36
Views
21
CrossRef citations to date
0
Altmetric
Theoretical Paper

Defence and attack of systems with variable attacker system structure detection probability

&
Pages 124-133 | Received 01 Jul 2008, Accepted 01 Nov 2008, Published online: 21 Dec 2017

References

  • AzaiezNBierVMPerfect aggregation for a class of general reliability models with Bayesian updatingAppl Math Comput199573281302
  • AzaiezNBierVMOptimal resource allocation for security in reliability systemsEur J Opl Res200718177378610.1016/j.ejor.2006.03.057
  • BierVMChallenges to the acceptance of probabilistic risk analysisRisk Anal199919703710
  • BierVMOn the state of the art: Risk communication to the publicReliability Eng System Safety20017113915010.1016/S0951-8320(00)00090-9
  • BierVMGame-theoretic and reliability methods in counter-terrorism and securityMathematical and Statistical Methods in Reliability: Series on Quality, Reliability and Engineering Statistics20051728
  • BierVMAbhichandaniVOptimal allocation of resources for defence of simple series and parallel systems from determined adversariesProceedings of the Engineering Foundation Conference on Risk-Based Decision Making in Water Resources X2002
  • BierVMNagarajAAbhichandaniVOptimal allocation of resources for defence of simple series and parallel systems from determined adversariesReliability Eng System Safety20058731332310.1016/j.ress.2004.06.003
  • BierVMOliverosSSamuelsonLChoosing what to protect: Strategic defence allocation against an unknown attackerJ Public Econ Theory20069456358710.1111/j.1467-9779.2007.00320.x
  • CarayonPKraemerSBierVMHuman factors issues in computer and e-business securityHandbook of Integrated Risk Management for E-Business: Measuring, Modeling and Managing Risk2005
  • DigheNZhuangJBierVMSecrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrenceInt J Performability Eng2009513143
  • HauskenKProduction and conflict models versus rent seeking modelsPublic Choice2005123599310.1007/s11127-005-1717-3
  • HauskenKLevitinGEfficiency of even separation of parallel elements with variable contest intensityRisk Analy20082851477148610.1111/j.1539-6924.2008.01090.x
  • HirshleiferJAnarchy and its breakdownJ Polit Econ19951031265210.1086/261974
  • LevitinGOptimal defence strategy against intentional attacksIEEE Trans Reliability200756114815610.1109/TR.2006.884599
  • LevitinGHauskenKProtection vs. redundancy in homogeneous parallel systemsReliability Eng Syst Safety200893101444145110.1016/j.ress.2007.10.007
  • LevitinGHauskenKFalse targets efficiency in defence strategyEur J Opl Res2009194115516210.1016/j.ejor.2007.11.060
  • PhimisterJRBierVMKunreutherHCAccident Precursor Analysis and Management: Reducing Technological Risk through Diligence2004
  • SkaperdasSContest success functionsEcon Theory1996728329010.1007/BF01213906
  • TullockGEfficient rent-seekingToward a Theory of the Rent-Seeking Society198097112
  • ZhuangJBierVMBalancing terrorism and natural disasters—defensive strategy with endogenous attacker effortOpns Res200755597699110.1287/opre.1070.0434

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.