Network optimization models for resource allocation in developing military countermeasures
Rothblum, Uriel G.
MetadataShow full item record
A military arms race is characterized by an iterative development of measures and countermeasures. An attacker attempts to introduce new weapons in order to gain some advantage, whereas a defender attempts to develop countermeasures that can mitigate or even eliminate the effects of the weapons. This paper addresses the the defender's decision problem: given limited resources, which countermeasures should be developed and how much should be invested in their development to minimize the damage caused by the attacker's weapons over a certain time horizon. We formulate several optimization models, corresponding to different operational settings, as constrained shortest-path problems and variants thereof. We then demonstrate the potential applicability and robustness of this approach with respect to various scenarios.
The article of record as published may be found at: http://dx.doi.org/10.1287/opre.1110.1002
Showing items related by title, author, creator and subject.
Howse, Christopher E. (Monterey, California. Naval Postgraduate School, 2002-09);Weightlessness is the major contributing factor behind the degradation of bone mass, muscle tone, and aerobic capacity during long-term space missions. With the loss of bone mass progressing at up to two percent per month, ...
Mobile sensor networks a discrete event simulation of WMD threat detection in urban traffic schemes Hyink, Jeffrey F. (Monterey, California. Naval Postgraduate School, 2007-03);The rise of the threat of WMD attack on American soil necessitates new and innovative approaches to homeland security. A layered security model has been proposed in which an attacker must successfully penetrate multiple ...
Park, Ji Min (Monterey, California: Naval Postgraduate School, 2015-12);There can be hostile relations between nations that are divided politically or ideologically, and there are threats in cyberspace as well as physical space. Although every cyber threat, like a physical threat, has ...