메뉴 건너뛰기




Volumn 32, Issue 5, 2012, Pages 930-943

Robust Allocation of a Defensive Budget Considering an Attacker's Private Information

Author keywords

Defender attacker game; Defense resource allocation; Private information; Robust optimization

Indexed keywords

CRITICAL ATTRIBUTES; DEFENDER-ATTACKER GAME; DISTRIBUTION-FREE; HOME LAND SECURITY; KEY FEATURE; MODELING UNCERTAINTIES; PRIVATE INFORMATION; RESOURCE ALLOCATION DECISION; RESOURCE ALLOCATION STRATEGIES; ROBUST DECISIONS; ROBUST OPTIMIZATION;

EID: 84860431639     PISSN: 02724332     EISSN: 15396924     Source Type: Journal    
DOI: 10.1111/j.1539-6924.2011.01702.x     Document Type: Article
Times cited : (84)

References (45)
  • 1
    • 0005001185 scopus 로고    scopus 로고
    • Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures
    • Paté-Cornell E, Guikema S. Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures. Military Operations Research, 2002; 7(4):5-23.
    • (2002) Military Operations Research , vol.7 , Issue.4 , pp. 5-23
    • Paté-Cornell, E.1    Guikema, S.2
  • 2
    • 4544332530 scopus 로고    scopus 로고
    • Mathematical methods in combatting terrorism
    • Harris B. Mathematical methods in combatting terrorism. Risk Analysis, 2004; 24(4):985-988.
    • (2004) Risk Analysis , vol.24 , Issue.4 , pp. 985-988
    • Harris, B.1
  • 3
    • 78651314211 scopus 로고    scopus 로고
    • A decision tree model for evaluating countermeasures to secure cargo at United States southwestern ports of entry
    • Bakir NO. A decision tree model for evaluating countermeasures to secure cargo at United States southwestern ports of entry. Decision Analysis, 2008; 5(4):230-248.
    • (2008) Decision Analysis , vol.5 , Issue.4 , pp. 230-248
    • Bakir, N.O.1
  • 6
    • 73649115679 scopus 로고    scopus 로고
    • Intelligent adversary risk analysis: A bioterrorism risk management model
    • Parnell GS, Smith CM, Moxley FI. Intelligent adversary risk analysis: A bioterrorism risk management model. Risk Analysis, 2010; 30(1):32-48.
    • (2010) Risk Analysis , vol.30 , Issue.1 , pp. 32-48
    • Parnell, G.S.1    Smith, C.M.2    Moxley, F.I.3
  • 7
    • 80053384354 scopus 로고    scopus 로고
    • A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management
    • Available at:
    • Merrick J, Parnell GS. A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management. Risk Analysis, 2011. Available at:
    • (2011) Risk Analysis
    • Merrick, J.1    Parnell, G.S.2
  • 8
    • 68149115896 scopus 로고    scopus 로고
    • Game theory and risk analysis
    • Cox LAT. Jr. Game theory and risk analysis. Risk Analysis, 2009; 29(8):1062-1068.
    • (2009) Risk Analysis , vol.29 , Issue.8 , pp. 1062-1068
    • Cox Jr., L.A.T.1
  • 9
    • 68149145410 scopus 로고    scopus 로고
    • The elephant in the room is called game theory
    • Hall JR Jr. The elephant in the room is called game theory. Risk Analysis, 2009; 29(8):1061-1061.
    • (2009) Risk Analysis , vol.29 , Issue.8 , pp. 1061-1061
    • Hall Jr., J.R.1
  • 10
    • 0036202354 scopus 로고    scopus 로고
    • Probabilistic risk analysis and game theory
    • Hausken K. Probabilistic risk analysis and game theory. Risk Analysis, 2002; 22(1):17-27.
    • (2002) Risk Analysis , vol.22 , Issue.1 , pp. 17-27
    • Hausken, K.1
  • 11
    • 77955901755 scopus 로고    scopus 로고
    • Resource distribution in multiple attacks against a single target
    • Levitin G, Hausken K. Resource distribution in multiple attacks against a single target. Risk Analysis, 2010; 30(8):1231-1239.
    • (2010) Risk Analysis , vol.30 , Issue.8 , pp. 1231-1239
    • Levitin, G.1    Hausken, K.2
  • 12
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defensive allocation against an unknown attacker
    • Bier V, Oliveros S, Samuelson L. Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 2007; 9(4):563-587.
    • (2007) Journal of Public Economic Theory , vol.9 , Issue.4 , pp. 563-587
    • Bier, V.1    Oliveros, S.2    Samuelson, L.3
  • 13
    • 45349092442 scopus 로고    scopus 로고
    • Optimal resource allocation for defense of targets based on differing measures of attractiveness
    • Bier VM, Haphuriwat N, Menoyo J, Zimmerman R, Culpen AM. Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis, 2008; 28(3):763-770.
    • (2008) Risk Analysis , vol.28 , Issue.3 , pp. 763-770
    • Bier, V.M.1    Haphuriwat, N.2    Menoyo, J.3    Zimmerman, R.4    Culpen, A.M.5
  • 14
    • 84860484620 scopus 로고    scopus 로고
    • Estimating Terrorism Risk [Internet], Available at: Accessed September 20, 2011.
    • Willis HH, Morral AR, Kelly TK, Medby JJ. Estimating Terrorism Risk [Internet], 2005. Available at: Accessed September 20, 2011.
    • (2005)
    • Willis, H.H.1    Morral, A.R.2    Kelly, T.K.3    Medby, J.J.4
  • 15
    • 79954506568 scopus 로고    scopus 로고
    • Robustness of optimal defensive resource allocations in the face of less fully rational attacker
    • Proc. 2009 Indust. Engrg. Res. Conf., IIE, Norcross, GA, 2009.
    • Hao M, Jin S, Zhuang J. Robustness of optimal defensive resource allocations in the face of less fully rational attacker. Pp. 886-891 in: Proc. 2009 Indust. Engrg. Res. Conf., IIE, Norcross, GA, 2009.
    • Hao, M.1    Jin, S.2    Zhuang, J.3
  • 16
    • 33749589535 scopus 로고    scopus 로고
    • Advanced techniques for modeling terrorism risk
    • Major JA. Advanced techniques for modeling terrorism risk. Journal of Risk Finance, 2002; 4(1):15-24.
    • (2002) Journal of Risk Finance , vol.4 , Issue.1 , pp. 15-24
    • Major, J.A.1
  • 17
    • 84860483842 scopus 로고    scopus 로고
    • Are Terrorism Risks Really Uninsurable? National Underwriter Property: Casualty-Risk & Benefits Management
    • Mooney SF. Are Terrorism Risks Really Uninsurable? National Underwriter Property: Casualty-Risk & Benefits Management, 2001.
    • (2001)
    • Mooney, S.F.1
  • 18
    • 34547479862 scopus 로고    scopus 로고
    • Defending against terrorist attacks with limited resources
    • Powell R. Defending against terrorist attacks with limited resources. American Political Science Review, 2007; 101(03):527-541.
    • (2007) American Political Science Review , vol.101 , Issue.3 , pp. 527-541
    • Powell, R.1
  • 19
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters defensive strategy with endogenous attacker effort
    • Zhuang J, Bier VM. Balancing terrorism and natural disasters defensive strategy with endogenous attacker effort. Operations Research, 2007; 55(5):976-991.
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 20
    • 50849106725 scopus 로고    scopus 로고
    • Nature plays with dice-Terrorists do not: Allocating resources to counter strategic versus probabilistic risks
    • Golany B, Kaplan EH, Marmur A, Rothblum UG. Nature plays with dice-Terrorists do not: Allocating resources to counter strategic versus probabilistic risks. European Journal of Operational Research, 2009; 192(1):198-208.
