{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:27:49Z","timestamp":1771003669761,"version":"3.50.1"},"reference-count":24,"publisher":"SAGE Publications","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2021,11,1]]},"abstract":"<jats:p>As the current society is increasingly facing major challenges from extremism and terrorism, protecting key urban public facilities and important targets from destruction is an important challenge facing the security departments of all countries. Based on real scene, this paper conducts researches on anti-terrorism security game algorithms and emergency response models in response to the three key links of before, during and after terrorist attacks. First of all, this paper constructs a multi-round joint attack game and emergency response model based on cooperation, establishes the optimization problem of solving the defender\u2019s optimal strategy in mathematical form, and then obtains the optimal defense strategy. Secondly, in response to the fact that terrorists are not completely rational, a new hybrid model is constructed to propose an efficient allocation and scheduling algorithm for safe resources in response to terrorist attacks. Thirdly, a model of crowd evacuation strategy after a terrorist attack is built based on the problem of crowd evacuation in multiple rounds of premeditated cooperative attacks. Finally, taking the area of the first ring of a certain city as a real scene, a complete game system of the whole process is constructed, and the game effectiveness evaluation of the existing security resource allocation scheme in the first ring area is carried out. Through the research of this thesis, the author puts forward some new technical ideas for the current society\u2019s anti-terrorism governance, and hopes to provide some technical references for the decision-making of security agencies.<\/jats:p>","DOI":"10.3233\/jcm-215031","type":"journal-article","created":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T05:22:47Z","timestamp":1624684967000},"page":"1497-1508","source":"Crossref","is-referenced-by-count":0,"title":["An automatic decision algorithm and simulation performance analysis for public safety"],"prefix":"10.1177","volume":"21","author":[{"given":"Xiangwei","family":"Qi","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering, Xinjiang University, Urumqi, Xinjiang 830046, China"},{"name":"College of Computer Science and Technology, Xinjiang Normal University, Urumqi, Xinjiang 830054, China"},{"name":"The Base of Kazakh and Kirghiz Language of National Language Resource Monitoring and Research Center on Minority Languages, Urumqi, Xinjiang 830046, China"}]},{"given":"Weimin","family":"Pan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Xinjiang Normal University, Urumqi, Xinjiang 830054, China"}]},{"given":"Bingcai","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Xinjiang Normal University, Urumqi, Xinjiang 830054, China"},{"name":"College of Computer Science and Technology, Dalian University of Technology, Dalian, Liaoning 116024, China"}]},{"given":"Gulila","family":"Altenbek","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Xinjiang University, Urumqi, Xinjiang 830046, China"},{"name":"The Base of Kazakh and Kirghiz Language of National Language Resource Monitoring and Research Center on Minority Languages, Urumqi, Xinjiang 830046, China"},{"name":"Xinjiang Laboratory of Multi-language Information Technology, Urumqi, Xinjiang 830046, China"}]}],"member":"179","reference":[{"issue":"1","key":"10.3233\/JCM-215031_ref1","first-page":"203","article-title":"Current situation of terrorism in southeast asia and its impact on china\u2019s national security","volume":"4","author":"Dai","year":"2017","journal-title":"Criminology Forume"},{"issue":"2","key":"10.3233\/JCM-215031_ref2","first-page":"121","article-title":"Review of security game theory research","volume":"1","author":"Wang","year":"2015","journal-title":"Journal of Command and Control"},{"issue":"2","key":"10.3233\/JCM-215031_ref3","first-page":"108","article-title":"Model and algorithms for integrated open location and routing problem in emergency logistics under earthquake","volume":"30","author":"Wang","year":"2016","journal-title":"Journal of Industrial Engineering and Engineering Management"},{"issue":"2","key":"10.3233\/JCM-215031_ref4","first-page":"464","article-title":"Optimization model and application of anti-terrorist facilities location and resource scheduling under continuous terrorist attacks","volume":"36","author":"Cai","year":"2016","journal-title":"Systems Engineering \u2013 Theory & Practice"},{"key":"10.3233\/JCM-215031_ref5","doi-asserted-by":"crossref","unstructured":"M.F. Balcan, A. Blum, N. Haghtalab and A.D. Procaccia, Commitment without regrets: Online learning in stackelberg security games, in: Proceedings of the Sixteenth ACM Conference on Economics and Computation, 2015, pp. 61\u201378.","DOI":"10.1145\/2764468.2764478"},{"key":"10.3233\/JCM-215031_ref6","unstructured":"F. Fei et al., Deploying Paws: Field optimization of the protection assistant for wildlife security, in: Proceedings of the Twenty-Eighth Innovative Applications of Artificial Intelligence Conference, 2016, pp. 101\u2013109."