2011
DOI: 10.1002/nav.20469
|View full text |Cite
|
Sign up to set email alerts
|

Network routing for insurgency: An adversarial risk analysis framework

Abstract: Problems in counterterrorism and corporate competition have prompted research that attempts to combine statistical risk analysis with game theory in ways that support practical decision making. This article applies these methods of adversarial risk analysis to the problem of selecting a route through a network in which an opponent chooses vertices for ambush. The motivating application is convoy routing across a road network when there may be improvised explosive devices and imperfect intelligence about their … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 32 publications
(28 citation statements)
references
References 32 publications
(38 reference statements)
0
28
0
Order By: Relevance
“…Rios Insua, Rios, and Banks [1] apply it to an auction problem. And Wang and Banks [26] apply ARA to the problem of routing convoys through a city in which there may be improvised explosive devices. In both cases, the essential step is to build a model for the the decision processes of one's opponent, and then use subjective probability distributions to describe all unknown quantities.…”
Section: Discussionmentioning
confidence: 99%
“…Rios Insua, Rios, and Banks [1] apply it to an auction problem. And Wang and Banks [26] apply ARA to the problem of routing convoys through a city in which there may be improvised explosive devices. In both cases, the essential step is to build a model for the the decision processes of one's opponent, and then use subjective probability distributions to describe all unknown quantities.…”
Section: Discussionmentioning
confidence: 99%
“…Recently, problems in counterterrorism and corporate competition have prompted applied research that attempts to combine math-statistical risk analysis with game theory in ways that support practical decision making. Wang and Bank's latest article applies these methods of ARA to the problem of selecting a route through a network, in which an opponent chooses certain vertices for ambush [47].…”
Section: Applications Of Game Theory To Cyber-security Riskmentioning
confidence: 99%
“…Daphne does not know the elements (u A , p A (· | ·), p A ) required to solve Equation (2). As a Bayesian, she expresses her uncertainty about these through random utilities and probabilities (U A , P A (· | ·), P A ).…”
Section: A Level-k Thinking Opponentmentioning
confidence: 99%
“…r As sketched in Section 3.2., the Nash equilibrium opponent model requires elements (1,1), (1,3), (1,2), and (1,5), which are used to calculate (0,4).…”
Section: A Cognitive Comparisonmentioning
confidence: 99%