메뉴 건너뛰기




Volumn 3, Issue 1, 2010, Pages 16-26

Critical infrastructure protection under imperfect attacker perception

Author keywords

Game theory; Perception; Protection; Terrorism; Uncertainty

Indexed keywords

BASELINE MODELS; COMPLETE INFORMATION; COMPLEX SYSTEMS; CRITICAL INFRASTRUCTURE PROTECTION; CRITICAL INFRASTRUCTURE SYSTEMS; GEOGRAPHICAL SEPARATION; MODELING FRAMEWORKS; OBSERVATION ERRORS; OPTIMAL RESOURCE ALLOCATION; PERCEPTION;

EID: 77950923705     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2009.10.002     Document Type: Article
Times cited : (47)

References (24)
  • 1
    • 77950919587 scopus 로고    scopus 로고
    • Risk analysis
    • Grimwall G., Holmgren Å.J., Jacobsson P., and Thedéen T. (Eds), Springer-Verlag, London, United Kingdom
    • Holmgren Å.J., and Thedéen T. Risk analysis. In: Grimwall G., Holmgren Å.J., Jacobsson P., and Thedéen T. (Eds). Risks in Technological Systems (2009), Springer-Verlag, London, United Kingdom
    • (2009) Risks in Technological Systems
    • Holmgren, Å.J.1    Thedéen, T.2
  • 3
    • 0003669844 scopus 로고    scopus 로고
    • Government Accountability Office, Washington DC, USA
    • Government Accountability Office, Risk management, Washington DC, USA, 2005
    • (2005) Risk management
  • 4
    • 34547479862 scopus 로고    scopus 로고
    • Defending against terrorist attacks with limited resources
    • Powell R. Defending against terrorist attacks with limited resources. American Political Science Review 101 3 (2007) 527-541
    • (2007) American Political Science Review , vol.101 , Issue.3 , pp. 527-541
    • Powell, R.1
  • 5
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defensive allocation against an unknown attacker
    • Bier V., Oliveros S., and Samuelson L. Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory 9 4 (2007) 563-587
    • (2007) Journal of Public Economic Theory , vol.9 , Issue.4 , pp. 563-587
    • Bier, V.1    Oliveros, S.2    Samuelson, L.3
  • 6
    • 0000308219 scopus 로고
    • The calculus of dissent: An analysis of terrorists' choice of targets
    • Sandler T., and Lapan H.E. The calculus of dissent: An analysis of terrorists' choice of targets. Synthese 76 (1988) 245-261
    • (1988) Synthese , vol.76 , pp. 245-261
    • Sandler, T.1    Lapan, H.E.2
  • 7
    • 0002173212 scopus 로고
    • An economic study of US aircraft highjacking, 1961-1975
    • Landes W.M. An economic study of US aircraft highjacking, 1961-1975. Journal of Law and Economics 21 1 (1978) 1-31
    • (1978) Journal of Law and Economics , vol.21 , Issue.1 , pp. 1-31
    • Landes, W.M.1
  • 9
    • 33947208987 scopus 로고    scopus 로고
    • Protecting critical assets: The r-interdiction median problem with fortification
    • Church R.L., and Scaparra M.P. Protecting critical assets: The r-interdiction median problem with fortification. Geographical Analysis 39 (2007) 129-146
    • (2007) Geographical Analysis , vol.39 , pp. 129-146
    • Church, R.L.1    Scaparra, M.P.2
  • 10
    • 34547421469 scopus 로고    scopus 로고
    • Manuscript, Department of Political Science, University of California, Berkeley, CA, USA
    • R. Powell, Defending against strategic terrorists over the long run, Manuscript, Department of Political Science, University of California, Berkeley, CA, USA, 2006
    • (2006) Defending against strategic terrorists over the long run
    • Powell, R.1
  • 11
    • 33947365606 scopus 로고    scopus 로고
    • Evaluating strategies for defending electric power networks against antagonistic attacks
    • Holmgren Å.J., Jenelius E., and Westin J. Evaluating strategies for defending electric power networks against antagonistic attacks. IEEE Transactions on Power Systems 22 1 (2007) 76-84
    • (2007) IEEE Transactions on Power Systems , vol.22 , Issue.1 , pp. 76-84
