Attacker-Defender Models and Road Network Vulnerability

The reliability of road networks depends directly on their vulnerability to disruptive incidents, ranging in severity from minor disruptions to terrorist attacks. This paper presents a game theoretic approach to the analysis of road network vulnerability. The approach posits predefined disruption, a...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:Philosophical Transactions: Mathematical, Physical and Engineering Sciences. - The Royal Society. - 366(2008), 1872, Seite 1893-1906
1. Verfasser: Bell, M. G. H. (VerfasserIn)
Weitere Verfasser: Kanturska, U., Schmöcker, J.-D., Fonzone, A.
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 2008
Zugriff auf das übergeordnete Werk:Philosophical Transactions: Mathematical, Physical and Engineering Sciences
Schlagworte:Transport network vulnerability Defender-attacker-defender Risk-averse routing Game theory Networks under attack Mathematics Applied sciences Economics Behavioral sciences Social sciences
LEADER 01000caa a22002652 4500
001 JST065976606
003 DE-627
005 20240622125911.0
007 cr uuu---uuuuu
008 150325s2008 xx |||||o 00| ||eng c
035 |a (DE-627)JST065976606 
035 |a (JST)25190800 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Bell, M. G. H.  |e verfasserin  |4 aut 
245 1 0 |a Attacker-Defender Models and Road Network Vulnerability 
264 1 |c 2008 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a The reliability of road networks depends directly on their vulnerability to disruptive incidents, ranging in severity from minor disruptions to terrorist attacks. This paper presents a game theoretic approach to the analysis of road network vulnerability. The approach posits predefined disruption, attack or failure scenarios and then considers how to use the road network so as to minimize the maximum expected loss in the event of one of these scenarios coming to fruition. A mixed route strategy is adopted, meaning that the use of the road network is determined by the worst scenario probabilities. This is equivalent to risk-averse route choice. A solution algorithm suitable for use with standard traffic assignment software is presented, thereby enabling the use of electronic road navigation networks. A variant of this algorithm suitable for risk-averse assignment is developed. A numerical example relating to the central London road network is presented. The results highlight points of vulnerability in the road network. Applications of this form of network vulnerability analysis together with improved solution methods are discussed. 
540 |a Copyright 2008 The Royal Society 
650 4 |a Transport network vulnerability 
650 4 |a Defender-attacker-defender 
650 4 |a Risk-averse routing 
650 4 |a Game theory 
650 4 |a Networks under attack 
650 4 |a Mathematics  |x Applied mathematics  |x Game theory 
650 4 |a Applied sciences  |x Engineering  |x Transportation  |x Traffic  |x Traffic characteristics  |x Traffic assignment 
650 4 |a Applied sciences  |x Engineering  |x Transportation  |x Travel  |x Travel expenses 
650 4 |a Economics  |x Economic disciplines  |x Financial economics  |x Finance  |x Financial analysis  |x Risk management  |x Risk aversion 
650 4 |a Applied sciences  |x Computer science  |x Computer engineering  |x Computer software 
650 4 |a Applied sciences  |x Computer science  |x Algorithms 
650 4 |a Behavioral sciences  |x Psychology  |x Personality psychology  |x Personality  |x Personality traits  |x Pessimism 
