This article introduces the subject of terrorism and counter-terrorism by means of a two-person bimatrix game that provides some insight into the behaviour of the two players. We then examine three important areas in counter-terrorism tasks: the detection of terrorist cells and how to render them inoperable, the fortification of assets in order to protect them from terrorist attacks and the optimal evacuation of people from an area affected by terrorism. Basic mathematical models are formulated and demonstrated. This article concludes with some thoughts on potential extensions of the models presented here
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic...
A simple Attacker-Defender interaction is analyzed, in which a single terrorist (denoted T) will pot...
This dissertation identifies factors that help explain the rationality of terrorist tactics. To be s...
The paper introduces the subject of terrorism and counterterrorism by means of a two-person bimatrix...
We will discuss the outcomes of a mathematical model of terrorism based on a system of equations. Th...
In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist or...
The strategic interplay between counterterror measures and terror activity is complex. Herein, we pr...
We develop a game-theoretic analysis of terrorism that examines the interaction between a terrorist ...
The quest to find a long-term solution to the world’s insecurity problems and perhaps, terrorism in ...
How can we tell if an Al Qaeda cell has been broken? That enough members have been captured or kille...
Terrorism and the proactive and reactive policies enacted to counter further terrorism incidents hav...
Although terrorism has been investigated by researchers for decades, not much research has gone into...
The analysis provides insights regarding the suitability of offensive versus defensive measures in c...
This paper deals dynamically with the question of how recruitment to terror organizations is influen...
National and local governments must continuously adapt counter-terrorism strategies to new and evol...
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic...
A simple Attacker-Defender interaction is analyzed, in which a single terrorist (denoted T) will pot...
This dissertation identifies factors that help explain the rationality of terrorist tactics. To be s...
The paper introduces the subject of terrorism and counterterrorism by means of a two-person bimatrix...
We will discuss the outcomes of a mathematical model of terrorism based on a system of equations. Th...
In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist or...
The strategic interplay between counterterror measures and terror activity is complex. Herein, we pr...
We develop a game-theoretic analysis of terrorism that examines the interaction between a terrorist ...
The quest to find a long-term solution to the world’s insecurity problems and perhaps, terrorism in ...
How can we tell if an Al Qaeda cell has been broken? That enough members have been captured or kille...
Terrorism and the proactive and reactive policies enacted to counter further terrorism incidents hav...
Although terrorism has been investigated by researchers for decades, not much research has gone into...
The analysis provides insights regarding the suitability of offensive versus defensive measures in c...
This paper deals dynamically with the question of how recruitment to terror organizations is influen...
National and local governments must continuously adapt counter-terrorism strategies to new and evol...
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic...
A simple Attacker-Defender interaction is analyzed, in which a single terrorist (denoted T) will pot...
This dissertation identifies factors that help explain the rationality of terrorist tactics. To be s...