A real-time man-in-loop threat evaluation and resource assignment in defense
Author
Abstract
Suggested Citation
DOI: 10.1057/s41274-016-0139-6
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Masud, Abu S. M. & Metcalf, Paul & Hommertzheim, Don, 1995. "A knowledge-based model management system for aircraft survivability analysis," European Journal of Operational Research, Elsevier, vol. 84(1), pages 47-59, July.
- Onur Onay, 2016. "A Mathematical Approach to Neuromarketing: A Weapon – Target Assignment Model," International Journal of Academic Research in Business and Social Sciences, Human Resource Management Academic Research Society, International Journal of Academic Research in Business and Social Sciences, vol. 6(1), pages 164-173, January.
- Simon French, 2015. "Cynefin: uncertainty, small worlds and scenarios," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 66(10), pages 1635-1645, October.
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
- M A J Smith & R Dekker & J Kos & J A M Hontelez, 2001. "The availability of unmanned air vehicles: a post-case study," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 52(2), pages 161-168, February.
- Xiaojun Shan & Jun Zhuang, 2014. "Subsidizing to disrupt a terrorism supply chain—a four-player game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(7), pages 1108-1119, July.
- Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
- K Hausken & J Zhuang, 2012. "The timing and deterrence of terrorist attacks due to exogenous dynamics," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 726-735, June.
- Liao, Shu-hsien, 2000. "Case-based decision support system: Architecture for simulating military command and control," European Journal of Operational Research, Elsevier, vol. 123(3), pages 558-567, June.
- Phillips-Wren, G. & Mora, M. & Forgionne, G.A. & Gupta, J.N.D., 2009. "An integrative evaluation framework for intelligent decision support systems," European Journal of Operational Research, Elsevier, vol. 195(3), pages 642-652, June.
- Govindan, Kannan & Soleimani, Hamed & Kannan, Devika, 2015. "Reverse logistics and closed-loop supply chain: A comprehensive review to explore the future," European Journal of Operational Research, Elsevier, vol. 240(3), pages 603-626.
- F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Afshan Naseem & Yasir Ahmad, 2020. "Critical Success Factors for Neutralization of Airborne Threats," SAGE Open, , vol. 10(3), pages 21582440209, September.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Afshan Naseem & Yasir Ahmad, 2020. "Critical Success Factors for Neutralization of Airborne Threats," SAGE Open, , vol. 10(3), pages 21582440209, September.
- Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
- Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
- Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
- Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
- Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
- Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.
- Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
- Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
- Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
- Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
- Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
- Zhiguo Wang & Lufei Huang & Cici Xiao He, 2021. "A multi-objective and multi-period optimization model for urban healthcare waste’s reverse logistics network design," Journal of Combinatorial Optimization, Springer, vol. 42(4), pages 785-812, November.
- Salehi-Amiri, Amirhossein & Zahedi, Ali & Akbapour, Navid & Hajiaghaei-Keshteli, Mostafa, 2021. "Designing a sustainable closed-loop supply chain network for walnut industry," Renewable and Sustainable Energy Reviews, Elsevier, vol. 141(C).
- Patricia van Loon & Luk N. Van Wassenhove & Ales Mihelic, 2022. "Designing a circular business strategy: 7 years of evolution at a large washing machine manufacturer," Business Strategy and the Environment, Wiley Blackwell, vol. 31(3), pages 1030-1041, March.
- Ramani, Vinay & De Giovanni, Pietro, 2017. "A two-period model of product cannibalization in an atypical Closed-loop Supply Chain with endogenous returns: The case of DellReconnect," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1009-1027.
- Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Mehmet Talha Dulman & Surendra M. Gupta, 2018. "Evaluation of Maintenance and EOL Operation Performance of Sensor-Embedded Laptops," Logistics, MDPI, vol. 2(1), pages 1-22, January.
More about this item
Keywords
threat perception; evaluation; weapon assignment; stable marriage algorithm; threat index; supply chain; inventory;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pal:jorsoc:v:68:y:2017:i:6:d:10.1057_s41274-016-0139-6. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.palgrave-journals.com/ .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.