650 4 |a Social sciences  |x Communications  |x Negotiation  |x Negotiation strategies  |x Mixed strategy 
650 4 |a Applied sciences  |x Engineering  |x Transportation  |x Travel  |x Travel time 
650 4 |a Applied sciences  |x Engineering  |x Civil engineering  |x Infrastructure  |x Transportation infrastructure  |x Roads 
650 4 |a Mathematics  |x Applied mathematics  |x Game theory 
650 4 |a Applied sciences  |x Engineering  |x Transportation  |x Traffic  |x Traffic characteristics  |x Traffic assignment 
650 4 |a Applied sciences  |x Engineering  |x Transportation  |x Travel  |x Travel expenses 
650 4 |a Economics  |x Economic disciplines  |x Financial economics  |x Finance  |x Financial analysis  |x Risk management  |x Risk aversion 
650 4 |a Applied sciences  |x Computer science  |x Computer engineering  |x Computer software 
650 4 |a Applied sciences  |x Computer science  |x Algorithms 
650 4 |a Behavioral sciences  |x Psychology  |x Personality psychology  |x Personality  |x Personality traits  |x Pessimism 
650 4 |a Social sciences  |x Communications  |x Negotiation  |x Negotiation strategies  |x Mixed strategy 
650 4 |a Applied sciences  |x Engineering  |x Transportation  |x Travel  |x Travel time 
650 4 |a Applied sciences  |x Engineering  |x Civil engineering  |x Infrastructure  |x Transportation infrastructure  |x Roads 
655 4 |a research-article 
700 1 |a Kanturska, U.  |e verfasserin  |4 aut 
700 1 |a Schmöcker, J.-D.  |e verfasserin  |4 aut 
700 1 |a Fonzone, A.  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t Philosophical Transactions: Mathematical, Physical and Engineering Sciences  |d The Royal Society  |g 366(2008), 1872, Seite 1893-1906  |w (DE-627)254635296  |w (DE-600)1462626-3  |x 1364503X  |7 nnns 
773 1 8 |g volume:366  |g year:2008  |g number:1872  |g pages:1893-1906 
856 4 0 |u https://www.jstor.org/stable/25190800  |3 Volltext 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_JST 
912 |a GBV_ILN_11 
912 |a GBV_ILN_20 
912 |a GBV_ILN_22 
912 |a GBV_ILN_23 
912 |a GBV_ILN_24 
912 |a GBV_ILN_31 
912 |a GBV_ILN_39 
912 |a GBV_ILN_40 
912 |a GBV_ILN_60 
912 |a GBV_ILN_62 
912 |a GBV_ILN_63 
912 |a GBV_ILN_65 
912 |a GBV_ILN_69 
912 |a GBV_ILN_70 
912 |a GBV_ILN_73 
912 |a GBV_ILN_90 
912 |a GBV_ILN_95 
912 |a GBV_ILN_100 
912 |a GBV_ILN_101 
912 |a GBV_ILN_105 
912 |a GBV_ILN_110 
912 |a GBV_ILN_120 
912 |a GBV_ILN_151 
912 |a GBV_ILN_161 
912 |a GBV_ILN_170 
912 |a GBV_ILN_213 
912 |a GBV_ILN_230 
912 |a GBV_ILN_285 
912 |a GBV_ILN_293 
912 |a GBV_ILN_370 
912 |a GBV_ILN_374 
912 |a GBV_ILN_602 
912 |a GBV_ILN_702 
912 |a GBV_ILN_2001 
912 |a GBV_ILN_2003 
912 |a GBV_ILN_2005 
912 |a GBV_ILN_2006 
912 |a GBV_ILN_2009 
912 |a GBV_ILN_2010 
912 |a GBV_ILN_2011 
912 |a GBV_ILN_2014 
912 |a GBV_ILN_2015 
912 |a GBV_ILN_2018 
912 |a GBV_ILN_2020 
912 |a GBV_ILN_2021 
912 |a GBV_ILN_2026 
912 |a GBV_ILN_2027 
912 |a GBV_ILN_2044 
912 |a GBV_ILN_2050 
912 |a GBV_ILN_2057 
912 |a GBV_ILN_2061 
912 |a GBV_ILN_2088 
912 |a GBV_ILN_2107 
912 |a GBV_ILN_2110 
912 |a GBV_ILN_2190 
912 |a GBV_ILN_2943 
912 |a GBV_ILN_2946 
912 |a GBV_ILN_2947 
912 |a GBV_ILN_2949 
912 |a GBV_ILN_2951 
912 |a GBV_ILN_4012 
912 |a GBV_ILN_4035 
912 |a GBV_ILN_4037 
912 |a GBV_ILN_4046 
912 |a GBV_ILN_4112 
912 |a GBV_ILN_4125 
912 |a GBV_ILN_4242 
912 |a GBV_ILN_4251 
912 |a GBV_ILN_4305 
912 |a GBV_ILN_4306 
912 |a GBV_ILN_4307 
912 |a GBV_ILN_4323 
912 |a GBV_ILN_4325 
912 |a GBV_ILN_4335 
912 |a GBV_ILN_4346 
912 |a GBV_ILN_4393 
912 |a GBV_ILN_4700 
951 |a AR 
952 |d 366  |j 2008  |e 1872  |h 1893-1906