• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

选择要保护的内容。

Choosing what to protect.

作者信息

Bier Vicki M

机构信息

Department of Industrial and Systems Engineering, University of Wisconsin-Madison, Madison, WI, USA.

出版信息

Risk Anal. 2007 Jun;27(3):607-20. doi: 10.1111/j.1539-6924.2007.00906.x.

DOI:10.1111/j.1539-6924.2007.00906.x
PMID:17640211
Abstract

We study a strategic model in which a defender must allocate defensive resources to a collection of locations, and an attacker must choose a location to attack. The defender does not know the attacker's preferences, while the attacker observes the defender's resource allocation. The defender's problem gives rise to negative externalities, in the sense that increasing the resources allocated to one location increases the likelihood of an attack at other locations. In equilibrium, the defender exploits these externalities to manipulate the attacker's behavior, sometimes optimally leaving a location undefended, and sometimes preferring a higher vulnerability at a particular location even if a lower risk could be achieved at zero cost. Key results of our model are as follows: (1) the defender prefers to allocate resources in a centralized (rather than decentralized) manner; (2) as the number of locations to be defended grows, the defender can cost effectively reduce the probability of a successful attack only if the number of valuable targets is bounded; (3) the optimal allocation of resources can be nonmonotonic in the relative value of the attacker's outside option; and (4) the defender prefers his or her defensive allocation to be public rather than secret.

摘要

我们研究一种战略模型,其中防御者必须将防御资源分配到一系列地点,而攻击者必须选择一个地点进行攻击。防御者不知道攻击者的偏好,而攻击者能观察到防御者的资源分配情况。防御者的问题会产生负外部性,即增加分配到一个地点的资源会增加其他地点遭受攻击的可能性。在均衡状态下,防御者利用这些外部性来操纵攻击者的行为,有时会最优地不设防某个地点,有时即使可以零成本实现更低风险,也会选择在特定地点有更高的脆弱性。我们模型的关键结果如下:(1)防御者倾向于以集中(而非分散)的方式分配资源;(2)随着要防御的地点数量增加,只有当有价值目标的数量有界时,防御者才能以成本有效的方式降低成功攻击的概率;(3)资源的最优分配在攻击者外部选择的相对价值上可能是非单调的;(4)防御者更倾向于其防御分配是公开的而非秘密的。

相似文献

1
Choosing what to protect.选择要保护的内容。
Risk Anal. 2007 Jun;27(3):607-20. doi: 10.1111/j.1539-6924.2007.00906.x.
2
Resource distribution in multiple attacks with imperfect detection of the attack outcome.资源在多次攻击中的分配,其中攻击结果的检测不完美。
Risk Anal. 2012 Feb;32(2):304-18. doi: 10.1111/j.1539-6924.2011.01657.x. Epub 2011 Jul 30.
3
Robust allocation of a defensive budget considering an attacker's private information.考虑攻击者私人信息的防御性预算的稳健分配。
Risk Anal. 2012 May;32(5):930-43. doi: 10.1111/j.1539-6924.2011.01702.x. Epub 2011 Nov 2.
4
Defender-Attacker Games with Asymmetric Player Utilities.具有非对称玩家效用的防御-攻击博弈。
Risk Anal. 2020 Feb;40(2):408-420. doi: 10.1111/risa.13399. Epub 2019 Sep 17.
5
Optimal resource allocation for defense of targets based on differing measures of attractiveness.基于不同吸引力度量的目标防御最优资源分配
Risk Anal. 2008 Jun;28(3):763-70. doi: 10.1111/j.1539-6924.2008.01053.x.
6
Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers.面对战略攻击者,对任意层次的连续防御进行建模。
Risk Anal. 2011 Apr;31(4):533-47. doi: 10.1111/j.1539-6924.2010.01531.x. Epub 2010 Nov 24.
7
Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.连续努力的序贯攻防博弈中的威慑与风险偏好
Risk Anal. 2017 Nov;37(11):2229-2245. doi: 10.1111/risa.12768. Epub 2017 Mar 17.
8
Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.基于“热身”脑脊液的攻防博弈中的建模资源分配
Risk Anal. 2016 Apr;36(4):776-91. doi: 10.1111/risa.12502. Epub 2015 Dec 29.
9
Some limitations of "Risk = Threat x Vulnerability x Consequence" for risk analysis of terrorist attacks.“风险=威胁×脆弱性×后果”用于恐怖袭击风险分析的一些局限性。
Risk Anal. 2008 Dec;28(6):1749-61. doi: 10.1111/j.1539-6924.2008.01142.x. Epub 2008 Oct 16.
10
Zero-determinant strategy in stochastic Stackelberg asymmetric security game.零行列式策略在随机 Stackelberg 非对称安全博弈中的应用。
Sci Rep. 2023 Jul 12;13(1):11308. doi: 10.1038/s41598-023-38460-8.

引用本文的文献

1
Passenger rail security, planning, and resilience: application of network, plume, and economic simulation models as decision support tools.旅客铁路安全、规划和弹性:网络、羽流和经济模拟模型在决策支持工具中的应用。
Risk Anal. 2013 Nov;33(11):1969-86. doi: 10.1111/risa.12073. Epub 2013 May 29.
2
Ten most important accomplishments in risk analysis, 1980-2010.1980年至2010年风险分析领域的十项最重要成就。
Risk Anal. 2012 May;32(5):771-81. doi: 10.1111/j.1539-6924.2012.01817.x.