메뉴 건너뛰기




Volumn 228, Issue 1, 2013, Pages 262-272

Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-Attacker game

Author keywords

Attacker defender game; Game theory; Homeland security; Non strategic player; Partially strategic player; Resource allocation

Indexed keywords

ATTACKER-DEFENDER GAME; EXPECTED LOSS; GAME-THEORETIC MODEL; HOME LAND SECURITY; HYBRID MODEL; NON-STRATEGIC PLAYER; PARTIALLY STRATEGIC PLAYER; POTENTIAL TARGETS;

EID: 84875228984     PISSN: 03772217     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ejor.2013.01.029     Document Type: Article
Times cited : (116)

References (45)
  • 1
    • 33947146473 scopus 로고    scopus 로고
    • Optimal resource allocation for security in reliability systems
    • M.N. Azaiez, and V.M. Bier Optimal resource allocation for security in reliability systems European Journal of Operational Research 181 2 2007 773 786
    • (2007) European Journal of Operational Research , vol.181 , Issue.2 , pp. 773-786
    • Azaiez, M.N.1    Bier, V.M.2
  • 2
    • 69949110555 scopus 로고    scopus 로고
    • An effective two-finger, two-stage biometric strategy for the US-VISIT program
    • M. Baveja, and L.M. Wein An effective two-finger, two-stage biometric strategy for the US-VISIT program Operations Research 57 5 2009 1068 1081
    • (2009) Operations Research , vol.57 , Issue.5 , pp. 1068-1081
    • Baveja, M.1    Wein, L.M.2
  • 3
    • 33750490397 scopus 로고    scopus 로고
    • Location of terror response facilities: A game between state and terrorist
    • O. Berman, and A. Gavious Location of terror response facilities: a game between state and terrorist European Journal of Operational Research 177 2 2007 1113 1133
    • (2007) European Journal of Operational Research , vol.177 , Issue.2 , pp. 1113-1133
    • Berman, O.1    Gavious, A.2
  • 4
    • 45349092442 scopus 로고    scopus 로고
    • Optimal resource allocation for defense of targets based on differing measures of attractiveness
    • V.M. Bier, N. Haphuriwat, J. Menoyo, R. Zimmerman, and A.M. Culpen Optimal resource allocation for defense of targets based on differing measures of attractiveness Risk Analysis 28 3 2008 763 770
    • (2008) Risk Analysis , vol.28 , Issue.3 , pp. 763-770
    • Bier, V.M.1    Haphuriwat, N.2    Menoyo, J.3    Zimmerman, R.4    Culpen, A.M.5
  • 5
    • 27344439516 scopus 로고    scopus 로고
    • A two-sided optimization for theater ballistic missile defense
    • G. Brown, M. Carlyle, D. Diehl, J. Kline, and K. Wood A two-sided optimization for theater ballistic missile defense Operations Research 53 5 2005 263 275
    • (2005) Operations Research , vol.53 , Issue.5 , pp. 263-275
    • Brown, G.1    Carlyle, M.2    Diehl, D.3    Kline, J.4    Wood, K.5
  • 6
    • 68149115896 scopus 로고    scopus 로고
    • Game theory and risk analysis
    • L.A. Cox Game theory and risk analysis Risk Analysis 29 8 2009 1062 1068
    • (2009) Risk Analysis , vol.29 , Issue.8 , pp. 1062-1068
    • Cox, L.A.1
  • 7
    • 42349112246 scopus 로고    scopus 로고
    • Homeland-Security Pork
    • accessed 08.12
    • de Rugy, V.; 2005. Homeland-Security Pork. Washington Times. < http://www.aei.org/article/22924 > (accessed 08.12).
    • (2005) Washington Times
    • De Rugy, V.1
  • 9
    • 79952695711 scopus 로고    scopus 로고
    • Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers
    • M. Golalikhani, and J. Zhuang Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers Risk Analysis 31 4 2011 533 547
    • (2011) Risk Analysis , vol.31 , Issue.4 , pp. 533-547
    • Golalikhani, M.1    Zhuang, J.2
  • 10
    • 50849106725 scopus 로고    scopus 로고
    • Nature plays with dice-terrorists do not: Allocating resources to counter strategic versus probabilistic risks
