389
Views
10
CrossRef citations to date
0
Altmetric
Articles

Bayesian Stackelberg game model for water supply networks against interdictions with mixed strategies

&
Pages 2537-2557 | Received 14 Jun 2019, Accepted 07 Nov 2019, Published online: 24 Mar 2020

References

  • Bashi-Azghadi, S. N., A. Afshar, and M. H. Afshar. 2018. “Multi-Period Response Management to Contaminated Water Distribution Networks: Dynamic Programming Versus Genetic Algorithms.” Engineering Optimization 50 (3): 415–429. doi: 10.1080/0305215X.2017.1318871
  • Bier, V. M., N. Haphuriwat, J. Menoyo, R. Zimmerman, and A. M. Culpen. 2008. “Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness.” Risk Analysis 28 (3): 763–770. doi: 10.1111/j.1539-6924.2008.01053.x
  • Brown, G., M. Carlyle, D. Diehl, J. Kline, and K. Wood. 2005. “A Two-Sided Optimization for Theater Ballistic Missile Defense.” Operations Research 53 (5): 745–763. doi: 10.1287/opre.1050.0231
  • Brown, G., M. Carlyle, J. Salmerón, and K. Wood. 2006. “Defending Critical Infrastructure.” Interfaces 36 (6): 530–544. doi: 10.1287/inte.1060.0252
  • Conitzer, V., and T. Sandholm. 2006. “Computing the Optimal Strategy to Commit to.” Proceedings of the 7th ACM Conference on Electronic Commerce, 82–90, Ann Arbor, Michigan. ACM.
  • Dighe, N. S., J. Zhuang, and V. M. Bier. 2009. “Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effective Attacker Detterrence.” International Journal of Performability Engineering 5 (1): 31–43.
  • Han, Y., and Y. Deng. 2019. “A Novel Matrix Game with Payoffs of Maxitive Belief Structure.” International Journal of Intelligent Systems 34 (4): 690–706. doi: 10.1002/int.22072
  • Han, Y., Y. Deng, Z. Cao, and C.-T. Lin. 2019. “An Interval-Valued Pythagorean Prioritized Operator-Based Game Theoretical Framework with its Applications in Multicriteria Group Decision Making.” Neural Computing and Applications 1–19.
  • Hosseini, S., D. Ivanov, and A. Dolgui. 2019. “Review of Quantitative Methods for Supply Chain Resilience Analysis.” Transportation Research Part E: Logistics and Transportation Review 125: 285–307. doi: 10.1016/j.tre.2019.03.001
  • Ivanov, D., and A. Dolgui. 2019. “Low-Certainty-Need (LCN) Supply Chains: A New Perspective in Managing Disruption Risks and Resilience.” International Journal of Production Research 57 (15–16): 5119–5136. doi: 10.1080/00207543.2018.1521025
  • Ivanov, D., A. Dolgui, B. Sokolov, and M. Ivanova. 2017. “Literature Review on Disruption Recovery in the Supply Chain.” International Journal of Production Research 55 (20): 6158–6174. doi: 10.1080/00207543.2017.1330572
  • Jain, M., C. Kiekintveld, and M. Tambe. 2011. “Quality-Bounded Solutions for Finite Bayesian Stackelberg Games: Scaling up.” The 10th International Conference on Autonomous Agents and Multiagent Systems, Vol. 3, 997–1004, Taipei, Taiwan. International Foundation for Autonomous Agents and Multiagent Systems.
  • Jenelius, E., J. Westin, and Å. J. Holmgren. 2010. “Critical Infrastructure Protection Under Imperfect Attacker Perception.” International Journal of Critical Infrastructure Protection 3 (1): 16–26. doi: 10.1016/j.ijcip.2009.10.002
  • Jiang, J., and X. Liu. 2018. “Multi-Objective Stackelberg Game Model for Water Supply Networks Against Interdictions with Incomplete Information.” European Journal of Operational Research 266 (3): 920–933. doi: 10.1016/j.ejor.2017.10.034
  • Liberatore, F., M. P. Scaparra, and M. S. Daskin. 2011. “Analysis of Facility Protection Strategies Against an Uncertain Number of Attacks: The Stochastic R-Interdiction Median Problem with Fortification.” Computers & Operations Research 38 (1): 357–366. doi: 10.1016/j.cor.2010.06.002
  • National Institute For Hometown Security. 2018. “Water Distribution System Operation.” http://www.uky.edu/WDST/SystemPages/43System_Page_ZJNetwork.html.