    • (2009) European Journal of Operational Research , vol.192 , Issue.1 , pp. 198-208
    • Golany, B.1    Kaplan, E.H.2    Marmur, A.3    Rothblum, U.G.4
  • 21
    • 77957969748 scopus 로고    scopus 로고
    • Redundancy vs. protection in defending parallel systems against unintentional and intentional impacts
    • Levitin G, Hausken K. Redundancy vs. protection in defending parallel systems against unintentional and intentional impacts. Reliability, IEEE Transactions on, 2009; 58(4):679-690.
    • (2009) Reliability, IEEE Transactions on , vol.58 , Issue.4 , pp. 679-690
    • Levitin, G.1    Hausken, K.2
  • 23
    • 70350704685 scopus 로고    scopus 로고
    • Modeling secrecy and deception in a multiple-period attacker-defender signaling game
    • Zhuang J, Bier VM, Alagoz O. Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 2010; 203(2):409-418.
    • (2010) European Journal of Operational Research , vol.203 , Issue.2 , pp. 409-418
    • Zhuang, J.1    Bier, V.M.2    Alagoz, O.3
  • 25
    • 0019572879 scopus 로고
    • Systems defense games: Colonel Blotto, command and control
    • Shubik M, Weber RJ. Systems defense games: Colonel Blotto, command and control. Naval Research Logistics Quarterly, 1981; 28(2):281-287.
    • (1981) Naval Research Logistics Quarterly , vol.28 , Issue.2 , pp. 281-287
    • Shubik, M.1    Weber, R.J.2
  • 26
    • 33746832500 scopus 로고    scopus 로고
    • The Colonel Blotto game
    • Roberson B. The Colonel Blotto game. Economic Theory, 2006; 29(1):1-24.
    • (2006) Economic Theory , vol.29 , Issue.1 , pp. 1-24
    • Roberson, B.1
  • 27
    • 84975745473 scopus 로고    scopus 로고
    • Linear programming under uncertainty
    • Infanger G (ed). New York Springer
    • Dantzig GB. Linear programming under uncertainty. Pp. 1-11 in Infanger G (ed). Stochastic Programming. New York Springer, 2011.
    • (2011) Stochastic Programming , pp. 1-11
    • Dantzig, G.B.1
  • 28
    • 84870613023 scopus 로고    scopus 로고
    • Robust discrete optimization and network flows
    • Bertsimas D, Sim M. Robust discrete optimization and network flows. Mathematical Programming, 2003; 98(1):49-71.
    • (2003) Mathematical Programming , vol.98 , Issue.1 , pp. 49-71
    • Bertsimas, D.1    Sim, M.2
  • 29
    • 0010680207 scopus 로고
    • Convex programming with set-inclusive constraints and applications to inexact linear programming
    • Soyster AL. Convex programming with set-inclusive constraints and applications to inexact linear programming. Operations Research, 1973; 21(5):1154-1157.
    • (1973) Operations Research , vol.21 , Issue.5 , pp. 1154-1157
    • Soyster, A.L.1
  • 31
    • 0032664938 scopus 로고    scopus 로고
    • Robust solutions of uncertain linear programs
    • Ben-Tal A, Nemirovski A. Robust solutions of uncertain linear programs. Operations Research Letters, 1999; 25(1):1-14.
    • (1999) Operations Research Letters , vol.25 , Issue.1 , pp. 1-14
    • Ben-Tal, A.1    Nemirovski, A.2
  • 32
    • 33744798398 scopus 로고    scopus 로고
    • Robust convex quadratically constrained programs
    • Goldfarb D, Iyengar G. Robust convex quadratically constrained programs. Mathematical Programming, 2003; 97(3):495-515.
    • (2003) Mathematical Programming , vol.97 , Issue.3 , pp. 495-515
    • Goldfarb, D.1    Iyengar, G.2
  • 33
  • 35
    • 0000725056 scopus 로고
    • Games with incomplete information played by "Bayesian" players, I-III. Part I. The basic model
