2017
DOI: 10.1287/deca.2017.0346
|View full text |Cite
|
Sign up to set email alerts
|

Modeling a Multitarget Attacker–Defender Game with Budget Constraints

Abstract: Though the choices of terrorists' attack targets are vast, their resources are limited. In this paper, a game-theoretical model is proposed to study both the defender's (government) and the attacker's (terrorist) expenditures among multiple targets under budget constraints to guide investment in defense. We study how the defender's and the attacker's equilibrium allocations depend on the budget constraints, target valuations, cost effectiveness of their investments, and inherent defense levels of targets in bo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
35
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 65 publications
(35 citation statements)
references
References 43 publications
0
35
0
Order By: Relevance
“…Therefore, appropriate resource allocations can greatly protect the defender from possible attacks, whereas improper decisions could lead to a waste of resources or even unprecedented damages to the defender's interest. Thus, knowing how to make the best use of resources is highly important, especially under circumstances of limited resources …”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, appropriate resource allocations can greatly protect the defender from possible attacks, whereas improper decisions could lead to a waste of resources or even unprecedented damages to the defender's interest. Thus, knowing how to make the best use of resources is highly important, especially under circumstances of limited resources …”
Section: Introductionmentioning
confidence: 99%
“…Thus, knowing how to make the best use of resources is highly important, especially under circumstances of limited resources. 2,3 To date, many researchers have addressed the attacker-defender game, where each player seeks to maximize a single objective function under certain constraints. Game theory and the concept of Nash equilibrium have been recognized as suitable tools for studying such strategy-interaction resource allocation problems for a long time.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…No matter whether an action is successful, the actor will incur some cost by taking the action. Recent studies about the effort of deterrence and risk preferences in the security games [11], [12] have analyzed the impact of risk preference on the defense effort and deterrence level, and the impact of defender's cost on the investment strategy. Meanwhile, statistics show that a large data center costs between $10 million and $25 million per year and the corresponding maintenance costs account for nearly 80% of its total cost [13].…”
Section: Introductionmentioning
confidence: 99%
“…Extensive studies have been conducted to investigate how false positives affect information security investment, security systems design, and security systems performance (e.g. Cavusoglu et al 2005, 2009, Ulvila and Gaffney 2004, Guan et al 2017, Salman et al 2014, Duan et al 2012.…”
Section: Introductionmentioning
confidence: 99%