Please use this identifier to cite or link to this item:
https://doi.org/10.1109/IEEM.2009.5373140
Title: | Intelligence and impact contests in defending a single object with imperfect false targets | Authors: | Peng, R. Levitin, G. Xie, M. Ng, S.H. |
Keywords: | Attack Contest success function Defense Disinformation False targets Vulnerability |
Issue Date: | 2009 | Citation: | Peng, R., Levitin, G., Xie, M., Ng, S.H. (2009). Intelligence and impact contests in defending a single object with imperfect false targets. IEEM 2009 - IEEE International Conference on Industrial Engineering and Engineering Management : 2128-2132. ScholarBank@NUS Repository. https://doi.org/10.1109/IEEM.2009.5373140 | Abstract: | Introducing false targets is a common approach to protect important facilities. In this paper we assume that the defender has deployed a single object that can be destroyed by the attacker and deployed several false targets in order to misinform the attacker. The false targets are imperfect and can be detected by the attacker independently. In order to detect the false targets the attacker allocates part of his budget into intelligence actions. The optimal resource distribution between target identification/disinformation and attack/ protection efforts is studied for the case of constrained defense and attack resources. ©2009 IEEE. | Source Title: | IEEM 2009 - IEEE International Conference on Industrial Engineering and Engineering Management | URI: | http://scholarbank.nus.edu.sg/handle/10635/72341 | ISBN: | 9781424448708 | DOI: | 10.1109/IEEM.2009.5373140 |
Appears in Collections: | Staff Publications |
Show full item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.