메뉴 건너뛰기




Volumn 239, Issue 2, 2014, Pages 469-478

Infrastructure security games

Author keywords

Bayesian game; Game theory; Matrix game; Moving targets; Uncertainty modeling

Indexed keywords

GAME THEORY; HUMAN RESOURCE MANAGEMENT; RISK MANAGEMENT; TRANSPORTATION;

EID: 84904655484     PISSN: 03772217     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ejor.2014.04.033     Document Type: Article
Times cited : (60)

References (91)
  • 3
    • 45849083859 scopus 로고    scopus 로고
    • Network search games with immobile hider, without a designated searcher starting point
    • S. Alpern, V. Baston, and S. Gal Network search games with immobile hider, without a designated searcher starting point International Journal of Game Theory 37 2008 281 302
    • (2008) International Journal of Game Theory , vol.37 , pp. 281-302
    • Alpern, S.1    Baston, V.2    Gal, S.3
  • 6
    • 41549107359 scopus 로고    scopus 로고
    • Optimal stopping analysis of a radiation detection system to protect cities from a nuclear terrorist attack
    • M. Atkinson, Z. Cao, and L. Wein Optimal stopping analysis of a radiation detection system to protect cities from a nuclear terrorist attack Risk Analysis 28 2 2008 353 371
    • (2008) Risk Analysis , vol.28 , Issue.2 , pp. 353-371
    • Atkinson, M.1    Cao, Z.2    Wein, L.3
  • 7
    • 41549126283 scopus 로고    scopus 로고
    • Spatial queueing analysis of an interdiction system to protect cities from a nuclear terrorist attack
    • M. Atkinson, and L. Wein Spatial queueing analysis of an interdiction system to protect cities from a nuclear terrorist attack Operations Research 56 2008 247 254
    • (2008) Operations Research , vol.56 , pp. 247-254
    • Atkinson, M.1    Wein, L.2
  • 9
    • 0036605266 scopus 로고    scopus 로고
    • Inventory control under substitutable demand: A stochastic game application
    • M.Z. Avsar, and M. Baykal-Gürsoy Inventory control under substitutable demand: A stochastic game application Naval Research Logistics 49 2002 359 375
    • (2002) Naval Research Logistics , vol.49 , pp. 359-375
    • Avsar, M.Z.1    Baykal-Gürsoy, M.2
  • 10
    • 33646090607 scopus 로고    scopus 로고
    • A note on two-person zero-sum communicating games
    • M.Z. Avsar, and M. Baykal-Gürsoy A note on two-person zero-sum communicating games Operations Research Letters 34 4 2006 412 420
    • (2006) Operations Research Letters , vol.34 , Issue.4 , pp. 412-420
    • Avsar, M.Z.1    Baykal-Gürsoy, M.2
  • 12
    • 84859701666 scopus 로고    scopus 로고
    • Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder
    • N. Basilico, N. Gatti, and F. Amigoni Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder Artificial Intelligence 184-185 2012 78 123
    • (2012) Artificial Intelligence , vol.184-185 , pp. 78-123
    • Basilico, N.1    Gatti, N.2    Amigoni, F.3
  • 13
    • 60749113174 scopus 로고    scopus 로고
    • Macroscopic pedestrian flow simulation for designing crowd control measures in public transport after special events
    • Bauer, D., Seer, S., & Brandle, N. (2007). Macroscopic pedestrian flow simulation for designing crowd control measures in public transport after special events. In Proceedings of the summer computer simulation conference (pp. 1035-1042).
    • (2007) Proceedings of the Summer Computer Simulation Conference , pp. 1035-1042
    • Bauer, D.1    Seer, S.2    Brandle, N.3
  • 17
    • 33750031049 scopus 로고    scopus 로고
    • Terrorism and critical infrastructures: Implications for public-private crisis management
    • A. Boin, and D. Smith Terrorism and critical infrastructures: Implications for public-private crisis management Public Money and Management 26 5 2006 295 304
    • (2006) Public Money and Management , vol.26 , Issue.5 , pp. 295-304
    • Boin, A.1    Smith, D.2
  • 19
    • 10444228109 scopus 로고    scopus 로고
    • Executive order 13010 - Critical infrastructure protection
