mathematics and Computation , vol.73 , pp. 281-302
    • Azaiez, M.N.1    Bier, V.M.2
  • 24
    • 33847386386 scopus 로고    scopus 로고
    • Identification of critical locations across multiple infrastructures for terrorist actions
    • Patterson S.A., and Apostolakis G.E. Identification of critical locations across multiple infrastructures for terrorist actions. Reliability Engineering and System Safety 92 9 (2007) 1183-1203
    • (2007) Reliability Engineering and System Safety , vol.92 , Issue.9 , pp. 1183-1203
    • Patterson, S.A.1    Apostolakis, G.E.2
  • 25
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
    • Zhuang J., and Bier V.M. Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Operations Research 55 5 (2007) 976-991
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 26
  • 27
    • 63149134856 scopus 로고    scopus 로고
    • Redundancy vs. protection vs. false targets for systems under attack
    • Levitin G., and Hausken K. Redundancy vs. protection vs. false targets for systems under attack. IEEE Transactions on Reliability 58 1 (2009) 58-68
    • (2009) IEEE Transactions on Reliability , vol.58 , Issue.1 , pp. 58-68
    • Levitin, G.1    Hausken, K.2
  • 28
    • 36049023055 scopus 로고    scopus 로고
    • Allocating defensive resources with private information about vulnerability
    • Powell R. Allocating defensive resources with private information about vulnerability. American Political Science Review 101 (2007) 799-809
    • (2007) American Political Science Review , vol.101 , pp. 799-809
    • Powell, R.1
  • 29
    • 63449108250 scopus 로고    scopus 로고
    • Games and terrorism: recent developments
    • Sandler T., and Siqueira K. Games and terrorism: recent developments. Simulation and Gaming 40 2 (2009) 164-192
    • (2009) Simulation and Gaming , vol.40 , Issue.2 , pp. 164-192
    • Sandler, T.1    Siqueira, K.2
  • 31
    • 70349457138 scopus 로고    scopus 로고
    • Harsanyi J. Games with incomplete information played by 'Bayesian players' I-III. Management Science 1967/1968; 14:159-83, 320-34, 486-501.
    • Harsanyi J. Games with incomplete information played by 'Bayesian players' I-III. Management Science 1967/1968; 14:159-83, 320-34, 486-501.
  • 32
    • 0030304298 scopus 로고    scopus 로고
    • Contest success functions
    • Skaperdas S. Contest success functions. Economic Theory 7 (1996) 283-290
    • (1996) Economic Theory , vol.7 , pp. 283-290
    • Skaperdas, S.1
  • 34
    • 33751078297 scopus 로고    scopus 로고
    • Methodology for ranking the elements of water-supply networks
    • Michaud D., and Apostolakis G. Methodology for ranking the elements of water-supply networks. Journal of infrastructure systems 12 4 (2006) 230-242
    • (2006) Journal of infrastructure systems , vol.12 , Issue.4 , pp. 230-242
    • Michaud, D.1    Apostolakis, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.