Network Optimization Models for Resource Allocations in Developing Military Countermeasures
Rothblum, Uriel G.
MetadataShow full item record
A military arms race is characterized by an iterative development of measures and countermeasures. An attacker attempts to introduce new weapons in order to gain some advantage. whereas a defender attempts to develop countermeasures that can mitigate or even eliminate the effects of the weapons. This paper addresses the defender's decision problem: given limited resources, which countermeasures should be developed and how much should be invested in their development to minimize the damge caused by the attacker's weapos over a certain time horizon. We formulate several optimization models, corresponding to different operational settings, as sonstrained shortest-path problems and variants thereof. We then demonstrate the potential applicability and robusteness of this apporach with respect to various scenarios.
Operations Research, V. 60, No. 1, pp 48-63.http://dx.doi.org/10.1287/opre.1110.1002
Showing items related by title, author, creator and subject.
Garcia, J.B.; von Winterfeldt, Detlof (2016-04);We propose a methodology, called defender–attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game‐theoretic formulations of this problem, ...
Howse, Christopher E. (Monterey, California. Naval Postgraduate School, 2002-09);Weightlessness is the major contributing factor behind the degradation of bone mass, muscle tone, and aerobic capacity during long-term space missions. With the loss of bone mass progressing at up to two percent per month, ...
Phase I report on intelligent software decoys: technical feasibility and institutional issues in the context of homeland security Michael, James Bret; Rowe, Neil C.; Rothstein, Hy; Auguston, Mikhail; Drusinsky, Doron; Riehle, Richard (Monterey, California. Naval Postgraduate School, 2002-12-10); NPS-CS-03-001The purpose of this project is to explore the technical feasibility and institutional issues associated with applying software-based deception techniques as part of Homeland defense. At present, we refer to the embodiment ...