The article of record as published may be located at http://dx.doi.org//10.1287/inte.1060.0252We describe new bilevel programming models to (1) help make the country’s critical infrastructure more resilient to attacks by terrorists, (2) help governments and businesses plan those improvements, and (3) help influence related public policy on investment incentives, regulations, etc. An intelligent attacker (terrorists) and defender (us) are key features of all these models, along with information transparency: These are Stackelberg games, as opposed to two-person, zero-sum games. We illustrate these models with applications to electric power grids, subways, airports, and other critical infrastructure. For instance, one model identifies locatio...
Abstract—We describe new analytical techniques to help mitigate the disruptions to electric power gr...
Increasingly, our critical infrastructure is managed and controlled by computers and the information...
Reissued 27 Sep 2018 to reflect updated abstract on pages i and v.Cyberattacks against critical infr...
Abstract We describe new bilevel programming models to (1) help make the country’s criti-cal infrast...
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient...
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient...
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient...
Abstract This paper (a) describes a defender-attacker-defender sequential game model (DAD) to plan d...
IEEE Transactions on Power Systems, 19, pp. 905‐912.The article of record as published may be locate...
Security is a critical concern around the world, whether it is the challenge of protecting ports, ai...
2013-07-28Protecting critical infrastructure and targets such as airports, transportation networks, ...
This article appeared in Homeland Security Affairs (August 2012), v.8, article 12"We propose a defin...
Passenger rail systems continue to be a prime target for terrorists. Since 1995, there have been hun...
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that...
The paper introduces the subject of terrorism and counterterrorism by means of a two-person bimatrix...
Abstract—We describe new analytical techniques to help mitigate the disruptions to electric power gr...
Increasingly, our critical infrastructure is managed and controlled by computers and the information...
Reissued 27 Sep 2018 to reflect updated abstract on pages i and v.Cyberattacks against critical infr...
Abstract We describe new bilevel programming models to (1) help make the country’s criti-cal infrast...
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient...
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient...
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient...
Abstract This paper (a) describes a defender-attacker-defender sequential game model (DAD) to plan d...
IEEE Transactions on Power Systems, 19, pp. 905‐912.The article of record as published may be locate...
Security is a critical concern around the world, whether it is the challenge of protecting ports, ai...
2013-07-28Protecting critical infrastructure and targets such as airports, transportation networks, ...
This article appeared in Homeland Security Affairs (August 2012), v.8, article 12"We propose a defin...
Passenger rail systems continue to be a prime target for terrorists. Since 1995, there have been hun...
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that...
The paper introduces the subject of terrorism and counterterrorism by means of a two-person bimatrix...
Abstract—We describe new analytical techniques to help mitigate the disruptions to electric power gr...
Increasingly, our critical infrastructure is managed and controlled by computers and the information...
Reissued 27 Sep 2018 to reflect updated abstract on pages i and v.Cyberattacks against critical infr...