    • W.J. Clinton Executive order 13010 - Critical infrastructure protection Federal Register 61 138 1996 37347 37350
    • (1996) Federal Register , vol.61 , Issue.138 , pp. 37347-37350
    • Clinton, W.J.1
  • 20
    • 12344300052 scopus 로고    scopus 로고
    • Homeland security act of 2002
    • U.S. Congress Homeland security act of 2002 Public Law 2002 107 296
    • (2002) Public Law , pp. 107-296
    • Congress, U.S.1
  • 23
    • 64549092443 scopus 로고    scopus 로고
    • Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
    • N.S. Dighe, J. Zhuang, and V.M. Bier Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence International Journal of Performability Engineering 5 2009 31 43
    • (2009) International Journal of Performability Engineering , vol.5 , pp. 31-43
    • Dighe, N.S.1    Zhuang, J.2    Bier, V.M.3
  • 24
    • 1542767168 scopus 로고
    • A survey of search theory
    • J.M. Dobbie A survey of search theory Operations Research 16 1968 525 537
    • (1968) Operations Research , vol.16 , pp. 525-537
    • Dobbie, J.M.1
  • 32
    • 0000725056 scopus 로고
    • Games with incomplete information played by Bayesian players. Part I: The basic model
    • J. Harsanyi Games with incomplete information played by Bayesian players. Part I: The basic model Management Science 14 3 1967 159 182
    • (1967) Management Science , vol.14 , Issue.3 , pp. 159-182
    • Harsanyi, J.1
  • 33
    • 0000725055 scopus 로고
    • Games with incomplete information played by Bayesian players. Part II: Bayesian equilibrium points
    • J. Harsanyi Games with incomplete information played by Bayesian players. Part II: Bayesian equilibrium points Management Science 14 5 1968 320 334
    • (1968) Management Science , vol.14 , Issue.5 , pp. 320-334
    • Harsanyi, J.1
  • 34
    • 0000725056 scopus 로고
    • Games with incomplete information played by Bayesian players. Part III: The basic probability distribution of the game
    • J. Harsanyi Games with incomplete information played by Bayesian players. Part III: The basic probability distribution of the game Management Science 14 7 1968 486 502
    • (1968) Management Science , vol.14 , Issue.7 , pp. 486-502
    • Harsanyi, J.1
  • 37
    • 79960284481 scopus 로고    scopus 로고
    • Nuclear threat detection with mobile distributed sensor networks
    • D.S. Hochbaum, and B. Fishbain Nuclear threat detection with mobile distributed sensor networks Annals of Operations Research 187 1 2011 45 63
    • (2011) Annals of Operations Research , vol.187 , Issue.1 , pp. 45-63
    • Hochbaum, D.S.1    Fishbain, B.2
  • 38
    • 38849147659 scopus 로고    scopus 로고
    • A search game taking account of attributes of searching resources
    • R. Hohzaki A search game taking account of attributes of searching resources Naval Research Logistics Quarterly 55 2007 76 90
    • (2007) Naval Research Logistics Quarterly , vol.55 , pp. 76-90
    • Hohzaki, R.1
  • 41
    • 84863407310 scopus 로고    scopus 로고
    • Evader interdiction and collateral damage
    • T. Erlebach, S. Nikoletseas, P. Orponen (Eds.) LNCS Springer
    • Johnson, M., & Gutfraind, A. (2011). Evader interdiction and collateral damage. In T. Erlebach, S. Nikoletseas, P. Orponen (Eds.), Proceedings of ALGOSENSORS 2011, LNCS. (Vol. 7111, pp. 86-100), Springer.
    • (2011) Proceedings of ALGOSENSORS 2011 , vol.7111 , pp. 86-100
    • Johnson, M.1    Gutfraind, A.2
  • 43
    • 85024429815 scopus 로고
    • A new approach to linear filtering and prediction problems
    • R. Kalman A new approach to linear filtering and prediction problems Journal of Basic Engineering 82 1960 35 45
    • (1960) Journal of Basic Engineering , vol.82 , pp. 35-45
    • Kalman, R.1
  • 45
    • 85024423711 scopus 로고
    • New results in linear filtering and prediction theory
    • R. Kalman, and R. Bucy New results in linear filtering and prediction theory J. Basic Eng. 1961 95 108
    • (1961) J. Basic Eng. , pp. 95-108
    • Kalman, R.1    Bucy, R.2
  • 46
    • 0019540987 scopus 로고
    • On the quantitative definition of risk