  • Nikoofal, M. E., and M. Gümüs. 2015. “On the Value of Terrorist's Private Information in a Government's Defensive Resource Allocation Problem.” IIE Transactions 47 (6): 533–555. doi: 10.1080/0740817X.2014.938844
  • Nikoofal, M. E., and J. Zhuang. 2012. “Robust Allocation of a Defensive Budget Considering an Attacker's Private Information.” Risk Analysis 32 (5): 930–943. doi: 10.1111/j.1539-6924.2011.01702.x
  • Nikoofal, M. E., and J. Zhuang. 2015. “On the Value of Exposure and Secrecy of Defense System: First-Mover Advantage vs. Robustness.” European Journal of Operational Research 246 (1): 320–330. doi: 10.1016/j.ejor.2015.04.043
  • Ouyang, M., M. Xu, C. Zhang, and S. Huang. 2017. “Mitigating Electric Power System Vulnerability to Worst-Case Spatially Localized Attacks.” Reliability Engineering & System Safety 165: 144–154. doi: 10.1016/j.ress.2017.03.031
  • Paruchuri, P., J. P. Pearce, J. Marecki, M. Tambe, F. Ordonez, and S. Kraus. 2008. “Playing Games for Security: An Efficient Exact Algorithm for Solving Bayesian Stackelberg Games.” Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, Vol. 2, 895–902, Estoril, Portugal. International Foundation for Autonomous Agents and Multiagent Systems.
  • Payappalli, V. M., J. Zhuang, and V. R. R. Jose. 2017. “Deterrence and Risk Preferences in Sequential Attacker – Defender Games with Continuous Efforts.” Risk Analysis 37 (11): 2229–2245. doi: 10.1111/risa.12768
  • Qiao, J., D. Jeong, M. Lawley, J.-P. P. Richard, D. M. Abraham, and Y. Yih. 2007. “Allocating Security Resources to a Water Supply Network.” IIE Transactions 39 (1): 95–109. doi: 10.1080/07408170600865400
  • Starita, S., and M. P. Scaparra. 2016. “Optimizing Dynamic Investment Decisions for Railway Systems Protection.” European Journal of Operational Research 248 (2): 543–557. doi: 10.1016/j.ejor.2015.07.025
  • Verleye, D., and E.-H. Aghezzaf. 2013. “Optimising Production and Distribution Operations in Large Water Supply Networks: A Piecewise Linear Optimisation Approach.” International Journal of Production Research 51 (23–24): 7170–7189. doi: 10.1080/00207543.2013.850550
  • Yin, Z., and M. Tambe. 2012. “A Unified Method for Handling Discrete and Continuous Uncertainty in Bayesian Stackelberg Games.” Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, Vol. 2, 855–862, Valencia, Spain. International Foundation for Autonomous Agents and Multiagent Systems.
  • Zhang, C., and J. E. Ramirez-Marquez. 2013. “Protecting Critical Infrastructures Against Intentional Attacks: A Two-Stage Game with Incomplete Information.” IIE Transactions 45 (3): 244–258. doi: 10.1080/0740817X.2012.676749
  • Zhang, C., J. E. Ramirez-Marquez, and Q. Li. 2018. “Locating and Protecting Facilities From Intentional Attacks Using Secrecy.” Reliability Engineering & System Safety 169: 51–62. doi: 10.1016/j.ress.2017.08.005
  • Zhang, C., J. E. Ramirez-Marquez, and J. Wang. 2015. “Critical Infrastructure Protection Using Secrecy – A Discrete Simultaneous Game.” European Journal of Operational Research 242 (1): 212–221. doi: 10.1016/j.ejor.2014.10.001
  • Zhang, J., J. Zhuang, and V. R. R. Jose. 2018. “The Role of Risk Preferences in a Multi-Target Defender-Attacker Resource Allocation Game.” Reliability Engineering & System Safety 169: 95–104. doi: 10.1016/j.ress.2017.08.002
  • Zhuang, J., and V. M. Bier. 2007. “Balancing Terrorism and Natural Disasters: Defensive Strategy with Endogenous Attacker Effort.” Operations Research 55 (5): 976–991. doi: 10.1287/opre.1070.0434
  • Zhuang, J., and V. M. Bier. 2011. “Secrecy and Deception at Equilibrium, with Applications to Anti-Terrorism Resource Allocation.” Defence and Peace Economics 22 (1): 43–61. doi: 10.1080/10242694.2010.491668
  • Zhuang, J., V. M. Bier, and O. Alagoz. 2010. “Modeling Secrecy and Deception in a Multiple-Period Attacker – Defender Signaling Game.” European Journal of Operational Research 203 (2): 409–418. doi: 10.1016/j.ejor.2009.07.028

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.