The optimum use of antiballistic missiles for point target defense.
Krumm, LeRoy George
MetadataShow full item record
This thesis is concerned with developing an optimal launching schedule for ABM's deployed for defense of a number of point targets, i.e. an ICBM complex. Let the attack occur in N stages with an offensive strategy of saturation. A dynamic programming model is developed for formulating the problem and a linear programming model is used in its solution. Equations are developed for determining the optimal number of ABM's to launch on each stage of the attack so as to maximize the expected number of silos surviving. Multivalued point target defense is discussed and formulated but no specific solutions are offered. The ABM system (including radars, computers, etc.) is not considered subject to attack. Some discussion of this aspect of the problem is offered. Single ABM launchings per re-entry vehicle are assumed. A test is developed to determine for what parameters single launchings are preferred over multiple launchings, under the assumptions of the attack.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Israeli, Eitan (Monterey, California. Naval Postgraduate School, 1999-03);We study the problem of interdicting components of an adversary's system, e.g., a war-time economy, a transportation network, etc. Basic techniques are developed and illustrated with a simple network interdiction problem, ...
Schwartz, Victor Scott (Monterey, California. Naval Postgraduate School, 1998-09-01);A dynamic platform-independent solver is developed for use with network and graph algorithms of operations research. This solver allows analysts to solve a large variety of problems without writing code. Algorithms from a ...
Klaus, Christian (Monterey, California: Naval Postgraduate School, 2014-03);We define and solve two network-design problems. In the first, (1) a defender uses limited resources to select a portfolio of paths or design a sub-network; (2) an attacker then uses limited attack resources to destroy ...