A real-time man-in-loop threat evaluation and resource assignment in defense
Author
Abstract
Suggested Citation
DOI: 10.1057/s41274-016-0139-6
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- M A J Smith & R Dekker & J Kos & J A M Hontelez, 2001. "The availability of unmanned air vehicles: a post-case study," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 52(2), pages 161-168, February.
- Xiaojun Shan & Jun Zhuang, 2014. "Subsidizing to disrupt a terrorism supply chain—a four-player game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(7), pages 1108-1119, July.
- Phillips-Wren, G. & Mora, M. & Forgionne, G.A. & Gupta, J.N.D., 2009. "An integrative evaluation framework for intelligent decision support systems," European Journal of Operational Research, Elsevier, vol. 195(3), pages 642-652, June.
- Govindan, Kannan & Soleimani, Hamed & Kannan, Devika, 2015. "Reverse logistics and closed-loop supply chain: A comprehensive review to explore the future," European Journal of Operational Research, Elsevier, vol. 240(3), pages 603-626.
- Onur Onay, 2016. "A Mathematical Approach to Neuromarketing: A Weapon – Target Assignment Model," International Journal of Academic Research in Business and Social Sciences, Human Resource Management Academic Research Society, International Journal of Academic Research in Business and Social Sciences, vol. 6(1), pages 164-173, January.
- Simon French, 2015. "Cynefin: uncertainty, small worlds and scenarios," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 66(10), pages 1635-1645, October.
- Masud, Abu S. M. & Metcalf, Paul & Hommertzheim, Don, 1995. "A knowledge-based model management system for aircraft survivability analysis," European Journal of Operational Research, Elsevier, vol. 84(1), pages 47-59, July.
- Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
- F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
- K Hausken & J Zhuang, 2012. "The timing and deterrence of terrorist attacks due to exogenous dynamics," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 726-735, June.
- Liao, Shu-hsien, 2000. "Case-based decision support system: Architecture for simulating military command and control," European Journal of Operational Research, Elsevier, vol. 123(3), pages 558-567, June.
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Afshan Naseem & Yasir Ahmad, 2020. "Critical Success Factors for Neutralization of Airborne Threats," SAGE Open, , vol. 10(3), pages 21582440209, September.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Afshan Naseem & Yasir Ahmad, 2020. "Critical Success Factors for Neutralization of Airborne Threats," SAGE Open, , vol. 10(3), pages 21582440209, September.
- Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
- Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
- Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
- Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
- Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
- Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
- Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
- Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
- Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
- Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
- Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.
- Assarzadegan, Parisa & Rasti-Barzoki, Morteza, 2020. "A game theoretic approach for pricing under a return policy and a money back guarantee in a closed loop supply chain," International Journal of Production Economics, Elsevier, vol. 222(C).
- Huihui Liu & Xiaohang Yue & Hui Ding & G. Keong Leong, 2017. "Optimal Remanufacturing Certification Contracts in the Electrical and Electronic Industry," Sustainability, MDPI, vol. 9(4), pages 1-17, March.
- Yang, Hui & Chen, Jing & Chen, Xu & Chen, Bintong, 2017. "The impact of customer returns in a supply chain with a common retailer," European Journal of Operational Research, Elsevier, vol. 256(1), pages 139-150.
- Bo Wang & Ning Wang, 2022. "Decision Models for a Dual-Recycling Channel Reverse Supply Chain with Consumer Strategic Behavior," Sustainability, MDPI, vol. 14(17), pages 1-18, August.
More about this item
Keywords
threat perception; evaluation; weapon assignment; stable marriage algorithm; threat index; supply chain; inventory;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pal:jorsoc:v:68:y:2017:i:6:d:10.1057_s41274-016-0139-6. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.palgrave-journals.com/ .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.