Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ejor.2018.09.015
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
- James S. Dyer & Rakesh K. Sarin, 1979. "Measurable Multiattribute Value Functions," Operations Research, INFORMS, vol. 27(4), pages 810-822, August.
- Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
- Stahl Dale O. & Wilson Paul W., 1995.
"On Players' Models of Other Players: Theory and Experimental Evidence,"
Games and Economic Behavior, Elsevier, vol. 10(1), pages 218-254, July.
- Dale O. Stahl & Paul W. Wilson, 2010. "On Players' Models of Other Players: Theory and Experimental Evidence," Levine's Working Paper Archive 542, David K. Levine.
- Koller, Daphne & Milch, Brian, 2003. "Multi-agent influence diagrams for representing and solving games," Games and Economic Behavior, Elsevier, vol. 45(1), pages 181-221, October.
- Juan Carlos Sevillano & David Rios Insua & Jesus Rios, 2012. "Adversarial Risk Analysis: The Somali Pirates Case," Decision Analysis, INFORMS, vol. 9(2), pages 86-95, June.
- Gregory L. Keeney & Detlof von Winterfeldt, 2010. "Identifying and Structuring the Objectives of Terrorists," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1803-1816, December.
- Joseph B. Kadane & Patrick D. Larkey, 1982. "Subjective Probability and the Theory of Games," Management Science, INFORMS, vol. 28(2), pages 113-120, February.
- Debarun Bhattacharjya & Ross D. Shachter, 2012. "Formulating Asymmetric Decision Problems as Decision Circuits," Decision Analysis, INFORMS, vol. 9(2), pages 138-145, June.
- Ralph L. Keeney, 2007. "Modeling Values for Anti‐Terrorism Analysis," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 585-596, June.
- Kjell Hausken, 2011. "Strategic defense and attack of series systems when agents move sequentially," IISE Transactions, Taylor & Francis Journals, vol. 43(7), pages 483-504.
- Demirer, Riza & Shenoy, Prakash P., 2006. "Sequential valuation networks for asymmetric decision problems," European Journal of Operational Research, Elsevier, vol. 169(1), pages 286-309, February.
- John C. Harsanyi, 1967. "Games with Incomplete Information Played by "Bayesian" Players, I-III Part I. The Basic Model," Management Science, INFORMS, vol. 14(3), pages 159-182, November.
- Ríos Insua, David & Ruggeri, Fabrizio & Soyer, Refik & Rasines, Daniel G., 2018. "Adversarial issues in reliability," European Journal of Operational Research, Elsevier, vol. 266(3), pages 1113-1119.
- David Ríos Insua & Fabrizio Ruggeri & Cesar Alfaro & Javier Gomez, 2016. "Robustness for Adversarial Risk Analysis," International Series in Operations Research & Management Science, in: Michael Doumpos & Constantin Zopounidis & Evangelos Grigoroudis (ed.), Robustness Analysis in Decision Aiding, Optimization, and Analytics, chapter 0, pages 39-58, Springer.
- Jun Zhuang & Vicki M. Bier, 2010. "Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1737-1743, December.
- Concha Bielza & Prakash P. Shenoy, 1999. "A Comparison of Graphical Techniques for Asymmetric Decision Problems," Management Science, INFORMS, vol. 45(11), pages 1552-1569, November.
- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
- Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
- Shouqiang Wang & David Banks, 2011. "Network routing for insurgency: An adversarial risk analysis framework," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(6), pages 595-607, September.
- Concha Bielza & Peter Müller & David Ríos Insua, 1999. "Decision Analysis by Augmented Probability Simulation," Management Science, INFORMS, vol. 45(7), pages 995-1007, July.
- Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Ralph L. Keeney & Detlof von Winterfeldt, 2011. "A Value Model for Evaluating Homeland Security Decisions," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1470-1487, September.
- Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
- Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
- Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
- Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
- Ross D. Shachter, 1986. "Evaluating Influence Diagrams," Operations Research, INFORMS, vol. 34(6), pages 871-882, December.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Ekin, Tahir & Naveiro, Roi & Ríos Insua, David & Torres-Barrán, Alberto, 2023. "Augmented probability simulation methods for sequential games," European Journal of Operational Research, Elsevier, vol. 306(1), pages 418-430.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
- Michael Macgregor Perry & Hadi El-Amine, 2021. "Computational Efficiency in Multivariate Adversarial Risk Analysis Models," Papers 2110.12572, arXiv.org.
- César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
- Roponen, Juho & Ríos Insua, David & Salo, Ahti, 2020. "Adversarial risk analysis under partial information," European Journal of Operational Research, Elsevier, vol. 287(1), pages 306-316.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Michael Perry & Hadi El-Amine, 2019. "Computational Efficiency in Multivariate Adversarial Risk Analysis Models," Decision Analysis, INFORMS, vol. 16(4), pages 314-332, December.
- William N. Caballero & Ethan Gharst & David Banks & Jeffery D. Weir, 2023. "Multipolar Security Cooperation Planning: A Multiobjective, Adversarial-Risk-Analysis Approach," Decision Analysis, INFORMS, vol. 20(1), pages 16-39, March.
- Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
- Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
- Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
- Ekin, Tahir & Naveiro, Roi & Ríos Insua, David & Torres-Barrán, Alberto, 2023. "Augmented probability simulation methods for sequential games," European Journal of Operational Research, Elsevier, vol. 306(1), pages 418-430.
- Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
- G. Quijano, Eduardo & RÃos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
- Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
- Bielza, Concha & Gómez, Manuel & Shenoy, Prakash P., 2011. "A review of representation issues and modeling challenges with influence diagrams," Omega, Elsevier, vol. 39(3), pages 227-241, June.
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Thwaites, Peter A. & Smith, Jim Q., 2018. "A graphical method for simplifying Bayesian games," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 3-11.
- Jorge González-Ortega & Refik Soyer & David Ríos Insua & Fabrizio Ruggeri, 2021. "An Adversarial Risk Analysis Framework for Batch Acceptance Problems," Decision Analysis, INFORMS, vol. 18(1), pages 25-40, March.
- Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
More about this item
Keywords
Decision analysis; Bi-agent influence diagram; Strategic relevance; Security; Critical infrastructure protection;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:273:y:2019:i:3:p:1085-1096. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.