?url_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adc&rft.relation=http%3A%2F%2Fmiis.maths.ox.ac.uk%2Fmiis%2F747%2F&rft.title=How+Do+We+Mitigate+Against+a+Marauding+Terrorist%3F&rft.creator=Zyskin%2C+Maxim&rft.creator=Nixon%2C+Adam&rft.creator=Dolniak%2C+Maria&rft.creator=Church%2C+Lewis&rft.creator=Roper%2C+Ian&rft.creator=Piwarska%2C+K.&rft.creator=Pooley%2C+Ben&rft.creator=Baker%2C+Simon&rft.creator=Hjorth%2C+P.&rft.creator=Roy%2C+Thomas&rft.subject=Aerospace+and+defence&rft.description=In+recent+years%2C+worldwide+terrorist+strategy+has+changed+from+long+term+plan-+ning+and+high+impact+attacks%2C+to+relatively+short-term+planning%2C+%E2%80%99marauding%E2%80%99+attacks.+In+other+words%2C+terrorist+attacks+from+2010+to+present+have+often+consisted+of+a+small+number+of+terrorists+in+densely+populated+public+spaces+actively+searching+out+people+to+maim+and+kill+with+weapons+that+are+har-+der+to+regulate%2C+such+as+knives+and+vehicles%2C+with+little+regard+for+their+own+survival.+This+begs+the+question%2C+therefore%2C+of+how+we+mitigate+against+these+%E2%80%99marauding+terrorists%E2%80%99.+If+we+assume+3+different+types+of+actors%3A+Public%2C+Ter-+rorists%2C+and+Responders%2C+and+assume+the+strategy+of+the+Terrorists+is+to+kill+as+many+people+as+possible+before+they+themselves+are+killed%2C+how+can+the+strategies+of+the+Public+and+Responders+(police%2C+bouncers+etc.)+be+optimised+to+minimise+loss+of+life%3F%0D%0AIn+this+report%2C+the+problem+at+hand+and+important+information+are+compiled+before+3+approaches+to+model+a+terrorist+attack+in+a+public+space+are+considered+-+a+Particle+Model%2C+a+Discrete+Network+Model%2C+and+a+Game+Simulation+model.+Whilst+this+is+by+no+means+a+complete+list+of+possible+models+of+a+terrorist+attack%2C+these+were+believed+to+be+models+that+could+be+developed+the+most+in+a+week+at+the+ESGI130+at+the+University+of+Warwick.+For+each+model+type%2C+we+first+consider+their+assumptions+and+suitability+to+the+problem%2C+then+model+the+scenario.+Finally%2C+we+consider+possible+extensions+to+each+model%2C+and+also+how+they+may+be+used+to+evaluate+the+most+effective+strategies+of+the+Public+and+Responders+given+the+information+available+to+them+at+any+one+time.&rft.date=2017&rft.type=Study+Group+Report&rft.type=NonPeerReviewed&rft.format=application%2Fpdf&rft.language=en&rft.identifier=http%3A%2F%2Fmiis.maths.ox.ac.uk%2Fmiis%2F747%2F1%2FCAST%2520ESGI%2520130%2520Report.pdf&rft.identifier=++Zyskin%2C+Maxim+and+Nixon%2C+Adam+and+Dolniak%2C+Maria+and+Church%2C+Lewis+and+Roper%2C+Ian+and+Piwarska%2C+K.+and+Pooley%2C+Ben+and+Baker%2C+Simon+and+Hjorth%2C+P.+and+Roy%2C+Thomas++(2017)+How+Do+We+Mitigate+Against+a+Marauding+Terrorist%3F++%5BStudy+Group+Report%5D+++++