This paper concerns merchant shipping security and proposes a game theory framework for modelling terrorism threats and counteractions. First, the security considerations associated with merchant shipping in the post 9/11 era are reviewed, as well as the main current issues in maritime security, and the approaches developed in the academic literature. It is argued that game theory is suitable to address such security issues and its contributions to counter-terrorism in other security settings are reviewed. The purpose is to identify the relevance to merchant shipping security of concepts and insights developed in other security settings, and then accordingly apply them to the former. In this context, such a game theoretic model is applied t...
Security is one of the main concerns in current telecommunication net- works: the service providers ...
Security is one of the main concerns in current telecommunication net- works: the service providers ...
The last twenty years have brought numerous enhancements in technologies for Critical Infrastructure...
The modeling tools that have been developed over the last 25 years for the identification of routes ...
For so many decades, maritime transportation represented the backbone of global trade and has always...
While three deployed applications of game theory for securi-ty have recently been reported, we as a ...
While three deployed applications of game theory for security have recently been reported, we as a c...
For so many decades, maritime transportation represented the backbone of global trade and has always...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
Airports are attractive targets for terrorists, as they are designed to accommodate and process larg...
Abstract While three deployed applications of game theory for security have re-cently been reported ...
© Springer International Publishing Switzerland 2015. Until twenty years ago, the application of gam...
mmpPDFResearch Paperhttp://ntl.bts.gov/lib/23000/23700/23730/4375896.pdfTerrorismMaritime safetyOcea...
The impact of the September 11, 2001, attack by Al Qaeda was felt worldwide with increased security ...
The concept of maritime security has changed dramatically over the years. For centuries it was limit...
Security is one of the main concerns in current telecommunication net- works: the service providers ...
Security is one of the main concerns in current telecommunication net- works: the service providers ...
The last twenty years have brought numerous enhancements in technologies for Critical Infrastructure...
The modeling tools that have been developed over the last 25 years for the identification of routes ...
For so many decades, maritime transportation represented the backbone of global trade and has always...
While three deployed applications of game theory for securi-ty have recently been reported, we as a ...
While three deployed applications of game theory for security have recently been reported, we as a c...
For so many decades, maritime transportation represented the backbone of global trade and has always...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
Airports are attractive targets for terrorists, as they are designed to accommodate and process larg...
Abstract While three deployed applications of game theory for security have re-cently been reported ...
© Springer International Publishing Switzerland 2015. Until twenty years ago, the application of gam...
mmpPDFResearch Paperhttp://ntl.bts.gov/lib/23000/23700/23730/4375896.pdfTerrorismMaritime safetyOcea...
The impact of the September 11, 2001, attack by Al Qaeda was felt worldwide with increased security ...
The concept of maritime security has changed dramatically over the years. For centuries it was limit...
Security is one of the main concerns in current telecommunication net- works: the service providers ...
Security is one of the main concerns in current telecommunication net- works: the service providers ...
The last twenty years have brought numerous enhancements in technologies for Critical Infrastructure...