    • B. Golany, E.H. Kaplan, A. Marmur, and U.G. Rothblum Nature plays with dice-terrorists do not: allocating resources to counter strategic versus probabilistic risks European Journal of Operational Research 192 1 2009 198 208
    • (2009) European Journal of Operational Research , vol.192 , Issue.1 , pp. 198-208
    • Golany, B.1    Kaplan, E.H.2    Marmur, A.3    Rothblum, U.G.4
  • 11
    • 68149145410 scopus 로고    scopus 로고
    • The elephant in the room is called game theory
    • J.R. Hall The elephant in the room is called game theory Risk Analysis 29 8 2009 1061
    • (2009) Risk Analysis , vol.29 , Issue.8 , pp. 1061
    • Hall, J.R.1
  • 13
    • 79955628242 scopus 로고    scopus 로고
    • Trade-offs between target hardening and overarching protection
    • N. Haphuriwat, and V.M. Bier Trade-offs between target hardening and overarching protection European Journal of Operational Research 213 1 2011 320 328
    • (2011) European Journal of Operational Research , vol.213 , Issue.1 , pp. 320-328
    • Haphuriwat, N.1    Bier, V.M.2
  • 14
    • 4544332530 scopus 로고    scopus 로고
    • Mathematical methods in combating terrorism
    • B. Harris Mathematical methods in combating terrorism Risk Analysis 24 4 2004 985 988
    • (2004) Risk Analysis , vol.24 , Issue.4 , pp. 985-988
    • Harris, B.1
  • 15
    • 35348950536 scopus 로고    scopus 로고
    • Strategic defense and attack for series and parallel reliability systems
    • K. Hausken Strategic defense and attack for series and parallel reliability systems European Journal of Operational Research 186 2 2008 856 881
    • (2008) European Journal of Operational Research , vol.186 , Issue.2 , pp. 856-881
    • Hausken, K.1
  • 17
    • 80053472366 scopus 로고    scopus 로고
    • Risk adjusted budget allocation models with application in homeland security
    • J. Hu, T. Homem-de, Mello, and S. Mehrotra Risk adjusted budget allocation models with application in homeland security IIE Transactions 43 12 2011 819 839
    • (2011) IIE Transactions , vol.43 , Issue.12 , pp. 819-839
    • Hu, J.1    Homem-De, T.2    Mello3    Mehrotra, S.4
  • 18
    • 77955458634 scopus 로고    scopus 로고
    • Software assistants for randomized patrol planning for the lax patrol police and the federal air marshals service
    • M. Jain, J. Tsai, J. Pita, C. Kiekintveld, S. Rathi, F. Ordonez, and M. Tambe Software assistants for randomized patrol planning for the lax patrol police and the federal air marshals service Interfaces 40 4 2010 267 290
    • (2010) Interfaces , vol.40 , Issue.4 , pp. 267-290
    • Jain, M.1    Tsai, J.2    Pita, J.3    Kiekintveld, C.4    Rathi, S.5    Ordonez, F.6    Tambe, M.7
  • 19
    • 77955863380 scopus 로고    scopus 로고
    • Terror queues
    • E.H. Kaplan Terror queues Operations Research 58 4 2010 773 784
    • (2010) Operations Research , vol.58 , Issue.4 , pp. 773-784
    • Kaplan, E.H.1
  • 20
    • 22544458158 scopus 로고    scopus 로고
    • Operational effectiveness of suicide-bomber-detector schemes: A best-case analysis
    • E.H. Kaplan, and M. Kress Operational effectiveness of suicide-bomber-detector schemes: a best-case analysis Proceedings of the National Academy of Science 102 29 2005 10399 10404
    • (2005) Proceedings of the National Academy of Science , vol.102 , Issue.29 , pp. 10399-10404
    • Kaplan, E.H.1    Kress, M.2
  • 22
    • 80053424264 scopus 로고    scopus 로고
    • A value model for evaluating homeland security decisions
    • G.L. Keeney, and D. von Winterfeldt A value model for evaluating homeland security decisions Risk Analysis 31 9 2011 1470 1487
    • (2011) Risk Analysis , vol.31 , Issue.9 , pp. 1470-1487
    • Keeney, G.L.1    Von Winterfeldt, D.2
  • 23
    • 34447335639 scopus 로고    scopus 로고
