@article{MGTA_2022_14_4_a3,
author = {Vladimir V. Morozov},
title = {Attack against layered defense},
journal = {Matemati\v{c}eska\^a teori\^a igr i e\"e prilo\v{z}eni\^a},
pages = {69--80},
year = {2022},
volume = {14},
number = {4},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/MGTA_2022_14_4_a3/}
}
Vladimir V. Morozov. Attack against layered defense. Matematičeskaâ teoriâ igr i eë priloženiâ, Tome 14 (2022) no. 4, pp. 69-80. http://geodesic.mathdoc.fr/item/MGTA_2022_14_4_a3/
[1] Vasin A.A., Krasnoschekov P.S., Morozov V.V., Issledovanie operatsii, Izdatelskii tsentr «AKADEMIYa», M., 2008
[2] Vasin A.A., Morozov V.V., Teoriya igr i modeli matematicheskoi ekonomiki, MAKS-Press, M., 2008
[3] Germeier Yu.B., Vvedenie v teoriyu issledovaniya operatsii, Nauka, M., 1971
[4] Ogaryshev V.F., “Smeshannye strategii v odnom obobschenii zadachi Grossa”, Zhurn. vych. matem. i matem. fiz., 13:1 (1973), 59–70
[5] Perevozschikov A.G., Lesik I.A., “Prosteishaya model eshelonirovannoi protivozdushnoi oborony”, Vestnik TvGU. Seriya: Prikladnaya matematika, 2013, no. 3, 83–94
[6] Acemoglu D., Malekian A., Ozdaglar A., “Network security and contagion”, Journal of Economic Theory, 166 (2016), 536–585
[7] Blackett D.W., “Some Blotto games”, Naval Research Logistic Quarterly, 1:1 (1954), 55–60
[8] Clark D.J., Konrad K.A., “Asymmetric conflict: Weakest link against best shot”, Journal of Conflict Resolution, 51:3 (2007), 457–469
[9] Gross O., Wagner R., A continuous colonel Blotto game, U.S. air force Project RAND, research memorandum – 408, 1950
[10] Haller H., Hoyer B., “The common enemy effect under strategic network formation and disruption”, Journal of Economic Behavior and Organization, 162 (2019), 146–163
[11] Kovenock D., Roberson B., “Coalitional Colonel Blotto Games With Application to the Economics of Alliances”, Journal of Public Economic Theory, 14:4 (2012), 653–676
[12] Kovenock D., Roberson B., “The Optimal Defense of Networks of Targets”, Economic Inquiry, 56:4 (2018), 2195–2211
[13] Powell R., “Defending against terrorist attacks with limited resources”, American Political Science Review, 101:3 (2007), 527–541