The weapon-target assignment problem

A Kline, D Ahner, R Hill - Computers & Operations Research, 2019 - Elsevier
Abstract Research addressing the Weapon Target Assignment (WTA) Problem, the problem
of assigning weapons to targets while considering their effective probability of kill, began …

[HTML][HTML] A review of attacker-defender games: Current state and paths forward

K Hunt, J Zhuang - European Journal of Operational Research, 2024 - Elsevier
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …

Disaster management from a POM perspective: Mapping a new domain

S Gupta, MK Starr, RZ Farahani… - Production and …, 2016 - journals.sagepub.com
We have reviewed disaster management research papers published in major operations
management, management science, operations research, supply chain management and …

Game theory meets wireless sensor networks security requirements and threats mitigation: A survey

MS Abdalzaher, K Seddik, M Elsabrouty, O Muta… - Sensors, 2016 - mdpi.com
We present a study of using game theory for protecting wireless sensor networks (WSNs)
from selfish behavior or malicious nodes. Due to scalability, low complexity and …

Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications

RA Konrad, AC Trapp, TM Palmbach… - European Journal of …, 2017 - Elsevier
Human trafficking is a complex transnational problem for society and the global economy.
While researchers have studied this topic in a variety of contexts, including the criminology …

Cybersecurity investments in the supply chain: Coordination and a strategic attacker

J Simon, A Omar - European Journal of Operational Research, 2020 - Elsevier
Cybersecurity poses a difficult challenge to supply chains, as a firm may be affected by an
attack on another firm in the supply chain. For example, a retailer's consumer data might be …

Restoration resource allocation model for enhancing resilience of interdependent infrastructure systems

C Zhang, J Kong, SP Simonovic - Safety science, 2018 - Elsevier
Enhancing the resilience of infrastructure systems is critical to the sustainability of the society
against multiple disruptive events. This paper develops an approach for allocating …

Modeling a multitarget attacker–defender game with budget constraints

P Guan, M He, J Zhuang, SC Hora - Decision Analysis, 2017 - pubsonline.informs.org
Though the choices of terrorists' attack targets are vast, their resources are limited. In this
paper, a game-theoretical model is proposed to study both the defender's (government) and …

Allocation of defensive and restorative resources in electric power system against consecutive multi-target attacks

Y Wu, Z Chen, J Dang, Y Chen, X Zhao… - Reliability Engineering & …, 2022 - Elsevier
Because the infrastructure network itself has the characteristics of cascading failures,
deliberate attackers will often take advantage of these internal dependencies to perform …

Modeling multi-target defender-attacker games with quantal response attack strategies

J Zhang, Y Wang, J Zhuang - Reliability Engineering & System Safety, 2021 - Elsevier
Due to the growing interest in incorporating behavioral models within the defender-attacker
game literature, the perfect rationality assumption of adversaries has been relaxed in many …