The mixed integer linear bilevel programming problem
Operations Research
Stochastic Network Interdiction
Operations Research
A Two-Sided Optimization for Theater Ballistic Missile Defense
Operations Research
Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems: industrial track
Coordinating randomized policies for increasing security of agent systems
Information Technology and Management
Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Interdicting a Nuclear-Weapons Project
Operations Research
Efficient algorithms to solve Bayesian Stackelberg games for security applications
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 3
Adversarial Risk Analysis: Applications to Basic Counterterrorism Models
ADT '09 Proceedings of the 1st International Conference on Algorithmic Decision Theory
A modeling and aggregation approach for analyzing resilience of manufacturing enterprises
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Confronting Entrenched Insurgents
Operations Research
A Dynamic Network Interdiction Problem
Informatica
Optimal Allocation of Protective Resources in Shortest-Path Networks
Transportation Science
Optimal Allocation of Protective Resources in Shortest-Path Networks
Transportation Science
Governments' and Terrorists' Defense and Attack in a T-Period Game
Decision Analysis
Critical infrastructure protection: The vulnerability conundrum
Telematics and Informatics
A constrained binary knapsack approximation for shortest path network interdiction
Computers and Industrial Engineering
Operations Research
Adversarial Risk Analysis: The Somali Pirates Case
Decision Analysis
Operations Research Letters
Resource Allocation for Homeland Defense: Dealing with the Team Effect
Decision Analysis
Computers and Operations Research
A cutting-plane algorithm for solving a weighted influence interdiction problem
Computational Optimization and Applications
Protection issues for supply systems involving random attacks
Computers and Operations Research
Hi-index | 0.00 |
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions by attacker and defender. We illustrate with examples of the US Strategic Petroleum Reserve, the US Border Patrol at Yuma, Arizona, and an electrical transmission system. We conclude by reporting insights gained from the modeling experience and many “red-team” exercises. Each exercise gathers open-source data on a real-world infrastructure system, develops an appropriate bilevel or trilevel model, and uses these to identify vulnerabilities in the system or to plan an optimal defense.