<mets:mets OBJID="eprint_13857" LABEL="Eprints Item" xsi:schemaLocation="http://www.loc.gov/METS/ http://www.loc.gov/standards/mets/mets.xsd http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd" xmlns:mets="http://www.loc.gov/METS/" xmlns:mods="http://www.loc.gov/mods/v3" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><mets:metsHdr CREATEDATE="2024-01-01T21:21:27Z"><mets:agent ROLE="CUSTODIAN" TYPE="ORGANIZATION"><mets:name>IIASA Repository</mets:name></mets:agent></mets:metsHdr><mets:dmdSec ID="DMD_eprint_13857_mods"><mets:mdWrap MDTYPE="MODS"><mets:xmlData><mods:titleInfo><mods:title>Differential Terror Queue Games</mods:title></mods:titleInfo><mods:name type="personal"><mods:namePart type="given">S.</mods:namePart><mods:namePart type="family">Wrzaczek</mods:namePart><mods:role><mods:roleTerm type="text">author</mods:roleTerm></mods:role></mods:name><mods:name type="personal"><mods:namePart type="given">E.H.</mods:namePart><mods:namePart type="family">Kaplan</mods:namePart><mods:role><mods:roleTerm type="text">author</mods:roleTerm></mods:role></mods:name><mods:name type="personal"><mods:namePart type="given">J.P.</mods:namePart><mods:namePart type="family">Caulkins</mods:namePart><mods:role><mods:roleTerm type="text">author</mods:roleTerm></mods:role></mods:name><mods:name type="personal"><mods:namePart type="given">A.</mods:namePart><mods:namePart type="family">Seidl</mods:namePart><mods:role><mods:roleTerm type="text">author</mods:roleTerm></mods:role></mods:name><mods:name type="personal"><mods:namePart type="given">G.</mods:namePart><mods:namePart type="family">Feichtinger</mods:namePart><mods:role><mods:roleTerm type="text">author</mods:roleTerm></mods:role></mods:name><mods:abstract>We present models of differential terror queue games, wherein terrorists seek to determine optimal attack rates over time, while simultaneously the government develops optimal counterterror staffing levels. The number of successful and interdicted terror attacks is determined via an underlying dynamic terror queue model. Different information structures and commitment abilities derive from different assumptions regarding what the players in the game can and cannot deduce about the underlying model. We compare and explain the impact of different information structures, i.e., open loop, closed loop, and asymmetric. We characterize the optimal controls for both the terrorists and the government in terms of the associated state and costate variables and deduce the costate equations that must be solved numerically to yield solutions to the game for the different cases. Using recently assembled data describing both terror attack and staffing levels, we compare the differential game models to each other as well as to the optimal control model of Seidl et al. (Eur J Oper Res 248:246–256, 2016). The paper concludes with a discussion of the lessons learned from the entire modeling exercise.</mods:abstract><mods:originInfo><mods:dateIssued encoding="iso8601">2017-12-01</mods:dateIssued></mods:originInfo><mods:originInfo><mods:publisher>Springer USA</mods:publisher></mods:originInfo><mods:genre>Article</mods:genre></mets:xmlData></mets:mdWrap></mets:dmdSec><mets:amdSec ID="TMD_eprint_13857"><mets:rightsMD ID="rights_eprint_13857_mods"><mets:mdWrap MDTYPE="MODS"><mets:xmlData><mods:useAndReproduction>
<p xmlns="http://www.w3.org/1999/xhtml"><strong>For work being deposited by its own author:</strong>
In self-archiving this collection of files and associated bibliographic
metadata, I grant IIASA Repository the right to store
them and to make them permanently available publicly for free on-line.
I declare that this material is my own intellectual property and I
understand that IIASA Repository does not assume any
responsibility if there is any breach of copyright in distributing these
files or metadata. (All authors are urged to prominently assert their
copyright on the title page of their work.)</p>

<p xmlns="http://www.w3.org/1999/xhtml"><strong>For work being deposited by someone other than its
author:</strong> I hereby declare that the collection of files and
associated bibliographic metadata that I am archiving at
IIASA Repository) is in the public domain. If this is
not the case, I accept full responsibility for any breach of copyright
that distributing these files or metadata may entail.</p>

<p xmlns="http://www.w3.org/1999/xhtml">Clicking on the deposit button indicates your agreement to these
terms.</p>
    </mods:useAndReproduction></mets:xmlData></mets:mdWrap></mets:rightsMD></mets:amdSec><mets:fileSec></mets:fileSec><mets:structMap><mets:div DMDID="DMD_eprint_13857_mods" ADMID="TMD_eprint_13857"></mets:div></mets:structMap></mets:mets>