Weakest-link attacker-defender games with multiple attack technologies

被引:33
|
作者
Arce, Daniel G. [2 ]
Kovenock, Dan [3 ]
Roberson, Brian [1 ]
机构
[1] Purdue Univ, Dept Econ, Krannert Sch Management, W Lafayette, IN 47907 USA
[2] Univ Texas Dallas, Dept Econ, Sch Econ Polit & Policy Sci, Richardson, TX 75080 USA
[3] Chapman Univ, Econ Sci Inst, Argyros Sch Business & Econ, Orange, CA 92866 USA
关键词
conflict; suicide terrorism; weakest link; colonel Blotto game; COLONEL-BLOTTO; TERRORISM; EQUILIBRIA; ALLOCATION; CHOPSTICKS; AUCTION;
D O I
10.1002/nav.21500
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist organization that has two qualitatively different attack modes at its disposal. The terrorist organization's objective is to successfully attack at least one target. Success for the target government is defined as defending all targets from any and all attacks. In this context, we examine how terrorist entities strategically utilize an efficient but discrete attack technology e.g., suicide attacks when a more conventional mode of attack is available, and the optimal anti-terrorism measures. (c) 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012
引用
收藏
页码:457 / 469
页数:13
相关论文
共 24 条
  • [1] A Review of Attacker-Defender Games and Cyber Security
    Hausken, Kjell
    Welburn, Jonathan W.
    Zhuang, Jun
    GAMES, 2024, 15 (04):
  • [2] An experimental analysis of risk effects in attacker-defender games
    Holt, Charles A.
    Sahu, Ricky
    Smith, Angela M.
    SOUTHERN ECONOMIC JOURNAL, 2022, 89 (01) : 185 - 215
  • [3] Modeling a multi-target attacker-defender game with multiple attack types
    Zhang, Jing
    Zhuang, Jun
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2019, 185 : 465 - 475
  • [4] Institution formation in weakest-link games
    Caparros, Alejandro
    Blanco, Esther
    Finus, Michael
    JOURNAL OF ECONOMIC BEHAVIOR & ORGANIZATION, 2025, 233
  • [5] The attack and defense of weakest-link networks
    Dan Kovenock
    Brian Roberson
    Roman M. Sheremeta
    Public Choice, 2019, 179 : 175 - 194
  • [6] Efficient Coordination in Weakest-Link Games
    Riedl, Arno
    Rohde, Ingrid M. T.
    Strobel, Martin
    REVIEW OF ECONOMIC STUDIES, 2016, 83 (02): : 737 - 767
  • [7] Technology Adoption, Accumulation, and Competition in Multiperiod Attacker-Defender Games
    Jose, Victor Richmond R.
    Zhuang, Jun
    MILITARY OPERATIONS RESEARCH, 2013, 18 (02) : 33 - +
  • [8] The attack and defense of weakest-link networks
    Kovenock, Dan
    Roberson, Brian
    Sheremeta, Roman M.
    PUBLIC CHOICE, 2019, 179 (3-4) : 175 - 194
  • [9] Weighted automata on infinite words in the context of Attacker-Defender games
    Halava, V.
    Harju, T.
    Niskanen, R.
    Potapov, I.
    INFORMATION AND COMPUTATION, 2017, 255 : 27 - 44
  • [10] A Bilevel “Attacker-Defender” Model to Choosing the Composition of Attack Means
    Beresnev V.L.
    Melnikov A.A.
    Journal of Applied and Industrial Mathematics, 2019, 13 (04) : 612 - 622