img Leseprobe Leseprobe

Game Theory for Managing Security in Chemical Industrial Areas

Genserik Reniers, Laobing Zhang

PDF
ca. 53,49
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

Springer International Publishing img Link Publisher

Sozialwissenschaften, Recht, Wirtschaft / Volkswirtschaft

Beschreibung

This book systematically studies how game theory can be used to improve security in chemical industrial areas, capturing the intelligent interactions between security managers and potential adversaries. The recent unfortunate terrorist attacks on critical infrastructures show that adversaries are intelligent and strategic. Game theoretic models have been extensively used in some domains to model these strategic adversaries. However, there is a lack of such advanced models to be employed by chemical security managers. 

In this book, game theoretic models for protecting chemical plants as well as clusters are proposed. Different equilibrium concepts are explored, with user-friendly explanation of how to reflect them to realistic cases. Based on efficient analysis of the properties of security issues in chemical plants/clusters, models in this book are capable to support resources allocations, cost-effectiveness analysis, cooperation incentives and alike.

Weitere Titel in dieser Kategorie
Cover Science of Valuations
Maria Rosa Trovato
Cover Beyond Profit
Samir Alamad
Cover Islamic Finance
Lorenzo Bujosa

Kundenbewertungen

Schlagwörter

chemical clusters protection, irrational players, chemical plant security, security game, detection systems in chemical plants, security defence systems, cyber-physical security