    • Modeling values for anti-terrorism analysis
    • R.L. Keeney Modeling values for anti-terrorism analysis Risk Analysis 27 3 2007 585 596
    • (2007) Risk Analysis , vol.27 , Issue.3 , pp. 585-596
    • Keeney, R.L.1
  • 24
    • 33847069350 scopus 로고
    • Rational cooperation in the finitely repeated prisoners' dilemma
    • D.M. Kreps, P. Milgrom, J. Roberts, and R. Wilson Rational cooperation in the finitely repeated prisoners' dilemma Journal of Economic Theory 27 2 1982 245 252
    • (1982) Journal of Economic Theory , vol.27 , Issue.2 , pp. 245-252
    • Kreps, D.M.1    Milgrom, P.2    Roberts, J.3    Wilson, R.4
  • 25
    • 68149148571 scopus 로고    scopus 로고
    • Why defeating insurgencies is hard: The effect of intelligence in counterinsurgency operations - A best case scenario
    • M. Kress, and R. Szechtman Why defeating insurgencies is hard: the effect of intelligence in counterinsurgency operations - a best case scenario Operations Research 57 3 2009 578 585
    • (2009) Operations Research , vol.57 , Issue.3 , pp. 578-585
    • Kress, M.1    Szechtman, R.2
  • 26
    • 77957969748 scopus 로고    scopus 로고
    • Redundancy vs. protection in defending parallel systems against unintentional and intentional impacts
    • G. Levitin, and K. Hausken Redundancy vs. protection in defending parallel systems against unintentional and intentional impacts IEEE Transactions on Reliability 58 4 2009 679 690
    • (2009) IEEE Transactions on Reliability , vol.58 , Issue.4 , pp. 679-690
    • Levitin, G.1    Hausken, K.2
  • 27
    • 63449099812 scopus 로고    scopus 로고
    • Scheduling policies for an antiterrorist surveillance system
    • K.Y. Lin, M. Kress, and R. Szechtman Scheduling policies for an antiterrorist surveillance system Naval Research Logistics 56 2 2009 113 126
    • (2009) Naval Research Logistics , vol.56 , Issue.2 , pp. 113-126
    • Lin, K.Y.1    Kress, M.2    Szechtman, R.3
  • 28
    • 42349094873 scopus 로고    scopus 로고
    • Homeland Security - Pork or Protection?
    • accessed 08.12
    • McLaughlin, A.; 2002. Homeland Security - Pork or Protection? The Christian Science Monitor. < http://www.csmonitor.com/2002/0306/p03s01-usmi. html > (accessed 08.12).
    • (2002) The Christian Science Monitor
    • McLaughlin, A.1
  • 30
    • 34547479862 scopus 로고    scopus 로고
    • Defending against terrorist attacks with limited resources
    • R. Powell Defending against terrorist attacks with limited resources American Political Science Review 101 3 2007 527 541
    • (2007) American Political Science Review , vol.101 , Issue.3 , pp. 527-541
    • Powell, R.1
  • 31
    • 70349331067 scopus 로고    scopus 로고
    • Sequential, nonzero-sum "blotto": Allocating defensive resources prior to attack
    • R. Powell Sequential, nonzero-sum "Blotto": allocating defensive resources prior to attack Games and Economic Behavior 67 2 2009 611 615
    • (2009) Games and Economic Behavior , vol.67 , Issue.2 , pp. 611-615
    • Powell, R.1
  • 32
    • 33746832500 scopus 로고    scopus 로고
    • The colonel blotto game
    • B. Roberson The colonel blotto game Economic Theory 29 1 2006 1 24
    • (2006) Economic Theory , vol.29 , Issue.1 , pp. 1-24
    • Roberson, B.1
  • 33
    • 63449108250 scopus 로고    scopus 로고
    • Games and terrorism: Recent developments
    • T. Sandler, and K. Siqueira Games and terrorism: recent developments Simulation & Gaming 40 2 2009 164 192
    • (2009) Simulation & Gaming , vol.40 , Issue.2 , pp. 164-192
    • Sandler, T.1    Siqueira, K.2
  • 34
    • 0019572879 scopus 로고
    • Systems defense games: Colonel Blotto, command and control
    • M. Shubik, and R.J. Weber Systems defense games: Colonel Blotto, command and control Naval Research Logistics Quarterly 28 2 1981 281 287
