|
|
|
|
LEADER |
04248nam a2200589 4500 |
001 |
978-3-319-92618-6 |
003 |
DE-He213 |
005 |
20191024181820.0 |
007 |
cr nn 008mamaa |
008 |
180709s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319926186
|9 978-3-319-92618-6
|
024 |
7 |
|
|a 10.1007/978-3-319-92618-6
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a HB144
|
072 |
|
7 |
|a PBUD
|2 bicssc
|
072 |
|
7 |
|a MAT011000
|2 bisacsh
|
072 |
|
7 |
|a PBUD
|2 thema
|
082 |
0 |
4 |
|a 519.3
|2 23
|
100 |
1 |
|
|a Zhang, Laobing.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Game Theory for Managing Security in Chemical Industrial Areas
|h [electronic resource] /
|c by Laobing Zhang, Genserik Reniers.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XIV, 157 p. 36 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advanced Sciences and Technologies for Security Applications,
|x 1613-5113
|
505 |
0 |
|
|a Introduction -- 1. Protecting Process Industries from Intentional Attacks: the State of the Art -- 2. Intelligent Interaction Modelling: Game Theory -- 3. Single Plant Protection: A Game-Theoretical Model for Improving Chemical Plant Protection -- 4. Single Plant Protection: Playing the Chemical Plant Protection Game with Distribution-free Uncertainties -- 5. Single Plant Protection: Playing the Chemical Plant Protection Game involving Attackers with Bounded Rationality -- 6. Multi-Plant Protection: A Game-Theoretical Model for Improving Chemical Clusters Patrolling -- 7. Case Studies. 8. Conclusions and Recommendations. .
|
520 |
|
|
|a This book systematically studies how game theory can be used to improve security in chemical industrial areas, capturing the intelligent interactions between security managers and potential adversaries. The recent unfortunate terrorist attacks on critical infrastructures show that adversaries are intelligent and strategic. Game theoretic models have been extensively used in some domains to model these strategic adversaries. However, there is a lack of such advanced models to be employed by chemical security managers. In this book, game theoretic models for protecting chemical plants as well as clusters are proposed. Different equilibrium concepts are explored, with user-friendly explanation of how to reflect them to realistic cases. Based on efficient analysis of the properties of security issues in chemical plants/clusters, models in this book are capable to support resources allocations, cost-effectiveness analysis, cooperation incentives and alike.
|
650 |
|
0 |
|a Game theory.
|
650 |
|
0 |
|a System safety.
|
650 |
|
0 |
|a Chemical engineering.
|
650 |
|
0 |
|a Operations research.
|
650 |
|
0 |
|a Decision making.
|
650 |
|
0 |
|a Mathematical models.
|
650 |
1 |
4 |
|a Game Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/W29020
|
650 |
2 |
4 |
|a Security Science and Technology.
|0 http://scigraph.springernature.com/things/product-market-codes/P31080
|
650 |
2 |
4 |
|a Industrial Chemistry/Chemical Engineering.
|0 http://scigraph.springernature.com/things/product-market-codes/C27000
|
650 |
2 |
4 |
|a Game Theory, Economics, Social and Behav. Sciences.
|0 http://scigraph.springernature.com/things/product-market-codes/M13011
|
650 |
2 |
4 |
|a Operations Research/Decision Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/521000
|
650 |
2 |
4 |
|a Mathematical Modeling and Industrial Mathematics.
|0 http://scigraph.springernature.com/things/product-market-codes/M14068
|
700 |
1 |
|
|a Reniers, Genserik.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319926179
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319926193
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030064730
|
830 |
|
0 |
|a Advanced Sciences and Technologies for Security Applications,
|x 1613-5113
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-92618-6
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ECF
|
950 |
|
|
|a Economics and Finance (Springer-41170)
|