    • S. Kaplan, and B. Garrick On the quantitative definition of risk Risk Analysis 1 1 1981 11 27
    • (1981) Risk Analysis , vol.1 , Issue.1 , pp. 11-27
    • Kaplan, S.1    Garrick, B.2
  • 47
    • 33947407751 scopus 로고    scopus 로고
    • Models for crowd movement and egress simulation
    • S.P. Hoogendoorn, Springer Berlin
    • H. Klüpfel, and T. Meyer-König Models for crowd movement and egress simulation S.P. Hoogendoorn, Traffic and granular flow '03 2004 Springer Berlin 357 372
    • (2004) Traffic and Granular Flow '03 , pp. 357-372
    • Klüpfel, H.1    Meyer-König, T.2
  • 48
    • 84864253043 scopus 로고    scopus 로고
    • Simulation of the evacuation of a football stadium
    • S.P. Hoogendoorn, Springer Berlin
    • H. Klüpfel, and T. Meyer-König Simulation of the evacuation of a football stadium S.P. Hoogendoorn, Traffic and granular flow '03 2004 Springer Berlin 423 430
    • (2004) Traffic and Granular Flow '03 , pp. 423-430
    • Klüpfel, H.1    Meyer-König, T.2
  • 50
    • 33750618042 scopus 로고    scopus 로고
    • Algorithms for discrete and continuous multicommodity flow network interdiction problems
    • C. Lim, and J.C. Smith Algorithms for discrete and continuous multicommodity flow network interdiction problems IIE Transactions 39 1 2007 15 26
    • (2007) IIE Transactions , vol.39 , Issue.1 , pp. 15-26
    • Lim, C.1    Smith, J.C.2
  • 52
    • 35448938538 scopus 로고    scopus 로고
    • Risk analysis for critical asset protection
    • W. McGill, B. Ayyub, and M. Kaminskiy Risk analysis for critical asset protection Risk Analysis 27 5 2007 1265 1281
    • (2007) Risk Analysis , vol.27 , Issue.5 , pp. 1265-1281
    • McGill, W.1    Ayyub, B.2    Kaminskiy, M.3
  • 55
    • 33750629476 scopus 로고    scopus 로고
    • Models for nuclear smuggling interdiction
    • D.P. Morton, F. Pan, and K.J. Saeger Models for nuclear smuggling interdiction IIE Transactions 39 1 2007 3 14
    • (2007) IIE Transactions , vol.39 , Issue.1 , pp. 3-14
    • Morton, D.P.1    Pan, F.2    Saeger, K.J.3
  • 56
    • 84898278501 scopus 로고    scopus 로고
    • Risk management and critical infrastructure protection: Assessing, integrating, and managing threats, vulnerabilities and consequences
    • Moteff, J. (2005). Risk management and critical infrastructure protection: Assessing, integrating, and managing threats, vulnerabilities and consequences. Library of Congress Washington DC Congressional Research Service.
    • (2005) Library of Congress Washington DC Congressional Research Service
    • Moteff, J.1
  • 57
    • 0001730497 scopus 로고
    • Non-cooperative games
    • J. Nash Non-cooperative games Annals of Mathematics 54 1951 286 295
    • (1951) Annals of Mathematics , vol.54 , pp. 286-295
    • Nash, J.1
  • 60
    • 58849120173 scopus 로고    scopus 로고
    • The impact of joint responses of devices in an airport security system
    • X. Nie, R. Batta, C.G. Drury, and L. Lin The impact of joint responses of devices in an airport security system Risk Analysis 29 2 2009 298 311
    • (2009) Risk Analysis , vol.29 , Issue.2 , pp. 298-311
    • Nie, X.1    Batta, R.2    Drury, C.G.3    Lin, L.4
  • 69
    • 0036089039 scopus 로고    scopus 로고
    • Fusion of intelligence information: A Bayesian approach
    • E. Paté-Cornell Fusion of intelligence information: A Bayesian approach Risk Analysis 22 2002 445 454
    • (2002) Risk Analysis , vol.22 , pp. 445-454
    • Paté-Cornell, E.1
  • 70
    • 0005001185 scopus 로고    scopus 로고
    • Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures
    • E. Paté-Cornell Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures Military Operations Research 7 2002 5 20
    • (2002) Military Operations Research , vol.7 , pp. 5-20
    • Paté-Cornell, E.1
  • 72
    • 84862122087 scopus 로고    scopus 로고
    • Extracting topological information from grid maps for robot navigation
    • Portugal, D., & Rocha, R. P. (2012). Extracting topological information from grid maps for robot navigation. In ICAART (1) (pp. 137-143).
