نتایج جستجو برای: armed attack

تعداد نتایج: 92853  

2016
Yundi Qian Chao Zhang Bhaskar Krishnamachari Milind Tambe

The success of Stackelberg Security Games (SSGs) in counterterrorism domains has inspired researchers’ interest in applying game-theoretic models to other security domains with frequent interactions between defenders and attackers, e.g., wildlife protection. Previous research optimizes defenders’ strategies by modeling this problem as a repeated Stackelberg game, capturing the special property ...

Journal: :Informatica (Slovenia) 2010
Tatiana Kichkaylo Tatyana Ryutov Michael D. Orosz Robert Neches

A major function of a security analyst is to analyze collected intelligence looking for plans, associated events, or other evidence that may identify an adversary’s intent. Armed with this knowledge, the analyst then develops potential responses (e.g., countermeasures) to deter the discovered plan or plans, weighs their strengths and weaknesses (e.g., collateral damage) and then makes a recomme...

2017
Marcus Gutierrez Christopher Kiekintveld

Honeypots are decoy cyberdefense systems placed in a network to entice malicious entities into attacking in order to waste attacker resources and learn information about attack behavior or previously unknown exploits. We focus on the strategic selection of various honeypot configurations in order to adapt to an intelligent attacker amidst a dynamic environment. In order to infiltrate networks, ...

2004
Nancy T. Kawai

Analytical technologies are currently in demand for Homeland Defense applications. Domestic preparedness requires a wide array of detection capabilities for a range of potential attack scenarios. For example, a single location could be attacked by planting an explosives package, carrying an explosive on a person, releasing a chemical/bacterial dispersion into the air supply, releasing a chemica...

2010
Michael Schmitt Michael N. Schmitt

In 2003, the International Committee of the Red Cross (ICRC), in cooperation with the T.M.C. Asser Institute, launched a major research effort to explore the concept of “direct participation by civilians in hostilities” (DPH Project).1 The goal was to provide greater clarity regarding the international humanitarian law (IHL) governing the loss of protection from attack when civilians involve th...

2004
Charles Mitchell Chris Decker

Prior to the attack on the USS Cole and the events of 11 September 2001, the U.S. Navy was developing antiterrorism programs to address potential terrorist attacks in a resource-constrained environment. Amid unprecedented tragedy associated with these and other terrorist strikes against U.S. interests, both domestic and abroad, government agencies, the Armed Forces, and private companies have r...

2011
Clara Ponsati Santiago Sanchez-Pages

We propose an elementary theory of wars fought by fully rational contenders that features three of the main rationalist explanations for armed conflicts: uncertainty, commitment, and indivisibility. Two parties play a Markov game that combines stages of bargaining, where offers are made, with claim stages, where one side can commit to impose surrender on the other. Under uncertainty on the pers...

2012
Karen Ruth Adams

Armed conflict is a recurrent and destructive feature of international politics. Because citizens are eager to avoid it and policy makers are keen to anticipate it, war has long been studied by philosophers. Today, war is a central concern of contemporary international-relations scholars. To understand the causes of war, scholars must first define war, then establish a universe of actors or con...

2005
David B. Peters Slawomir Pilarski David Bruce Peters

In the analysis of communications under the assumption of linear cost and in the context of a distributed memory interconnection network, many authors have noted that a good method for sending a message of length n along a path of length m is to divide the message into some collection of equal or nearly equal packets, and pipeline the communication. We formalize and prove that this notion is op...

Journal: :فصلنامه تخصصی جنگ ایران و عراق 0
میشل گراش نویسنده حیدرعلی بلوجی مترجم

0

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید