Game Theory for Managing Security in Chemical Industrial Areas Game Theory for Managing Security in Chemical Industrial Areas
Advanced Sciences and Technologies for Security Applications

Game Theory for Managing Security in Chemical Industrial Areas

    • USD 39.99
    • USD 39.99

Descripción editorial

This book systematically studies how game theory can be used to improve security in chemical industrial areas, capturing the intelligent interactions between security managers and potential adversaries. The recent unfortunate terrorist attacks on critical infrastructures show that adversaries are intelligent and strategic. Game theoretic models have been extensively used in some domains to model these strategic adversaries. However, there is a lack of such advanced models to be employed by chemical security managers. 

In this book, game theoretic models for protecting chemical plants as well as clusters are proposed. Different equilibrium concepts are explored, with user-friendly explanation of how to reflect them to realistic cases. Based on efficient analysis of the properties of security issues in chemical plants/clusters, models in this book are capable to support resources allocations, cost-effectiveness analysis, cooperation incentives and alike.

GÉNERO
Ciencia y naturaleza
PUBLICADO
2018
9 de julio
IDIOMA
EN
Inglés
EXTENSIÓN
171
Páginas
EDITORIAL
Springer International Publishing
VENDEDOR
Springer Nature B.V.
TAMAÑO
19.7
MB
Transnational Unconventional Organized Crime: A National and Global Security Concern Transnational Unconventional Organized Crime: A National and Global Security Concern
2025
Transnational Unconventional Organized Crime: A National and Global Security Concern Transnational Unconventional Organized Crime: A National and Global Security Concern
2025
Autonomous Revolution: Strategies, Threats and Challenges Autonomous Revolution: Strategies, Threats and Challenges
2025
Tech Enabled Global Health Security Tech Enabled Global Health Security
2025
6G Cyber Security Resilience: Trends and Challenges 6G Cyber Security Resilience: Trends and Challenges
2025
Securing Our Future Securing Our Future
2025