Adversarial risk analysis: An overview

D Banks, V Gallego, R Naveiro… - Wiley Interdisciplinary …, 2022 - Wiley Online Library
Adversarial risk analysis (ARA) is a relatively new area of research that informs decision‐
making when facing intelligent opponents and uncertain outcomes. It is a decision‐theoretic …

Modeling opponents in adversarial risk analysis

D Rios Insua, D Banks, J Rios - Risk Analysis, 2016 - Wiley Online Library
Adversarial risk analysis has been introduced as a framework to deal with risks derived from
intentional actions of adversaries. The analysis supports one of the decisionmakers, who …

Know your enemy: Conversational agents for security, education, training, and awareness at scale

JS Giboney, RM Schuetzler, GM Grimes - Computers & Security, 2023 - Elsevier
Social engineering attacks are widespread, costly, and challenging to mitigate through
technical means. Companies allocate considerable resources toward security education …

Manipulating hidden-Markov-model inferences by corrupting batch data

WN Caballero, JM Camacho, T Ekin… - Computers & Operations …, 2024 - Elsevier
Time-series models typically assume untainted and legitimate streams of data. However, a
self-interested adversary may have incentive to corrupt this data, thereby altering a decision …

Adversarial risk analysis: The Somali pirates case

JC Sevillano, D Rios Insua, J Rios - Decision Analysis, 2012 - pubsonline.informs.org
We show how adversarial risk analysis may cope with a current important security issue in
relation with piracy off the Somali coasts. Specifically, we describe how to support the owner …

International Series in Operations Research & Management Science

FS Hillier, CC Price - 2001 - Springer
Conic optimization is a significant and thriving research area within the optimization
community. Conic optimization is the general class of problems concerned with optimizing a …

Adversarial Risk Analysis with Incomplete Information: A Level‐k Approach

C Rothschild, L McLay… - Risk Analysis: An …, 2012 - Wiley Online Library
This article proposes, develops, and illustrates the application of level‐k game theory to
adversarial risk analysis. Level‐k reasoning, which assumes that players play strategically …

A behavioral approach to repeated Bayesian security games

W Caballero, J Cooley, D Banks… - The Annals of Applied …, 2024 - projecteuclid.org
The prevalence of security threats to organizational defense demands models that support
real-world policymaking. Security games are a potent tool in this regard; however, although …

Robust Adversarial Risk Analysis: A Level-k Approach

L McLay, C Rothschild, S Guikema - Decision Analysis, 2012 - pubsonline.informs.org
Adversarial risk analysis is an active and important area of decision analytic research. Both
single-actor decision analysis and multiple-actor game theory have been applied to this …

Deterrence against Terrorist Attacks in Sports‐Mega Events: A Method to Identify the Optimal Portfolio of Defensive Countermeasures

M Zawadzki, G Montibeller, B Cox, C Belderrain - Risk analysis, 2022 - Wiley Online Library
Sports mega‐events, such as the Olympic Games or the Super Bowl, are attractive targets
for terrorist organizations, due to their visibility, size, and number of people involved. Two …