Show simple item record

dc.contributor.authorBrown, G.
dc.contributor.authorCarlyle, W.M.
dc.contributor.authorSalmeron, J.
dc.contributor.authorWood, K.
dc.date2005
dc.date.accessioned2013-09-25T23:03:08Z
dc.date.available2013-09-25T23:03:08Z
dc.date.issued2005
dc.identifier.citationBrown, G., Carlyle, W.M., Salmeron, J. and Wood, K., 2005, “Analyzing the Vulnerability of Critical Infrastructure to Attack, and Planning Defenses,” in Tutorials in Operations Research: Emerging Theory, Methods, and Applications, H. Greenberg and J. Smith, eds., Institute for Operations Research and Management Science, Hanover, MD.
dc.identifier.urihttp://hdl.handle.net/10945/36718
dc.descriptionThe article of record as published may be located at http://dx.doi.org//10.1287/inte.1060.0252en_US
dc.description.abstractWe describe new bilevel programming models to (1) help make the country’s critical infrastructure more resilient to attacks by terrorists, (2) help governments and businesses plan those improvements, and (3) help influence related public policy on investment incentives, regulations, etc. An intelligent attacker (terrorists) and defender (us) are key features of all these models, along with information transparency: These are Stackelberg games, as opposed to two-person, zero-sum games. We illustrate these models with applications to electric power grids, subways, airports, and other critical infrastructure. For instance, one model identifies locations for a given set of electronic sensors that minimize the worst-case time to detection of a chemical, biological, or radiological contaminant introduced into the Washington, D.C. subway system. The paper concludes by reporting insights we have gained through forming “red teams,” each of which gathers open-source data on a real-world system, develops an appro- priate attacker-defender or defender-attacker model, and solves the model to identify vulnerabilities in the system or to plan an optimal defense.en_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleAnalyzing the Vulnerability of Critical Infrastructure to Attack, and Planning Defensesen_US
dc.contributor.departmentDepartment of Operations Research
dc.subject.authorNetwork Interdiction and Attacker-Defender Modelingen_US
dc.subject.authorcritical infrastructure protectionen_US
dc.subject.authorbilevel programen_US
dc.subject.authormixed-integer programen_US
dc.subject.authorhomeland securityen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record