首页 | 官方网站   微博 | 高级检索  
     


An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression
Authors:Eghbal Rashidi  Hugh Medal  Aaron Hoskins
Affiliation:1. Leavey School of Business, Santa Clara University, Santa Clara, California;2. Industrial and Systems Engineering, Mississippi State University, Starkville, Mississippi
Abstract:Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA.
Keywords:attacker‐defender model  critical infrastructure  initial attack  Stackelberg game  vulnerability assessment  wildfire management
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号