},{"key":"10.3233\/JCM-215031_ref7","unstructured":"Q.Y. Guo, B. An, V. Yevgeniy, T.T. Long, J.R. Gan and C.Y. Miao, Coalitional security games, in: Proceedings of the 15th International Conference on Autonomous Agents and Multiagent Systems, 2016, pp. 159\u2013167."},{"key":"10.3233\/JCM-215031_ref8","doi-asserted-by":"crossref","unstructured":"A. Laszka, B. Potteiger, Y. Vorobeychik, S. Amin and X.F. Koutsoukos, Vulnerability of transportation networks to traffic-signal tampering, in: Proceedings of ACM\/IEEE 7th International Conference on Cyber-Physical Systems, 2016, pp. 1\u201310.","DOI":"10.1109\/ICCPS.2016.7479122"},{"key":"10.3233\/JCM-215031_ref9","first-page":"201","article-title":"Location of terror response facilities","volume":"1","author":"Xiang","year":"2015","journal-title":"Management Engineering"},{"key":"10.3233\/JCM-215031_ref10","unstructured":"Q. Guo, B. An, Y. Zick et al., Optimal interdiction of illegal network flow, in: International Joint Conference on Artificial Intelligence, 2016, pp. 507\u2013513."},{"issue":"6","key":"10.3233\/JCM-215031_ref11","first-page":"3","article-title":"A moving target defense technique based on Stackelberg-Markov nonreciprocal tripartite game model","volume":"42","author":"Che","year":"2019","journal-title":"Chinese Journal of Computers"},{"issue":"7","key":"10.3233\/JCM-215031_ref12","first-page":"761","article-title":"Dynamic complexity of Stackelberg model under different rational expectations","volume":"37","author":"Dong","year":"2017","journal-title":"System Engineering-Theory & Practice"},{"key":"10.3233\/JCM-215031_ref14","unstructured":"S. Wang and H.W. Jiang, Research on application of genetic-ant colony algorithm in path planning of emergency materials, Computer Applications and Software 35(9) (2018)."},{"key":"10.3233\/JCM-215031_ref15","unstructured":"F. Yue, J.M. He, Y. Sun and X.D. Liu, Research on ant colony algorithm for emergency resource scheduling with stochastic path time, Decision Participation 15(32) (2011)."},{"issue":"8","key":"10.3233\/JCM-215031_ref16","first-page":"478","article-title":"Game model and optimization of emergency resource scheduling for multi-disaster point demand","volume":"24","author":"Yang","year":"2016","journal-title":"Chinese Journal of Management Science"},{"key":"10.3233\/JCM-215031_ref18","first-page":"1","article-title":"New features and developing trend of international terrorism","volume":"11","author":"Liu","year":"2015","journal-title":"China Soft Science"},{"key":"10.3233\/JCM-215031_ref19","doi-asserted-by":"crossref","unstructured":"Y. Yin, B. An and M. Jain, Game-theoretic resource allocation for protecting large public events, in: AAAI Conference on Artificial Intelligence, 2014, pp. 165\u2013166.","DOI":"10.1609\/aaai.v28i1.8794"},{"key":"10.3233\/JCM-215031_ref20","unstructured":"P. Paruchuri and J.P. Pearce, Playing games for security: an efficient exact algorithm for solving bayesian stackelberg games, in: Proceedings of the 7th International Joint Con-ference on Autonomous Agents and Multiagent Systems, 2008, pp. 895\u2013902."},{"key":"10.3233\/JCM-215031_ref21","unstructured":"M. Jain and D. Korzhyk, A double oracle algorithm for zero-sum security games on graphs, in: Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems, 2011, pp. 327\u2013334."},{"key":"10.3233\/JCM-215031_ref22","unstructured":"M. Jain and V. Conitzer, Security scheduling for real-world net-works, in: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-Agent Systems, 2013, pp. 215\u2013222."},{"key":"10.3233\/JCM-215031_ref25","unstructured":"E. Shieh, B. An, R. Yang et al., PROTECT: a deployed game theoretic system to protect the ports of the United States, in: International Conference on Autonomous Agents and Multiagent Systems, 2012, pp. 13\u201320."},{"key":"10.3233\/JCM-215031_ref26","unstructured":"M. Jain, V. Conitzer and M. Tambe, Security scheduling for real-world networks, in: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems, 2013, pp. 215\u2013222."},{"key":"10.3233\/JCM-215031_ref27","doi-asserted-by":"crossref","unstructured":"Y. Yin, B. An and M. Jain, Game-theoretic resource allocation for protecting large public events, in: AAAI Conference on Artificial Intelligence, 2014, pp. 141\u2013146.","DOI":"10.1609\/aaai.v28i1.8794"},{"key":"10.3233\/JCM-215031_ref28","unstructured":"Y. Yin, H. Xu and J. Gain, Computing optimal mixed strategies for security games with dynamic payoffs, in: International Conference on Artificial Intelligence, 2015, pp. 681\u2013687."}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JCM-215031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:32:31Z","timestamp":1771000351000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JCM-215031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,1]]},"references-count":24,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.3233\/jcm-215031","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,1]]}}}