首页 | 本学科首页   官方微博 | 高级检索  
     


Weakest‐link attacker‐defender games with multiple attack technologies
Authors:Daniel G. Arce  Dan Kovenock  Brian Roberson
Affiliation:1. Department of Economics, University of Texas at Dallas, GR31, School of Economic, Political, and Policy Sciences, 800 W. Campbell Rd, Richardson, Texas 75080;2. Economic Science Institute, Argyros School of Business and Economics, Chapman University, One University Drive, Orange, California 92866;3. Department of Economics, Purdue University, Krannert School of Management, 403 W. State Street, West Lafayette, Indiana 47907
Abstract:In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist organization that has two qualitatively different attack modes at its disposal. The terrorist organization's objective is to successfully attack at least one target. Success for the target government is defined as defending all targets from any and all attacks. In this context, we examine how terrorist entities strategically utilize an efficient but discrete attack technology — e.g., suicide attacks — when a more conventional mode of attack is available, and the optimal anti‐terrorism measures.© 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012
Keywords:conflict  suicide terrorism  weakest link  colonel Blotto game
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号