A multi-UAV deployment method for border patrolling based on Stackelberg game

X Lei, X Hu, G Wang, H Luo - Journal of Systems Engineering …, 2023 - ieeexplore.ieee.org
To strengthen border patrol measures, unmanned aerial vehicles (UAVs) are gradually used
in many countries to detect illegal entries on borders. However, how to efficiently deploy …

Strategic training and exercises for critical infrastructure protection and resilience: A transition from lessons learned to effective curricula

P Gromek - International Journal of Disaster Risk Reduction, 2021 - Elsevier
Research objective To identify issues which make strategic trainings and exercises for
critical infrastructure protection and resilience specific and to use them to formulate relevant …

Two-stage invest–defend game: Balancing strategic and operational decisions

A Yolmeh, M Baykal-Gürsoy - Decision Analysis, 2019 - pubsonline.informs.org
Protecting infrastructures and their users against terrorist attacks involves making both
strategic and operational decisions in an organization's hierarchy. Although usually …

Направление реформирования системы обеспечения транспортной безопасности в Российской Федерации

АВ Швецов, АС Балалаев, СВ Швецова - Проблемы безопасности и …, 2018 - elibrary.ru
Вопрос обеспечения транспортной безопасности за последние два десятилетия
значительно обострился. Это обусловлено общим ростом террористической угрозы в …

A risk-averse inventory-based supply chain protection problem with adapted stochastic measures under intentional facility disruptions: Decomposition and hybrid …

S Jalali, M Seifbarghy… - Journal of Optimization in …, 2020 - jie.qazvin.iau.ir
Owing to rising intentional events, supply chain disruptions have been considered by setting
up a game between two players, namely, a designer and an interdictor contesting on …

Game Theory Applications in Security

A Yolmeh - 2021 - search.proquest.com
In this dissertation, we study the applications of game theory in determining protection
strategies for various infrastructures. The game models are played between a defender …

Playing repeated security games with multiple attacker types: a q-iteration on a linear programming approach

L Chen, M Li, Y Jie - Journal of Control and Decision, 2021 - Taylor & Francis
This paper investigates infinite horizon repeated security games with one defender and
multiple attacker types. The incomplete information brings uncertainty of attackers' behaviour …

Weighted network search games with multiple hidden objects and multiple search teams

A Yolmeh, M Baykal-Gürsoy - European Journal of Operational Research, 2021 - Elsevier
Most search game models assume that the hiding locations are identical and the players'
objective is to optimize the search time. However, there are some cases in which the players …