2016
DOI: 10.1111/risa.12580
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Risk Analysis for Urban Security Resource Allocation

Abstract: Adversarial risk analysis (ARA) provides a framework to deal with risks originating from intentional actions of adversaries. We show how ARA may be used to allocate security resources in the protection of urban spaces. We take into account the spatial structure and consider both proactive and reactive measures, in that we aim at both trying to reduce criminality as well as recovering as best as possible from it, should it happen. We deal with the problem by deploying an ARA model over each spatial unit, coordi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 38 publications
0
8
0
Order By: Relevance
“…It is now widely used in Bayesian statistics, game and decision theory, data mining and economics (e.g., [59][60][61][62]). More recently, expected utility has been used in Adversarial Risk Analysis models, which model the actions of the strategic adversary and find the optimal actions for the defender (e.g., [63][64][65][66]).…”
Section: Using Expected Utility To Combine Multiple Measuresmentioning
confidence: 99%
“…It is now widely used in Bayesian statistics, game and decision theory, data mining and economics (e.g., [59][60][61][62]). More recently, expected utility has been used in Adversarial Risk Analysis models, which model the actions of the strategic adversary and find the optimal actions for the defender (e.g., [63][64][65][66]).…”
Section: Using Expected Utility To Combine Multiple Measuresmentioning
confidence: 99%
“…To study the appropriateness of standard game theory and ARA, we develop first the sequential defense–attack model, which is one of the two standard counterterrorism model (Other standard models include the simultaneous defense-attack model, the sequential defense–attack–defense [25] and the sequential defense-attack with private information.). We use this model to analyze the problem that is the objective of this work.…”
Section: Analysis Of Decision-making Modelsmentioning
confidence: 99%
“…ARA takes into account the expected utilities for the defender as well as the random expected utilities for the opponents, incorporating uncertainty regarding their strategic reasoning. Since its introduction, it has been used to model a variety of problems such as network routing for insurgency ([Wang and Banks, 2011]), international piracy ([Sevillano et al, 2012]), counter-terrorism ( ), autonomous social agents ( [Esteban and Insua, 2014], urban security resource allocation ( [Gil et al, 2016]), adversarial classification ( [Naveiro et al, 2019]), counter-terrorist online surveillance ( [Gil and Parra-Arnau, 2019]), cyber-security ( [Rios Insua et al, 2019]).…”
Section: Adversarial Risk Analysismentioning
confidence: 99%