Have a personal or library account? Click to login
Adversarial Risk Analysis for Enhancing Combat Simulation Models Cover

Adversarial Risk Analysis for Enhancing Combat Simulation Models

By:
Open Access
|Nov 2016

References

  1. Banks, D., Petralia, F., & Wang, S. (2011). Adversarial risk analysis: Borel games. Applied Stochastic Models in Business and Industry 27(2), pp. 72-86.10.1002/asmb.890
  2. Brown, G. & Washburn, A.R. (2000 rev. 2004). The fast theater model (FATHM), Project Report, (NPS-OR-01-002-PR), Naval Postgraduate School, Monterey, CA.
  3. Camerer, C. (2003). Behavioral Game Ttheory: Experiments in Strategic Interaction. Princeton University Press, New Jersey.
  4. Caswell, D. J., Howard, R. A., & Paté-Cornell, M. E. (2011). Analysis of national strategies to counter a country's nuclear weapons program. Decision Analysis, 8(1), 30-45.10.1287/deca.1110.0198
  5. Churchill, D., Saffidine, A., & Buro, M. (2012). Fast Heuristic Search for RTS Game Combat Scenarios. In AIIDE.
  6. Davis, P. K., & Blumenthal, D. (1991). The base of sand problem: A white paper on the state of military combat modeling (No. RAND/N-3148-OSD/DARPA). Defense Advanced Research Projects Agency, Arlington VA.
  7. Golany, B., Kaplan, E. H., Marmur, A., & Rothblum, U. G. (2009). Nature plays with dice-terrorists do not: Allocating resources to counter strategic versus probabilistic risks. European Journal of Operational Research, 192(1), 198-208.10.1016/j.ejor.2007.09.001
  8. Howard, R. A. & Matheson, J. E. (2005). Influence diagrams. Decision Analysis, 2(3), pp. 127-143.10.1287/deca.1050.0020
  9. Kadane, J. B. & Larkey, P. D. (1982). Subjective probability and the theory of games. Management Science, 28(2), pp. 113-120.10.1287/mnsc.28.2.113
  10. Kangas, L. (2005). Taistelun stokastinen mallinnus. Master's Thesis, Helsinki University of Technology. http://sal.aalto.fi/publications/pdf-files/tkan05.pdf Accessed: 2014-05-07
  11. Kangas, L. & Lappi, E. (2006) Probabilistic risk analysis in combat modeling. In: Hämäläinen, J. (ed.) Lanchester and Beyond. A Workshop on Operational Analysis Methodology. PVTT Publications 11
  12. Kangaspunta, J., Liesiö, J., & Salo, A. (2012). Cost-efficiency analysis of weapon system portfolios. European Journal of Operational Research, 223(1), pp. 264-275.10.1016/j.ejor.2012.05.042
  13. Kardes, E., & Hall, R. (2005). Survey of literature on strategic decision making in the presence of adversaries. Unpublished report.
  14. Kovenock, D., Roberson, B. (2010). Conflicts with multiple battlefields, CESifo working paper: Empirical and Theoretical Methods, No. 316510.2139/ssrn.1679624
  15. Kroshl, W. M., Sarkani, S., & Mazzuchi, T. A. (2015). Efficient allocation of resources for defense of spatially distributed networks using agent‐based simulation. Risk Analysis (to appear).10.1111/risa.12325
  16. Lappi, E. (2012). Computational methods for tactical simulations. Julkaisusarja 1. N:o 1/2012. Doctoral Thesis, National Defence University, Finland
  17. Lappi, E., Pakkanen, M., & Åkesson, B. (2012). An approximative method of simulating a duel. In: Proceedings of the Winter Simulation Conference, WSC '12, pp. 208:1-208:1010.1109/WSC.2012.6465044
  18. Lappi, E., Pentti, J., Åkesson, B., Roponen, J., Valtonen, J., Koskinen, J., Burhan, U., Sivertun, Å., and Hämäläinen, J. (2015). Team 4: Data farm. manuscript.
  19. Meng, S., Wiens, M., & Schultmann, F. (2014). A game-theoretic approach to assess adversarial risks. In: Brebbia, C.A. (ed.), Risk Analysis IX, WIT Press, Southampton, UK, pp. 141-152.10.2495/RISK140131
  20. Myerson, R. B. (1991). Game Theory: Analysis of Conflict. Harvard University Press, Cambridge, MA.
  21. Paté-Cornell, E., & Guikema, S. (2002). Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures. Military Operations Research, 7(4), pp. 5-23.10.5711/morj.7.4.5
  22. Reese, W. (1980). Deception in a game theoretic framework. In: Daniel, D. C., Herbig, K. L., Reese, W., Heuer, R. J., & Sarbin, T. R. (1980). Multidisciplinary Perspectives on Military Deception (No. NPS-56-80-012A). Naval Postgraduate School, Monterey, CA.
  23. Rios Insua, D., Rios, J., & Banks, D. (2009). Adversarial risk analysis. Journal of the American Statistical Association, 104(486), pp. 841-854.10.1198/jasa.2009.0155
  24. Rios, J., & Rios Insua, D. (2012). Adversarial risk analysis for counterterrorism modeling. Risk analysis, 32(5), pp. 894-915.10.1111/j.1539-6924.2011.01713.x
  25. Roponen, J. (2013). Kaksintaistelun approksimatiivinen mallintaminen. Bachelor’s Thesis, Aalto University. http://sal.aalto.fi/publications/pdf-files/trop13_public.pdf Accessed: 2014-05-07
  26. Rothschild, C., McLay, L., & Guikema, S. (2012). Adversarial risk analysis with incomplete information: A level‐k approach. Risk Analysis, 32(7), pp. 1219-123110.1111/j.1539-6924.2011.01701.x
  27. Santos Jr, E., & Zhao, Q. (2006). Adversarial models for opponent intent inferencing. In: Kott A., & McEneaney W. (2006) Adversarial Reasoning: Computational Approaches to Reading the Opponents Mind. Chapman & Hall/CRC, Boca Raton, 1-22.10.1201/9781420011012.ch1.1
  28. Tolk, A. (2012). Engineering Principles of Combat Modeling and Distributed Simulation. Wiley. USA.10.1002/9781118180310
  29. Tzu, S. (2004 print) The art of War. Trans. Giles L. Project Gutenberg.
  30. Washburn, A. R., & Kress, M. (2009). Combat Modeling. Springer. Heidelberg.10.1007/978-1-4419-0790-5
  31. Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Operations Research, 55(5), pp. 976-99110.1287/opre.1070.0434
  32. Zuckerman, I., Kraus, S., & Rosenschein, J. S. (2012). The adversarial activity model for bounded rational agents. Autonomous Agents and Multi-Agent Systems, 24(3), 374-409.10.1007/s10458-010-9153-2
  33. Åkesson, A. (2012). Automatic calculation of win probabilities and conditional strength distribution of units in stochastic simulation model. Master's Thesis, Åbo Akademi University.
DOI: https://doi.org/10.1515/jms-2016-0200 | Journal eISSN: 1799-3350 | Journal ISSN: 2242-3524
Language: English
Page range: 82 - 103
Published on: Nov 23, 2016
Published by: National Defense University
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2016 Juho Roponen, Ahti Salo, published by National Defense University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.