    • (1981) Naval Research Logistics Quarterly , vol.28 , Issue.2 , pp. 281-287
    • Shubik, M.1    Weber, R.J.2
  • 35
    • 84875221198 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security. 2004. Fiscal Year 2004 Urban Areas Security Initiative Grant Program. < > (accessed 08.12)
    • U.S. Department of Homeland Security. 2004. Fiscal Year 2004 Urban Areas Security Initiative Grant Program. < http://web.archive.org/web/*/http: //www.ojp.usdoj.gov/odp/docs/fy04uasi.pdf > (accessed 08.12).
  • 36
    • 84875216359 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security. 2012. Budget and Performance. < > (accessed 08.12)
    • U.S. Department of Homeland Security. 2012. Budget and Performance. < http://www.dhs.gov/xabout/budget/dhs-budget.shtm > (accessed 08.12).
  • 37
    • 84875213626 scopus 로고    scopus 로고
    • U.S. Government Accountability Office. 2008. DHS Risk-Based Grant Methodology is Reasonable, but Current Versions Measure of Vulnerability is Limited. < > (accessed 08.12)
    • U.S. Government Accountability Office. 2008. DHS Risk-Based Grant Methodology is Reasonable, but Current Versions Measure of Vulnerability is Limited. < http://www.gao.gov/new.items/d08852.pdf > (accessed 08.12).
  • 39
    • 83755228811 scopus 로고    scopus 로고
    • Target-hardening decisions based on uncertain multiattribute terrorist utility
    • C. Wang, and V.M. Bier Target-hardening decisions based on uncertain multiattribute terrorist utility Decision Analysis 8 4 2011 286 302
    • (2011) Decision Analysis , vol.8 , Issue.4 , pp. 286-302
    • Wang, C.1    Bier, V.M.2
  • 40
    • 79952701280 scopus 로고    scopus 로고
    • Balancing congestion and security in the presence of strategic applicants with private information
    • X. Wang, and J. Zhuang Balancing congestion and security in the presence of strategic applicants with private information European Journal of Operational Research 212 1 2011 100 111
    • (2011) European Journal of Operational Research , vol.212 , Issue.1 , pp. 100-111
    • Wang, X.1    Zhuang, J.2
  • 41
    • 69949090557 scopus 로고    scopus 로고
    • Homeland security: From mathematical models to policy implementation: The 2008 Philip McCord Morse lecture
    • L.M. Wein Homeland security: From mathematical models to policy implementation: the 2008 Philip McCord Morse lecture Operations Research 57 4 2009 801 811
    • (2009) Operations Research , vol.57 , Issue.4 , pp. 801-811
    • Wein, L.M.1
  • 43
    • 77953177089 scopus 로고    scopus 로고
    • Impacts of subsidized security on stability and total social costs of equilibrium solutions in an n-player game with error
    • J. Zhuang Impacts of subsidized security on stability and total social costs of equilibrium solutions in an n-player game with error The Engineering Economist 55 2 2010 131 149
    • (2010) The Engineering Economist , vol.55 , Issue.2 , pp. 131-149
    • Zhuang, J.1
  • 44
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters - Defensive strategy with endogenous attacker effort
    • J. Zhuang, and V.M. Bier Balancing terrorism and natural disasters - defensive strategy with endogenous attacker effort Operations Research 55 5 2007 976 991
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 45
    • 70350704685 scopus 로고    scopus 로고
    • Modeling secrecy and deception in a multiple-period attacker-defender signaling game
    • J. Zhuang, V.M. Bier, and O. Alagoz Modeling secrecy and deception in a multiple-period attacker-defender signaling game European Journal of Operational Research 203 2 2010 409 418
    • (2010) European Journal of Operational Research , vol.203 , Issue.2 , pp. 409-418
    • Zhuang, J.1    Bier, V.M.2    Alagoz, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.