Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks
DOI10.1016/j.ejor.2014.12.006zbMath1346.90279OpenAlexW2005096439MaRDI QIDQ319051
Huadong Mo, Gregory Levitin, Min Xie
Publication date: 6 October 2016
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2014.12.006
resource allocationvulnerabilitytruncated normal distributiondestruction probabilityintentional attacks
Reliability, availability, maintenance, inspection in operations research (90B25) Production theory, theory of the firm (91B38) Resource and cost allocation (including fair division, apportionment, etc.) (91B32)
Related Items
Cites Work
- Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
- Approaches for multi-step density forecasts with application to aggregated wind power
- The optimal multi-stage contest
- Optimal resource allocation for security in reliability systems
- Separation in homogeneous systems with independent identical elements
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
- A survey of maintenance policies of deteriorating systems
- Contest success functions
- Degradation-based burn-in with preventive maintenance
- Revisiting a game theoretic framework for the robust railway network design against intentional attacks
- Cold vs. hot standby mission operation cost minimization for 1-out-of-\(N\) systems
- Incomplete information in rent-seeking contests
- Strategic defense and attack for series and parallel reliability systems
- COMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACK
- Optimization Techniques for System Reliability with RedundancyߞA Review
- Using Degradation Measures to Estimate a Time-to-Failure Distribution
This page was built for publication: Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks