Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ress.2019.106778
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
- Joseph Foraker & Seungho Lee & Elijah Polak, 2016. "Validation of a strategy for harbor defense based on the use of a min‐max algorithm receding horizon control law," Naval Research Logistics (NRL), John Wiley & Sons, vol. 63(3), pages 247-259, April.
- Kjell Hausken, 2011. "Production, safety, fighting, and risk," International Journal of Business Continuity and Risk Management, Inderscience Enterprises Ltd, vol. 2(4), pages 324-329.
- Daniel Kahneman & Amos Tversky, 2013.
"Prospect Theory: An Analysis of Decision Under Risk,"
World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127,
World Scientific Publishing Co. Pte. Ltd..
- Kahneman, Daniel & Tversky, Amos, 1979. "Prospect Theory: An Analysis of Decision under Risk," Econometrica, Econometric Society, vol. 47(2), pages 263-291, March.
- Amos Tversky & Daniel Kahneman, 1979. "Prospect Theory: An Analysis of Decision under Risk," Levine's Working Paper Archive 7656, David K. Levine.
- Trucco, P. & Cagno, E. & Ruggeri, F. & Grande, O., 2008. "A Bayesian Belief Network modelling of organisational factors in risk analysis: A case study in maritime transportation," Reliability Engineering and System Safety, Elsevier, vol. 93(6), pages 845-856.
- Mohammed Abdellaoui & Han Bleichrodt & Corina Paraschiv, 2007.
"Loss Aversion Under Prospect Theory: A Parameter-Free Measurement,"
Management Science, INFORMS, vol. 53(10), pages 1659-1674, October.
- H. Bleichrodt & C. Paraschiv & Mohammed Abdellaoui, 2007. "Loss Aversion Under Prospect Theory: A Parameter-Free Measurement," Post-Print hal-00457047, HAL.
- Gregory Levitin & Kjell Hausken, 2011. "Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace," Risk Analysis, John Wiley & Sons, vol. 31(10), pages 1632-1645, October.
- Kjell Hausken, 2011. "Production, safety, exchange, and risk," International Journal of Business Continuity and Risk Management, Inderscience Enterprises Ltd, vol. 2(4), pages 346-350.
- Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
- Han Bleichrodt & Jose Luis Pinto, 2000. "A Parameter-Free Elicitation of the Probability Weighting Function in Medical Decision Analysis," Management Science, INFORMS, vol. 46(11), pages 1485-1496, November.
- Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
- Wu, Shaomin & Akbarov, Artur, 2011. "Support vector regression for warranty claim forecasting," European Journal of Operational Research, Elsevier, vol. 213(1), pages 196-204, August.
- Kjell Hausken & Gregory Levitin, 2011. "Shield versus sword resource distribution in K-round duels," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 19(4), pages 589-603, December.
- Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
- Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.
- Benjamin Donald Oakes & Lars‐Göran Mattsson & Per Näsman & Andrés Alayón Glazunov, 2018. "A Systems‐Based Risk Assessment Framework for Intentional Electromagnetic Interference (IEMI) on Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 38(6), pages 1279-1305, June.
- Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
- Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
- Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
- Ali Jamshidi & Shahrzad Faghih‐Roohi & Siamak Hajizadeh & Alfredo Núñez & Robert Babuska & Rolf Dollevoet & Zili Li & Bart De Schutter, 2017. "A Big Data Analysis Approach for Rail Failure Risk Assessment," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1495-1507, August.
- Aven, Terje, 2016. "Risk assessment and risk management: Review of recent advances on their foundation," European Journal of Operational Research, Elsevier, vol. 253(1), pages 1-13.
- Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
- Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
- Hui Xiao & Rui Peng, 2018. "Trade-Off Between Redundancy, Protection, and Imperfect False Targets in Defending Parallel Systems," Springer Series in Reliability Engineering, in: Anatoly Lisnianski & Ilia Frenkel & Alex Karagrigoriou (ed.), Recent Advances in Multi-state Systems Reliability, pages 227-239, Springer.
- Bocchetti, D. & Giorgio, M. & Guida, M. & Pulcini, G., 2009. "A competing risk model for the reliability of cylinder liners in marine Diesel engines," Reliability Engineering and System Safety, Elsevier, vol. 94(8), pages 1299-1307.
- Kjell Hausken, 2010. "Risk, production and conflict when utilities are as if certain," International Journal of Decision Sciences, Risk and Management, Inderscience Enterprises Ltd, vol. 2(3/4), pages 228-251.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
- Zhang, Chao & Chen, Rentong & Wang, Shaoping & Dui, Hongyan & Zhang, Yadong, 2022. "Resilience efficiency importance measure for the selection of a component maintenance strategy to improve system performance recovery," Reliability Engineering and System Safety, Elsevier, vol. 217(C).
- Yan, Rui & Zhu, Xiaoping & Zhu, Xiaoning & Peng, Rui, 2022. "Optimal routes and aborting strategies of trucks and drones under random attacks," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
- Kaiye Gao & Hui Xiao & Li Qu & Shouyang Wang, 2022. "Optimal interception strategy of air defence missile system considering multiple targets and phases," Journal of Risk and Reliability, , vol. 236(1), pages 138-147, February.
- Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Kangye Tan & Weihua Liu & Fang Xu & Chunsheng Li, 2023. "Optimization Model and Algorithm of Logistics Vehicle Routing Problem under Major Emergency," Mathematics, MDPI, vol. 11(5), pages 1-18, March.
- Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
- Zhu, Xiaoning & Zhu, Xiaoping & Yan, Rui & Peng, Rui, 2021. "Optimal routing, aborting and hitting strategies of UAVs executing hitting the targets considering the defense range of targets," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
- Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
- Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
- Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
- Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
- Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
- Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
- Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
- Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
- Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
- Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
- Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
- Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
- Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
- Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
- Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
- Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
- Kaiye Gao & Hui Xiao & Li Qu & Shouyang Wang, 2022. "Optimal interception strategy of air defence missile system considering multiple targets and phases," Journal of Risk and Reliability, , vol. 236(1), pages 138-147, February.
More about this item
Keywords
OR in defense; Imperfect false target; Proactive strike; Preventive strike; Attack–defense game; Cumulative prospect;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:196:y:2020:i:c:s095183201930609x. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.