Understanding Terror Networks
Artificial War: Multiagent-Based Simulation of Combat
Artificial War: Multiagent-Based Simulation of Combat
MASON: A Multiagent Simulation Environment
Simulation
Honesty and trust revisited: the advantages of being neutral about other's cognitive models
Autonomous Agents and Multi-Agent Systems
IJCAI'77 Proceedings of the 5th international joint conference on Artificial intelligence - Volume 2
Simulating working environments through the use of personality-based agents
IBERAMIA-SBIA'06 Proceedings of the 2nd international joint conference, and Proceedings of the 10th Ibero-American Conference on AI 18th Brazilian conference on Advances in Artificial Intelligence
Hi-index | 0.00 |
In this paper, we focus on computational modeling of adversarial activities and asymmetric warfare in a tactical setting. As a topic for simulation study, asymmetric warfare is an odd and ill-conditioned problem. Empirical data is scarce or one-sided, while the subject itself presents a constantly adapting and moving target that makes it a strategic priority to conceal its inner workings from the observers. To provide an insight into the dynamics of the asymmetric conflicts, one needs to constrain the model in rigorous social-scientific concepts, including those of organization theory, theory of collective action, and social network analysis. Our model, called NetMason, enables controlled experiments to replicate and analyze alternative policies of disruption of activities of terrorist organizations. In addition, sensitivity analysis with respect to behavioral assumptions can be easily performed.