    • Harsanyi JC. Games with incomplete information played by "Bayesian" players, I-III. Part I. The basic model. Management Science, 1967; 14(3):159-182.
    • (1967) Management Science , vol.14 , Issue.3 , pp. 159-182
    • Harsanyi, J.C.1
  • 36
    • 33644559970 scopus 로고    scopus 로고
    • A robust optimization approach to inventory theory
    • Bertsimas D, Thiele A. A robust optimization approach to inventory theory. Operations Research, 2006; 54(1):150-168.
    • (2006) Operations Research , vol.54 , Issue.1 , pp. 150-168
    • Bertsimas, D.1    Thiele, A.2
  • 37
    • 79952695711 scopus 로고    scopus 로고
    • Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers
    • Golalikhani M, Zhuang J. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers. Risk Analysis, 2010; 31(4):533-547.
    • (2010) Risk Analysis , vol.31 , Issue.4 , pp. 533-547
    • Golalikhani, M.1    Zhuang, J.2
  • 39
    • 70449709843 scopus 로고    scopus 로고
    • Impact of intelligence on target-hardening decisions
    • HST'09.IEEE Conference on Boston, MA
    • Wang C, Bier VM. Impact of intelligence on target-hardening decisions. Pp. 373-380 in HST'09.IEEE Conference on Technologies for Homeland Security. Boston, MA, 2009.
    • (2009) Technologies for Homeland Security , pp. 373-380
    • Wang, C.1    Bier, V.M.2
  • 40
    • 3543125926 scopus 로고    scopus 로고
    • The investment problem in terrorism
    • Konrad KA. The investment problem in terrorism. Economica, 2004; 71(283):449-459.
    • (2004) Economica , vol.71 , Issue.283 , pp. 449-459
    • Konrad, K.A.1
  • 41
    • 79251511489 scopus 로고    scopus 로고
    • Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation
    • Zhuang J, Bier V. Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation. Defence and Peace Economics, 2011; 22(1):43-61.
    • (2011) Defence and Peace Economics , vol.22 , Issue.1 , pp. 43-61
    • Zhuang, J.1    Bier, V.2
  • 42
    • 64549092443 scopus 로고    scopus 로고
    • Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
    • Dighe NS, Zhuang J, Bier VM. Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering, 2009; 5(1):31-43.
    • (2009) International Journal of Performability Engineering , vol.5 , Issue.1 , pp. 31-43
    • Dighe, N.S.1    Zhuang, J.2    Bier, V.M.3
  • 43
    • 77953177089 scopus 로고    scopus 로고
    • Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-player game with errors
    • Zhuang J. Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-player game with errors. Engineering Economist, 2010; 55(2):131-149.
    • (2010) Engineering Economist , vol.55 , Issue.2 , pp. 131-149
    • Zhuang, J.1
  • 44
    • 79952694232 scopus 로고    scopus 로고
    • Analytical method to identify the number of containers to inspect at US ports to deter terrorist attacks
    • Bier VM, Haphuriwat N. Analytical method to identify the number of containers to inspect at US ports to deter terrorist attacks. Annals of Operations Research, 2011; 187(1):137-158.
    • (2011) Annals of Operations Research , vol.187 , Issue.1 , pp. 137-158
    • Bier, V.M.1    Haphuriwat, N.2
  • 45
    • 34447335639 scopus 로고    scopus 로고
    • Modeling values for anti-terrorism analysis
    • Keeney RL. Modeling values for anti-terrorism analysis. Risk Analysis, 2007; 27(3):585-596.
    • (2007) Risk Analysis , vol.27 , Issue.3 , pp. 585-596
    • Keeney, R.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.