New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics (2405.19060v1)
Abstract: We consider an operational model of suicide bombing attacks -- an increasingly prevalent form of terrorism -- against specific targets, and the use of protective countermeasures based on the deployment of detectors over the area under threat. These detectors have to be carefully located in order to minimize the expected number of casualties or the economic damage suffered, resulting in a hard optimization problem for which different metaheuristics have been proposed. Rather than assuming random decisions by the attacker, the problem is approached by considering different models of the latter, whereby he takes informed decisions on which objective must be targeted and through which path it has to be reached based on knowledge on the importance or value of the objectives or on the defensive strategy of the defender (a scenario that can be regarded as an adversarial game). We consider four different algorithms, namely a greedy heuristic, a hill climber, tabu search and an evolutionary algorithm, and study their performance on a broad collection of problem instances trying to resemble different realistic settings such as a coastal area, a modern urban area, and the historic core of an old town. It is shown that the adversarial scenario is harder for all techniques, and that the evolutionary algorithm seems to adapt better to the complexity of the resulting search landscape.
- Aarts EHL, Lenstra JK (1997) Local Search in Combinatorial Optimization. John Wiley & Sons
- Abrahms M (2008) What terrorists really want: Terrorist motives and counterterrorism strategy. International Security 32(4):78–105
- Central Intelligence Agency (2003) National strategy for combating terrorism. https://www.cia.gov/news-information/cia-the-war-on-terrorism/Counter˙Terrorism˙Strategy.pdf, [Accessed 31 January 2018]
- Chicago Project on Security and Terrorism (CPOST) (2016) Suicide attack database (April 19, 2016 release). [Data File]. Retrieved from http://cpostdata.uchicago.edu/
- Cotta C, Gallardo JE (2017) Metaheuristic approaches to the placement of suicide bomber detectors. Journal of Heuristics DOI 10.1007/s10732-017-9335-z
- Eiben AE, Smith JE (2003) Introduction to Evolutionary Computing. SpringerVerlag
- Glover F (1989) Tabu search-part I. ORSA Journal of Computing 1:190–206
- Glover F (1990) Tabu search-part II. ORSA Journal of Computing 2:4–32
- Hoffman B (2003) The logic of suicide terrorism. The Atlantic. http://www.theatlantic.com/magazine/archive/2003/06/the-logic-of-suicide-terrorism/302739/, [Accessed 2 July 2016]
- Hoos H, Stützle T (2005) Stochastic Local Search. Foundations and Applications. Morgan Kaufmann
- Kaplan EH, Kress M (2005) Operational effectiveness of suicide-bomber-detector schemes: A best-case analysis. Proceedings of the National Academy of Sciences of the United States of America 102(29):10399–10404
- Leistedt SJ (2016) On the radicalization process. Journal of Forensic Sciences 61(6):1588–1591
- Rand Corporation (2009) RAND database of worldwide terrorism incidents. [Data File] http://smapp.rand.org/rwtid/search˙form.php
- Yan X, Nie X (2016) Optimal placement of multiple types of detectors under a small vessel attack threat to port security. Transportation Research Part E: Logistics and Transportation Review 93:71–94