Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sascha Meng is active.

Publication


Featured researches published by Sascha Meng.


WIT Transactions on Information and Communication Technologies | 2014

A game-theoretic approach to assess adversarial risks

Sascha Meng; Marcus Wiens; Frank Schultmann

In our complex world today almost all critical infrastructures are interdependent and thus vulnerable to many different external and internal risks. To protect them against the greatest risks, a well-functioning risk management process is required to develop appropriate safety and security strategies. There are many wellestablished risk analysis methods existing. They predominantly apply empirical models and statistical data to quantify the risks. Within the realms of natural or aleatory risks this approach is considered suitable and functional. However, it could be a fatal flaw to apply such conventional, history-orientated models in order to assess risks that arise from intelligent adversaries such as terrorists, criminals or competitors. Approaches of classic risk analysis generally describe adversaries’ choices as random variables, thus excluding the adversaries’ behaviour and ability to adapt to security strategies. One possibility for considering human behaviour when analysing risks is the recourse to game theory. Game theory is the paradigmatic framework for strategic decision-making when two or more rational decision-makers (intelligent adversaries) are involved in cooperative or conflictive decision situations. In our study we propose an approach for combining a classic risk analysis method with a game-theoretic approach. Using a defenderoffender game as a basis, we simulate, exemplary for a terrorist attack against public transport, the behaviour and reactions (to applied security strategies of the defender) of a rational player acting as an adversary. Although risk analysis and game theory are very different methodologies, we show that linking them can significantly improve the quality of forecasts and risk assessments. If the behaviour and reactions of intelligent adversaries need to be considered, our approach contributes to enhance security through improving the allocation of scarce financial resources.


Operations Research Proceedings 2014 : Selected Papers of the Annual International Conference of the German Operations Research Society (GOR), RWTH Aachen University, Germany, September 2-5, 2014. Ed.: M. Lübbecke | 2016

Strategic Deterrence of Terrorist Attacks

Marcus Wiens; Sascha Meng; Frank Schultmann

Protection against terrorist threats has become an integral part of organisational and national security strategies. But research on adversarial risks is still dominated by approaches which focus too much on historical frequencies and which do not sufficiently account for the terrorists motives and the strategic component of the interaction. In this paper we model the classical risk analysis approach using a specific variant of adaptive play and compare it with a direct implementation approach. We find that the latter allows for a more purposeful use of security measures as defenders avoid to get caught in a “hare-tortoise-trap”. We specify the conditions under which the direct implementation outperforms adaptive play in the sense that it lowers the cost of defence at a given rate of deterrence. We analyse the robustness of our results and discuss the implications and requirements for practical application.


international conference on information systems | 2014

A multi-stage scenario construction approach for critical infrastructure protection

Frank Schätter; Sascha Meng; Marcus Wiens; Frank Schultmann


27th Annual Conference of the Society for Risk Analysis Europe, Östersund, Sweden, June 18–20, 2018 | 2018

Framing Effects in Defender-Attacker Games – Results of an Economic Lab Experiment

Sascha Meng; Marcus Wiens; Frank Schultmann


Security Research Conference : 10th Future Security, Berlin, September 15-17, 2015. Proceedings. Hrsg.: J. Beyerer | 2015

A transparent approach for prioritising security measures

Tim Müller; Sascha Meng; Wolfgang Raskob; Marcus Wiens; Frank Schultmann


Proceedings of the 5th International Disaster and Risk Conference, Davos, Switzerland, 24 August 2014 through 28 August 2014. Ed.: M. Stal | 2014

Risk Differentiation for Critical Infrastructure Protection

Sascha Meng; Marcus Wiens; Frank Schultmann


Archive | 2014

Guidebook for Enhancing Resilience of European Road Transport in Extreme Weather Events

Claus Doll; A. Kühn; A. Peters; I. Juga; Stephan T. Kral; R. Enei; F. Pietroni; E. Mitsakis; I. Stamos; Frank Schultmann; Marcus Wiens; Frank Schätter; Sascha Meng; Mariana Bartsch; K. Kynnös; A-M. Hietajärvi; J. Kostiainen; H. Mantsinen; V. Hinkka


Archive | 2014

DSM CIP: The RIKOV project, risks and costs of terrorist threats against public rail transport systems

L. Lin; Sascha Meng; S. Möhrle


A Quarterly Journal of Operations Research | 2014

Strategic Deterrence of Terrorist Attacks.

Marcus Wiens; Sascha Meng; Frank Schultmann


9th future security : proceedings / Security Research Conference, Berlin, September 16 - 18, 2014. Ed.: K. Thoma | 2014

Optimizing security vis-à-vis terrorist attacks. An application for public rail transport systems

Marcus Wiens; Bo Hu; Walter Schmitz; Sascha Meng; Stefan Pickl; Frank Schultmann

Collaboration


Dive into the Sascha Meng's collaboration.

Top Co-Authors

Avatar

Frank Schultmann

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Marcus Wiens

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Frank Schätter

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

T. Münzberg

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Tim Müller

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Wolfgang Raskob

Karlsruhe Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge