메뉴 건너뛰기




Volumn 31, Issue 4, 2011, Pages 533-547

Modeling Arbitrary Layers of Continuous-Level Defenses in Facing with Strategic Attackers

Author keywords

Defender optimization; Game theory; Homeland security; Resource allocation

Indexed keywords

ARBITRARY LAYERS; DEFENDER OPTIMIZATION; DEFENSE ALLOCATION; FUNCTIONAL SIMILARITY; GAME-THEORETIC MODEL; GEOGRAPHICAL PROXIMITY; HOMELAND SECURITY; NUMERICAL EXAMPLE; OPTIMAL ASSIGNMENT; UNIT COST;

EID: 79952695711     PISSN: 02724332     EISSN: 15396924     Source Type: Journal    
DOI: 10.1111/j.1539-6924.2010.01531.x     Document Type: Article
Times cited : (59)

References (21)
  • 1
    • 33947146473 scopus 로고    scopus 로고
    • Optimal resource allocation for security in reliability systems
    • Azaiez N, Bier VM. Optimal resource allocation for security in reliability systems. European Journal of Operational Research, 2007; 181(2):773-786.
    • (2007) European Journal of Operational Research , vol.181 , Issue.2 , pp. 773-786
    • Azaiez, N.1    Bier, V.M.2
  • 2
    • 70349444011 scopus 로고    scopus 로고
    • Defending against terrorism, natural disaster, and all hazards
    • in Bier VM, Azaiez N (eds). New York Springer
    • Hausken K, Bier VM, Zhuang J. Defending against terrorism, natural disaster, and all hazards. Pp. 65-97 in Bier VM, Azaiez N (eds). Combining Reliability and Game Theory. New York Springer, 2008.
    • (2008) Combining Reliability and Game Theory , pp. 65-97
    • Hausken, K.1    Bier, V.M.2    Zhuang, J.3
  • 3
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters-Defensive strategy with endogenous attack effort
    • Zhuang J, Bier VM. Balancing terrorism and natural disasters-Defensive strategy with endogenous attack effort. Operations Research, 2007; 55(5):976-991.
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 4
    • 34547479862 scopus 로고    scopus 로고
    • Defending against terrorist attacks with limited resources
    • Powell R. Defending against terrorist attacks with limited resources. American Political Science Review, 2007; 101(3):527-541.
    • (2007) American Political Science Review , vol.101 , Issue.3 , pp. 527-541
    • Powell, R.1
  • 5
    • 50849106725 scopus 로고    scopus 로고
    • Nature plays with dice-Terrorists do not: Allocating resources to counter strategic and probabilistic risks
    • Golany B, Kaplan EH, Marmur A, Rothblum UG. Nature plays with dice-Terrorists do not: Allocating resources to counter strategic and probabilistic risks. European Journal of Operational Research, 2009; 192(1):198-208.
    • (2009) European Journal of Operational Research , vol.192 , Issue.1 , pp. 198-208
    • Golany, B.1    Kaplan, E.H.2    Marmur, A.3    Rothblum, U.G.4
  • 6
    • 79251511489 scopus 로고    scopus 로고
    • Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation
    • Zhuang J, Bier VM. Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation. Defence and Peace Economics, doi:.
    • Defence and Peace Economics
    • Zhuang, J.1    Bier, V.M.2
  • 7
    • 70350704685 scopus 로고    scopus 로고
    • Modeling secrecy and deception in a multiple-period attacker-defender signaling game
    • Zhuang J, Bier VM, Alagoz O. Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 2010; 203(2):409-418.
    • (2010) European Journal of Operational Research , vol.203 , Issue.2 , pp. 409-418
    • Zhuang, J.1    Bier, V.M.2    Alagoz, O.3
  • 8
    • 77955901755 scopus 로고    scopus 로고
    • Resource distribution in multiple attacks against a single target
    • Levitin G, Hausken K. Resource distribution in multiple attacks against a single target. Risk Analysis, 2010; 30(8):1231-1239.
    • (2010) Risk Analysis , vol.30 , Issue.8 , pp. 1231-1239
    • Levitin, G.1    Hausken, K.2
  • 9
    • 0038520175 scopus 로고    scopus 로고
    • Optimal multilevel protection in series parallel systems
    • Levitin G. Optimal multilevel protection in series parallel systems. Reliability Engineering & System Safety, 2003; 81(1):93-102.
    • (2003) Reliability Engineering & System Safety , vol.81 , Issue.1 , pp. 93-102
    • Levitin, G.1
  • 10
  • 11
    • 43249094557 scopus 로고    scopus 로고
    • Protection vs. redundancy in homogeneous parallel systems
    • Levitin G, Hausken K. Protection vs. redundancy in homogeneous parallel systems. Reliability Engineering & System Safety, 2008; 93(10):1444-1451.
    • (2008) Reliability Engineering & System Safety , vol.93 , Issue.10 , pp. 1444-1451
    • Levitin, G.1    Hausken, K.2
  • 13
    • 67749101934 scopus 로고    scopus 로고
    • A large-scale linear programming model for finding optimal container inspection strategies
    • Boros E, Fedzhora L, Kantor P, Saeger K, Stroud P. A large-scale linear programming model for finding optimal container inspection strategies. Naval Research Logistics, 2009; 56(5):404-420.
    • (2009) Naval Research Logistics , vol.56 , Issue.5 , pp. 404-420
    • Boros, E.1    Fedzhora, L.2    Kantor, P.3    Saeger, K.4    Stroud, P.5
  • 14
    • 79952694232 scopus 로고    scopus 로고
    • Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks
    • Bier VM, Haphuriwat N. Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks. Annals of Operations Research, doi:.
    • Annals of Operations Research
    • Bier, V.M.1    Haphuriwat, N.2
  • 15
  • 16
    • 3543125926 scopus 로고    scopus 로고
    • The investment problem in terrorism
    • Konrad KA. The investment problem in terrorism. Economica, 2004; 71(283):449-459.
    • (2004) Economica , vol.71 , Issue.283 , pp. 449-459
    • Konrad, K.A.1
  • 17
    • 45349092442 scopus 로고    scopus 로고
    • Optimal resource allocation for defense of targets based on differing measures of attractiveness
    • Bier VM, Haphuriwat N, Menoyo J, Zimmerman R, Culpen AM. Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis, 2008; 28(3):763-770.
    • (2008) Risk Analysis , vol.28 , Issue.3 , pp. 763-770
    • Bier, V.M.1    Haphuriwat, N.2    Menoyo, J.3    Zimmerman, R.4    Culpen, A.M.5
  • 19
    • 64549092443 scopus 로고    scopus 로고
    • Secrecy in defensive allocation as strategy for achieving more cost-effective attacker deterrence
    • Dighe NS, Zhuang J, Bier VM. Secrecy in defensive allocation as strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering, 2009; 5(1):31-43.
    • (2009) International Journal of Performability Engineering , vol.5 , Issue.1 , pp. 31-43
    • Dighe, N.S.1    Zhuang, J.2    Bier, V.M.3
  • 20
    • 77953177089 scopus 로고    scopus 로고
    • Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-player game with errors
    • Zhuang J. Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-player game with errors. Engineering Economist, 2010; 55(2):131-149.
    • (2010) Engineering Economist , vol.55 , Issue.2 , pp. 131-149
    • Zhuang, J.1
  • 21
    • 0030304298 scopus 로고    scopus 로고
    • Contest success functions
    • Skaperdas S. Contest success functions. Economic Theory, 1996; 7(2):283-290.
    • (1996) Economic Theory , vol.7 , Issue.2 , pp. 283-290
    • Skaperdas, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.