    • (2012) ICAART , Issue.1 , pp. 137-143
    • Portugal, D.1    Rocha, R.P.2
  • 74
    • 33645835986 scopus 로고    scopus 로고
    • Critical infrastructure protection and the role of emergency services
    • M. Rothery, and C. Branch Critical infrastructure protection and the role of emergency services The Australian Journal of Emergency Management 20 2 2005 45 50
    • (2005) The Australian Journal of Emergency Management , vol.20 , Issue.2 , pp. 45-50
    • Rothery, M.1    Branch, C.2
  • 75
    • 0004843147 scopus 로고
    • Ambushing random walks II: Continuous models
    • W.H. Ruckle Ambushing random walks II: Continuous models Operations Research 29 1 1981 108 120
    • (1981) Operations Research , vol.29 , Issue.1 , pp. 108-120
    • Ruckle, W.H.1
  • 79
    • 0026930270 scopus 로고
    • Searching for a mobile intruder in a polygonal region
    • I. Suzuki, and M. Yamashita Searching for a mobile intruder in a polygonal region SIAM Journal on Computing 21 5 1992 863 888
    • (1992) SIAM Journal on Computing , vol.21 , Issue.5 , pp. 863-888
    • Suzuki, I.1    Yamashita, M.2
  • 84
    • 0001590955 scopus 로고
    • Two-person zero-sum games for network interdiction
    • A. Washburn, and K. Wood Two-person zero-sum games for network interdiction Operations Research 43 2 1995 243 251
    • (1995) Operations Research , vol.43 , Issue.2 , pp. 243-251
    • Washburn, A.1    Wood, K.2
  • 85
    • 69949090557 scopus 로고    scopus 로고
    • OR Forum - Homeland security: From mathematical models to policy implementation: The 2008 Philip McCord Morse Lecture
    • L. Wein OR Forum - Homeland security: From mathematical models to policy implementation: The 2008 Philip McCord Morse Lecture Operations Research 57 4 2009 801 811
    • (2009) Operations Research , vol.57 , Issue.4 , pp. 801-811
    • Wein, L.1
  • 86
    • 34250773839 scopus 로고    scopus 로고
    • The last line of defense: Designing radiation detection-interdiction systems to protect cities from a nuclear terrorist attack
    • L. Wein, and M. Atkinson The last line of defense: Designing radiation detection-interdiction systems to protect cities from a nuclear terrorist attack IEEE Transactions on Nuclear Science 54 3 2007 654 669
    • (2007) IEEE Transactions on Nuclear Science , vol.54 , Issue.3 , pp. 654-669
    • Wein, L.1    Atkinson, M.2
  • 87
  • 88
    • 34548017657 scopus 로고    scopus 로고
    • Simulation of pedestrian flow on square lattice based on cellular automata model
    • H. Yue, H. Hao, X. Chen, and C. Shao Simulation of pedestrian flow on square lattice based on cellular automata model Physica A 384 2007 567 588
    • (2007) Physica A , vol.384 , pp. 567-588
    • Yue, H.1    Hao, H.2    Chen, X.3    Shao, C.4
  • 89
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters: Defensive strategy with endogenous attacker effort
    • J. Zhuang, and V.M. Bier Balancing terrorism and natural disasters: Defensive strategy with endogenous attacker effort Operations Research 55 2007 976 991
    • (2007) Operations Research , vol.55 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2
  • 90
    • 77953205441 scopus 로고    scopus 로고
    • Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation
    • J. Zhuang, and V.M. Bier Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation Defence and Peace Economics 2009
    • (2009) Defence and Peace Economics
    • Zhuang, J.1    Bier, V.M.2
  • 91
    • 70350704685 scopus 로고    scopus 로고
    • Modeling secrecy and deception in a multiple-period attacker-defender signaling game
    • J. Zhuang, V.M. Bier, and O. Alagoz Modeling secrecy and deception in a multiple-period attacker-defender signaling game European Journal of Operational Research 203 2010 409 418
    • (2010) European Journal of Operational Research , vol.203 , pp. 409-418
    • Zhuang, J.1    Bier, V.M.2    Alagoz, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.