نتایج جستجو برای: armed attack
تعداد نتایج: 92853 فیلتر نتایج به سال:
The success of Stackelberg Security Games (SSGs) in counterterrorism domains has inspired researchers’ interest in applying game-theoretic models to other security domains with frequent interactions between defenders and attackers, e.g., wildlife protection. Previous research optimizes defenders’ strategies by modeling this problem as a repeated Stackelberg game, capturing the special property ...
A major function of a security analyst is to analyze collected intelligence looking for plans, associated events, or other evidence that may identify an adversary’s intent. Armed with this knowledge, the analyst then develops potential responses (e.g., countermeasures) to deter the discovered plan or plans, weighs their strengths and weaknesses (e.g., collateral damage) and then makes a recomme...
Honeypots are decoy cyberdefense systems placed in a network to entice malicious entities into attacking in order to waste attacker resources and learn information about attack behavior or previously unknown exploits. We focus on the strategic selection of various honeypot configurations in order to adapt to an intelligent attacker amidst a dynamic environment. In order to infiltrate networks, ...
Analytical technologies are currently in demand for Homeland Defense applications. Domestic preparedness requires a wide array of detection capabilities for a range of potential attack scenarios. For example, a single location could be attacked by planting an explosives package, carrying an explosive on a person, releasing a chemical/bacterial dispersion into the air supply, releasing a chemica...
In 2003, the International Committee of the Red Cross (ICRC), in cooperation with the T.M.C. Asser Institute, launched a major research effort to explore the concept of “direct participation by civilians in hostilities” (DPH Project).1 The goal was to provide greater clarity regarding the international humanitarian law (IHL) governing the loss of protection from attack when civilians involve th...
Prior to the attack on the USS Cole and the events of 11 September 2001, the U.S. Navy was developing antiterrorism programs to address potential terrorist attacks in a resource-constrained environment. Amid unprecedented tragedy associated with these and other terrorist strikes against U.S. interests, both domestic and abroad, government agencies, the Armed Forces, and private companies have r...
We propose an elementary theory of wars fought by fully rational contenders that features three of the main rationalist explanations for armed conflicts: uncertainty, commitment, and indivisibility. Two parties play a Markov game that combines stages of bargaining, where offers are made, with claim stages, where one side can commit to impose surrender on the other. Under uncertainty on the pers...
Armed conflict is a recurrent and destructive feature of international politics. Because citizens are eager to avoid it and policy makers are keen to anticipate it, war has long been studied by philosophers. Today, war is a central concern of contemporary international-relations scholars. To understand the causes of war, scholars must first define war, then establish a universe of actors or con...
In the analysis of communications under the assumption of linear cost and in the context of a distributed memory interconnection network, many authors have noted that a good method for sending a message of length n along a path of length m is to divide the message into some collection of equal or nearly equal packets, and pipeline the communication. We formalize and prove that this notion is op...
0
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید