Open Access

Adversarial Risk Analysis for Enhancing Combat Simulation Models


Cite

Banks, D., Petralia, F., & Wang, S. (2011). Adversarial risk analysis: Borel games. Applied Stochastic Models in Business and Industry 27(2), pp. 72-86.10.1002/asmb.890Search in Google Scholar

Brown, G. & Washburn, A.R. (2000 rev. 2004). The fast theater model (FATHM), Project Report, (NPS-OR-01-002-PR), Naval Postgraduate School, Monterey, CA.Search in Google Scholar

Camerer, C. (2003). Behavioral Game Ttheory: Experiments in Strategic Interaction. Princeton University Press, New Jersey.Search in Google Scholar

Caswell, D. J., Howard, R. A., & Paté-Cornell, M. E. (2011). Analysis of national strategies to counter a country's nuclear weapons program. Decision Analysis, 8(1), 30-45.10.1287/deca.1110.0198Search in Google Scholar

Churchill, D., Saffidine, A., & Buro, M. (2012). Fast Heuristic Search for RTS Game Combat Scenarios. In AIIDE.Search in Google Scholar

Davis, P. K., & Blumenthal, D. (1991). The base of sand problem: A white paper on the state of military combat modeling (No. RAND/N-3148-OSD/DARPA). Defense Advanced Research Projects Agency, Arlington VA.Search in Google Scholar

Golany, B., Kaplan, E. H., Marmur, A., & Rothblum, U. G. (2009). Nature plays with dice-terrorists do not: Allocating resources to counter strategic versus probabilistic risks. European Journal of Operational Research, 192(1), 198-208.10.1016/j.ejor.2007.09.001Search in Google Scholar

Howard, R. A. & Matheson, J. E. (2005). Influence diagrams. Decision Analysis, 2(3), pp. 127-143.10.1287/deca.1050.0020Search in Google Scholar

Kadane, J. B. & Larkey, P. D. (1982). Subjective probability and the theory of games. Management Science, 28(2), pp. 113-120.10.1287/mnsc.28.2.113Search in Google Scholar

Kangas, L. (2005). Taistelun stokastinen mallinnus. Master's Thesis, Helsinki University of Technology. http://sal.aalto.fi/publications/pdf-files/tkan05.pdf Accessed: 2014-05-07Search in Google Scholar

Kangas, L. & Lappi, E. (2006) Probabilistic risk analysis in combat modeling. In: Hämäläinen, J. (ed.) Lanchester and Beyond. A Workshop on Operational Analysis Methodology. PVTT Publications 11Search in Google Scholar

Kangaspunta, J., Liesiö, J., & Salo, A. (2012). Cost-efficiency analysis of weapon system portfolios. European Journal of Operational Research, 223(1), pp. 264-275.10.1016/j.ejor.2012.05.042Search in Google Scholar

Kardes, E., & Hall, R. (2005). Survey of literature on strategic decision making in the presence of adversaries. Unpublished report.Search in Google Scholar

Kovenock, D., Roberson, B. (2010). Conflicts with multiple battlefields, CESifo working paper: Empirical and Theoretical Methods, No. 3165Search in Google Scholar

Kroshl, W. M., Sarkani, S., & Mazzuchi, T. A. (2015). Efficient allocation of resources for defense of spatially distributed networks using agent‐based simulation. Risk Analysis (to appear).10.1111/risa.12325Search in Google Scholar

Lappi, E. (2012). Computational methods for tactical simulations. Julkaisusarja 1. N:o 1/2012. Doctoral Thesis, National Defence University, FinlandSearch in Google Scholar

Lappi, E., Pakkanen, M., & Åkesson, B. (2012). An approximative method of simulating a duel. In: Proceedings of the Winter Simulation Conference, WSC '12, pp. 208:1-208:1010.1109/WSC.2012.6465044Search in Google Scholar

Lappi, E., Pentti, J., Åkesson, B., Roponen, J., Valtonen, J., Koskinen, J., Burhan, U., Sivertun, Å., and Hämäläinen, J. (2015). Team 4: Data farm. manuscript.Search in Google Scholar

Meng, S., Wiens, M., & Schultmann, F. (2014). A game-theoretic approach to assess adversarial risks. In: Brebbia, C.A. (ed.), Risk Analysis IX, WIT Press, Southampton, UK, pp. 141-152.10.2495/RISK140131Search in Google Scholar

Myerson, R. B. (1991). Game Theory: Analysis of Conflict. Harvard University Press, Cambridge, MA.Search in Google Scholar

Paté-Cornell, E., & Guikema, S. (2002). Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures. Military Operations Research, 7(4), pp. 5-23.10.5711/morj.7.4.5Search in Google Scholar

Reese, W. (1980). Deception in a game theoretic framework. In: Daniel, D. C., Herbig, K. L., Reese, W., Heuer, R. J., & Sarbin, T. R. (1980). Multidisciplinary Perspectives on Military Deception (No. NPS-56-80-012A). Naval Postgraduate School, Monterey, CA.Search in Google Scholar

Rios Insua, D., Rios, J., & Banks, D. (2009). Adversarial risk analysis. Journal of the American Statistical Association, 104(486), pp. 841-854.10.1198/jasa.2009.0155Search in Google Scholar

Rios, J., & Rios Insua, D. (2012). Adversarial risk analysis for counterterrorism modeling. Risk analysis, 32(5), pp. 894-915.10.1111/j.1539-6924.2011.01713.xSearch in Google Scholar

Roponen, J. (2013). Kaksintaistelun approksimatiivinen mallintaminen. Bachelor’s Thesis, Aalto University. http://sal.aalto.fi/publications/pdf-files/trop13_public.pdf Accessed: 2014-05-07Search in Google Scholar

Rothschild, C., McLay, L., & Guikema, S. (2012). Adversarial risk analysis with incomplete information: A level‐k approach. Risk Analysis, 32(7), pp. 1219-123110.1111/j.1539-6924.2011.01701.xSearch in Google Scholar

Santos Jr, E., & Zhao, Q. (2006). Adversarial models for opponent intent inferencing. In: Kott A., & McEneaney W. (2006) Adversarial Reasoning: Computational Approaches to Reading the Opponents Mind. Chapman & Hall/CRC, Boca Raton, 1-22.Search in Google Scholar

Tolk, A. (2012). Engineering Principles of Combat Modeling and Distributed Simulation. Wiley. USA.10.1002/9781118180310Search in Google Scholar

Tzu, S. (2004 print) The art of War. Trans. Giles L. Project Gutenberg.Search in Google Scholar

Washburn, A. R., & Kress, M. (2009). Combat Modeling. Springer. Heidelberg.10.1007/978-1-4419-0790-5Search in Google Scholar

Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Operations Research, 55(5), pp. 976-99110.1287/opre.1070.0434Search in Google Scholar

Zuckerman, I., Kraus, S., & Rosenschein, J. S. (2012). The adversarial activity model for bounded rational agents. Autonomous Agents and Multi-Agent Systems, 24(3), 374-409.10.1007/s10458-010-9153-2Search in Google Scholar

Åkesson, A. (2012). Automatic calculation of win probabilities and conditional strength distribution of units in stochastic simulation model. Master's Thesis, Åbo Akademi University.Search in Google Scholar

eISSN:
1799-3350
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
History, Topics in History, Military History, Social Sciences, Political Science, Military Policy