Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
نویسندگان
چکیده
Many models have been developed to study homeland security games between governments (defender) and terrorists (attacker, adversary, enemy), with the limiting assumption of the terrorists being rational or strategic. In this paper, we develop a novel hybrid model in which a centralized government allocates defensive resources among multiple potential targets to minimize total expected loss, in the face of a terrorist being either strategic or non-strategic. The attack probabilities of a strategic terrorist are endogenously determined in the model, while the attack probabilities of a non-strategic terrorist are exogenously provided. We study the robustness of defensive resource allocations by comparing the government’s total expected losses when: (a) the government knows the probability that the terrorist is strategic; (b) the government falsely believes that the terrorist is fully strategic, when the terrorist could be non-strategic; and (c) the government falsely believes that the terrorist is fully non-strategic, when the terrorist could be strategic. Besides providing six theorems to highlight the general results, we find that game models are generally preferred to non-game model even when the probability of a non-strategic terrorist is significantly greater than 50%. We conclude that defensive resource allocations based on game-theoretic models would not incur too much additional expected loss and thus more preferred, as compared to non-game-theoretic models. ! 2013 Elsevier B.V. All rights reserved.
منابع مشابه
TO Hybrid Defensive Resource Allocations in the Face of Partially Strategic Attackers in a Sequential
convex in c, since the linear combination of the continuous and strictly convex functions pi(ci)xi’s is continuous and strictly convex. Finally, the summation of the two continuous and strictly convex functions is continuous and strictly convex. Remarks: Note that we assume that the defender and the attacker have the same target valuations xi’s. If that does not hold, the objective function as ...
متن کاملTarget-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility
W e present a game-theoretic model to explore how uncertainty about terrorist preferences can affect optimal resource allocations for infrastructure protection. We consider a dynamic game with incomplete information , in which the defender chooses how to allocate her defensive resources, and then an attacker chooses which target to attack according to a multiattribute utility function. Our mode...
متن کاملRobust allocation of a defensive budget considering an attacker's private information.
Attackers' private information is one of the main issues in defensive resource allocation games in homeland security. The outcome of a defense resource allocation decision critically depends on the accuracy of estimations about the attacker's attributes. However, terrorists' goals may be unknown to the defender, necessitating robust decisions by the defender. This article develops a robust-opti...
متن کاملSequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack
The strategic allocation of resources across multiple fronts has long been studied in the context of Blotto games in which two players simultaneously select their allocations. But many allocation problems are sequential. For example, a state trying to defend against a terrorist attack generally allocates some or all of its resources before the attacker decides where to strike. This paper studie...
متن کاملSecrecy and Deception in Anti-Terrorism Resource Allocation and Policy Implication
In this paper, we develop a game-theoretic model for whether and what a defender should disclose about her resource allocation in the homeland-security context. Our model allows us to explore whether the defender should disclose correct information about her defensive resource allocation (truthful disclosure), incorrect information (deception), or no information (secrecy). In the case where onl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- European Journal of Operational Research
دوره 228 شماره
صفحات -
تاریخ انتشار 2013