Network optimization models for resource allocation in developing military countermeasures
Rothblum, Uriel G.
MetadataShow full item record
A military arms race is characterized by an iterative development of measures and countermeasures. An attacker attempts to introduce new weapons in order to gain some advantage, whereas a defender attempts to develop countermeasures that can mitigate or even eliminate the effects of the weapons. This paper addresses the the defender's decision problem: given limited resources, which countermeasures should be developed and how much should be invested in their development to minimize the damage caused by the attacker's weapons over a certain time horizon. We formulate several optimization models, corresponding to different operational settings, as constrained shortest-path problems and variants thereof. We then demonstrate the potential applicability and robustness of this approach with respect to various scenarios.
The article of record as published may be found at: http://dx.doi.org/10.1287/opre.1110.1002
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Garcia, J.B.; von Winterfeldt, Detlof (2016-04);We propose a methodology, called defender–attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game‐theoretic formulations of this problem, ...
Howse, Christopher E. (Monterey, California. Naval Postgraduate School, 2002-09);Weightlessness is the major contributing factor behind the degradation of bone mass, muscle tone, and aerobic capacity during long-term space missions. With the loss of bone mass progressing at up to two percent per month, ...
Park, Ji Min (Monterey, California: Naval Postgraduate School, 2015-12);There can be hostile relations between nations that are divided politically or ideologically, and there are threats in cyberspace as well as physical space. Although every cyber threat, like a physical threat, has ...