Keyword: military & defence

Found 254 papers in total
An exact method for finding shortest routes on a sphere, avoiding obstacles
2016,
On the surface of a sphere, we take as inputs two points, neither of them contained in...
Security economics: an adversarial risk analysis approach to airport protection
2016,
We analyze the case of protecting an airport, in which there is concern with terrorist...
Modeling Resources Allocation in Attacker-Defender Games with ‘Warm Up’ CSF
2016,
Like many other engineering investments, the attacker's and defender's investments may...
In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models
2016,
A key objective for policymakers and analysts dealing with terrorist threats is trying...
Finding the needles in the haystack: efficient intelligence processing
2016,
As a result of communication technologies, the main intelligence challenge has shifted...
On the Concept and Definition of Terrorism Risk
2015,
In this article, we provide some reflections on how to define and understand the...
Augmenting the Deliberative Method for Ranking Risks
2016,
The Department of Homeland Security (DHS) characterized and prioritized the physical...
Multi-criteria failure mode effects and criticality analysis method: a comparative case study on aircraft braking system
2016,
The Department of the USA's Army published technical manual TM 5‐698‐4...
Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation
2015,
This article presents ongoing research that focuses on efficient allocation of defense...
Strategic workforce planning for the Australian Defence Force
2016,
This paper presents a mixed integer linear programming (MILP) model to aid in planning...
Experience-based knowledge from the Swedish Armed Forces: a comparison between groups and individuals
2016,
A serious weakness in several organizations seems to be that numerous experiences are...
Multiple-model adaptive estimation for space surveillance with measurement uncertainty
2016,
An efficient multiple‐model adaptive estimation (MMAE) algorithm is presented...
Reliability Analysis of Mobile Ad Hoc Networks Using Universal Generating Function
2016,
The proliferation of the wireless network over the last decade is one of the...
Simulating prevention operations at sea against maritime piracy
2015,
Maritime piracy has been a major issue for the international community in the last...
Forecasting of compound Erlang demand
2015,
Intermittent demand items dominate service and repair inventories in many industries...
A dynamic competition model of regime change
2015,
A dynamic competition model for an oppressive government opposed by rebels is...
New results on a stochastic duel game with each force consisting of heterogeneous units
2014,
Two forces engage in a duel, with each force initially consisting of several...
Securing a border under asymmetric information
2014,
We study a stochastic interdiction model of Morton et al. (2007) that locates...
Maintenance scheduling for modular systems: Modeling and algorithms
2014,
We study new models of scheduled maintenance management for modular systems,...
Optimal patrol to uncover threats in time when detection is imperfect
2014,
Consider a patrol problem, where a patroller traverses a graph through edges to detect...
When Lanchester met Richardson, the outcome was stalemate: A parable for mathematical models of insurgency
2015,
Many authors have used dynamical systems to model asymmetric war. We explore this...
A mathematical location-routing model of repair centres and ammunition depots in order to support soldiers in civil wars
2014,
One of the most crucial factors in civil wars is to properly support fighting...
On ruckle's game of ambush
1990,
This article considers a two‐person ambush game in which a traveler chooses his...
Water Conflict Risk due to Water Resource Availability and Unequal Distribution
2014,
The aim of this research is to support the assessment of countries’ risks of...
Papers per page: