A Two-Sided Optimization for Theater Ballistic Missile Defense
MetadataShow full item record
We describe JOINT DEFENDER, a new two-sided optimization model for planning the pre-positioning of defensive missile interceptors to counter an attack threat. In our basic model, a defender pre-positions ballistic missile defense platforms to minimize the worst-case damage an attacker can achieve; we assume that the attacker will be aware of defensive pre-positioning decisions, and that both sides have complete information as to target values, attacking-missile launch sites, weapon system capabilities, etc. Other model variants investigate the value of secrecy by restricting the attacker’s and/or defender’s access to information. For a realistic scenario, we can evaluate a completely transparent exchange in a few minutes on a laptop computer, and can plan near-optimal secret defenses in seconds. JOINT DEFENDER’s mathematical foundation and its computational efficiency complement current missile-defense planning tools that use heuristics or supercomputing. The model can also provide unique insight into the value of secrecy and deception to either side. We demonstrate with two hypothetical North Korean scenarios.
Operations Research, 53, pp. 263-275.Center for Infrastructure Defense (CID) Paper.
Showing items related by title, author, creator and subject.
Thomas, Adam J. (Monterey, California. Naval Postgraduate School, 2008-09);We develop the Game-Theoretic ASW Mission Planner (G-TAMP), an operational-level planning aid for the tasking of anti-submarine warfare (ASW) platforms to protect a high-value unit (HVU) from attack by hostile submarines ...
Brown, Gerald G.; Carlyle, Matthew; Diehl, Douglas; Kline, Jeffrey; Wood, Kevin (2005);We describe JOINT DEFENDER, a new two-sided optimization model for planning the pre-positioning of defensive missile interceptors to counter an attack threat. In our basic model, a defender pre-positions ballistic missile ...
Powell, Robert (2008-06);How much should a defender spend on defense and how should it allocate those resources across the sites it is trying to protect? This paper analyzes a model in which a defender first has to decide how much to spend on ...