    • Holmgren, Å.J.1    Jenelius, E.2    Westin, J.3
  • 12
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters - Defensive strategy with endogenous attacker effort
    • Zhuang J., and Bier V.M. Balancing terrorism and natural disasters - Defensive strategy with endogenous attacker effort. Operations Research 55 5 (2007) 976-991
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 13
    • 85015694054 scopus 로고    scopus 로고
    • A general defender-attacker risk model for networks
    • Al Mannai W.I., and Lewis T.G. A general defender-attacker risk model for networks. Journal of Risk Finance 9 3 (2008) 244-261
    • (2008) Journal of Risk Finance , vol.9 , Issue.3 , pp. 244-261
    • Al Mannai, W.I.1    Lewis, T.G.2
  • 15
    • 33745577728 scopus 로고    scopus 로고
    • Defense R&D in the anti-terrorist era
    • Trajtenberg M. Defense R&D in the anti-terrorist era. Defense and Peace Economics 17 3 (2006) 177-199
    • (2006) Defense and Peace Economics , vol.17 , Issue.3 , pp. 177-199
    • Trajtenberg, M.1
  • 16
    • 23244450105 scopus 로고    scopus 로고
    • Insurance, self-protection, and the economics of terrorism
    • Lakdawalla D., and Zanjani G. Insurance, self-protection, and the economics of terrorism. Journal of Public Economics 89 (2005) 1891-1905
    • (2005) Journal of Public Economics , vol.89 , pp. 1891-1905
    • Lakdawalla, D.1    Zanjani, G.2
  • 17
    • 33751256271 scopus 로고    scopus 로고
    • Income, interdependence, and substitution effects affecting incentives for security investments
    • Hausken K. Income, interdependence, and substitution effects affecting incentives for security investments. Journal of Accounting and Public Policy 25 (2006) 629-665
    • (2006) Journal of Accounting and Public Policy , vol.25 , pp. 629-665
    • Hausken, K.1
  • 20
    • 36049023055 scopus 로고    scopus 로고
    • Allocating defensive resources with private information about vulnerability
    • Powell R. Allocating defensive resources with private information about vulnerability. American Political Science Review 101 4 (2007) 799-809
    • (2007) American Political Science Review , vol.101 , Issue.4 , pp. 799-809
    • Powell, R.1
  • 21
    • 37849030145 scopus 로고    scopus 로고
    • Predicting target selection by terrorists: A network analysis of the 2005 London underground attacks
    • Jordán F. Predicting target selection by terrorists: A network analysis of the 2005 London underground attacks. International Journal of Critical Infrastructures 4 1-2 (2008) 206-214
    • (2008) International Journal of Critical Infrastructures , vol.4 , Issue.1-2 , pp. 206-214
    • Jordán, F.1
  • 22
    • 9444279581 scopus 로고    scopus 로고
    • Protection of simple series and parallel systems with components of different values
    • Bier V.M., Nagaraj A., and Abhichandani V. Protection of simple series and parallel systems with components of different values. Reliability Engineering & System Safety 87 3 (2005) 315-323
    • (2005) Reliability Engineering & System Safety , vol.87 , Issue.3 , pp. 315-323
    • Bier, V.M.1    Nagaraj, A.2    Abhichandani, V.3
  • 23
    • 0004458531 scopus 로고    scopus 로고
    • Optimizing multinomial logit profit functions
    • Hanson W., and Martin K. Optimizing multinomial logit profit functions. Management Science 42 7 (1996) 992-1003
    • (1996) Management Science , vol.42 , Issue.7 , pp. 992-1003
    • Hanson, W.1    Martin, K.2
  • 24
    • 0041589854 scopus 로고    scopus 로고
    • How to fight terrorism: Alternatives to deterrence
    • Frey B.S., and Luechinger S. How to fight terrorism: Alternatives to deterrence. Defense and Peace Economics 14 4 (2003) 237-249
    • (2003) Defense and Peace Economics , vol.14 , Issue.4 , pp. 237-249
    • Frey, B.S.1    Luechinger, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.