zbMATH — the first resource for mathematics

Geometry Search for the term Geometry in any field. Queries are case-independent.
Funct* Wildcard queries are specified by * (e.g. functions, functorial, etc.). Otherwise the search is exact.
"Topological group" Phrases (multi-words) should be set in "straight quotation marks".
au: Bourbaki & ti: Algebra Search for author and title. The and-operator & is default and can be omitted.
Chebyshev | Tschebyscheff The or-operator | allows to search for Chebyshev or Tschebyscheff.
"Quasi* map*" py: 1989 The resulting documents have publication year 1989.
so: Eur* J* Mat* Soc* cc: 14 Search for publications in a particular source with a Mathematics Subject Classification code (cc) in 14.
"Partial diff* eq*" ! elliptic The not-operator ! eliminates all results containing the word elliptic.
dt: b & au: Hilbert The document type is set to books; alternatively: j for journal articles, a for book articles.
py: 2000-2015 cc: (94A | 11T) Number ranges are accepted. Terms can be grouped within (parentheses).
la: chinese Find documents in a given language. ISO 639-1 language codes can also be used.

a & b logic and
a | b logic or
!ab logic not
abc* right wildcard
"ab c" phrase
(ab c) parentheses
any anywhere an internal document identifier
au author, editor ai internal author identifier
ti title la language
so source ab review, abstract
py publication year rv reviewer
cc MSC code ut uncontrolled term
dt document type (j: journal article; b: book; a: book article)
False targets efficiency in defense strategy. (English) Zbl 1158.91303
Summary: The paper analyzes the efficiency of deploying false targets as part of a defense strategy. It is assumed that the defender has a single object that can be destroyed by the attacker. The defender distributes its resource between deploying false targets and protecting the object from outside attacks. The attacker cannot distinguish the false targets from the defended object (genuine target). Therefore the attacker has no preferences for attacking one target rather than another target. The defender decides how many false targets to deploy whereas the attacker decides how many targets to attack. The article assumes that both the defender and attacker have complete information and full rationality. The optimal number of false targets and the attacked targets are obtained for the case of fixed and variable resources of the defender and the attacker as solutions of a non-cooperative game between the two agents.

91A052-person games
90B25Reliability, availability, maintenance, inspection, etc. (optimization)
Full Text: DOI
[1] Azaiez, N.; Bier, V. M.: Optimal resource allocation for security in reliability systems, European journal of operational research 181, 773-786 (2007) · Zbl 1131.90001 · doi:10.1016/j.ejor.2006.03.057
[2] Bier, V. M.; Abhichandani, V.: Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries, (2002)
[3] Bier, V. M.; Nagaraj, A.; Abhichandani, V.: Protection of simple series and parallel systems with components of different values, Reliability engineering and system safety 87, 315-323 (2005)
[4] Bier, V. M.; Oliveros, S.; Samuelson, L.: Choosing what to protect: strategic defense allocation against an unknown attacker, Journal of public economic theory 9, 563-587 (2007)
[5] Fudenberg, D. M.; Tirole, J.: Game theory, (1991) · Zbl 0596.90015
[6] Gordon, L. A.; Loeb, M.: The economics of information security investment, ACM transactions on information and system security 5, No. 4, 438-457 (2002)
[7] Hausken, K.: Probabilistic risk analysis and game theory, Risk analysis 22, No. 1, 17-27 (2002)
[8] Hausken, K.: Production and conflict models versus rent seeking models, Public choice 123, 59-93 (2005)
[9] Hausken, K.: Income, interdependence, and substitution effects affecting incentives for security investment, Journal of accounting and public policy 25, No. 6, 629-665 (2006)
[10] Hausken, K.: Strategic defense and attack for series and parallel reliability systems, European journal of operational research 186, No. 2, 856-881 (2008) · Zbl 1138.91367 · doi:10.1016/j.ejor.2007.02.013
[11] Hirshleifer, J.: Anarchy and its breakdown, Journal of political economy 103, No. 1, 26-52 (1995)
[12] Kunreuther, H.; Heal, G.: Interdependent security, The journal of risk and uncertainty 26, No. 2/3, 231-249 (2003) · Zbl 1040.91062 · doi:10.1023/A:1024119208153
[13] Levitin, G.: Optimal multilevel protection in series-parallel systems, Reliability engineering and system safety 81, 93-102 (2003)
[14] Levitin, G.: Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes, European journal of operational research 150, 406-419 (2003) · Zbl 1137.90454 · doi:10.1016/S0377-2217(02)00506-4
[15] Levitin, G.: Optimal defense strategy against intentional attacks, IEEE transactions on reliability 56, No. 1, 148-157 (2007)
[16] Levitin, G.; Lisnianski, A.: Optimal separation of elements in vulnerable multi-state systems, Reliability engineering and system safety 73, 55-66 (2001)
[17] Levitin, G.; Lisnianski, A.: Optimizing survivability of vulnerable series-parallel multi-state systems, Reliability engineering and system safety 79, 319-331 (2003)
[18] Levitin, G.; Dai, Y.; Xie, M.; Poh, K. L.: Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm, Reliability engineering and system safety 82, 93-104 (2003)
[19] Schelling, T.: The strategy of conflict, (1960) · Zbl 0089.37801
[20] Skaperdas, S.: Contest success functions, Economic theory 7, 283-290 (1996) · Zbl 0852.90137
[21] Tullock, G.: Efficient rent-seeking, Toward a theory of the rent-seeking society, 97-112 (1980)