137 related articles for article (PubMed ID: 17640211)
1. Choosing what to protect.
Bier VM
Risk Anal; 2007 Jun; 27(3):607-20. PubMed ID: 17640211
[TBL] [Abstract][Full Text] [Related]
2. Resource distribution in multiple attacks with imperfect detection of the attack outcome.
Levitin G; Hausken K
Risk Anal; 2012 Feb; 32(2):304-18. PubMed ID: 21801189
[TBL] [Abstract][Full Text] [Related]
3. Robust allocation of a defensive budget considering an attacker's private information.
Nikoofal ME; Zhuang J
Risk Anal; 2012 May; 32(5):930-43. PubMed ID: 22050276
[TBL] [Abstract][Full Text] [Related]
4. Defender-Attacker Games with Asymmetric Player Utilities.
Zhai Q; Peng R; Zhuang J
Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
[TBL] [Abstract][Full Text] [Related]
5. Optimal resource allocation for defense of targets based on differing measures of attractiveness.
Bier VM; Haphuriwat N; Menoyo J; Zimmerman R; Culpen AM
Risk Anal; 2008 Jun; 28(3):763-70. PubMed ID: 18643831
[TBL] [Abstract][Full Text] [Related]
6. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers.
Golalikhani M; Zhuang J
Risk Anal; 2011 Apr; 31(4):533-47. PubMed ID: 21105882
[TBL] [Abstract][Full Text] [Related]
7. Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.
Payyappalli VM; Zhuang J; Jose VRR
Risk Anal; 2017 Nov; 37(11):2229-2245. PubMed ID: 28314059
[TBL] [Abstract][Full Text] [Related]
8. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
Guan P; Zhuang J
Risk Anal; 2016 Apr; 36(4):776-91. PubMed ID: 26713543
[TBL] [Abstract][Full Text] [Related]
9. Some limitations of "Risk = Threat x Vulnerability x Consequence" for risk analysis of terrorist attacks.
Cox LA
Risk Anal; 2008 Dec; 28(6):1749-61. PubMed ID: 19000071
[TBL] [Abstract][Full Text] [Related]
10. Zero-determinant strategy in stochastic Stackelberg asymmetric security game.
Cheng Z; Chen G; Hong Y
Sci Rep; 2023 Jul; 13(1):11308. PubMed ID: 37438579
[TBL] [Abstract][Full Text] [Related]
11. Defense resource distribution between protection and redundancy for constant resource stockpiling pace.
Levitin G; Hausken K
Risk Anal; 2011 Oct; 31(10):1632-45. PubMed ID: 21388424
[TBL] [Abstract][Full Text] [Related]
12. Defender-Attacker Decision Tree Analysis to Combat Terrorism.
Garcia RJ; von Winterfeldt D
Risk Anal; 2016 Dec; 36(12):2258-2271. PubMed ID: 27037744
[TBL] [Abstract][Full Text] [Related]
13. Interpersonal coordination tendencies supporting the creation/prevention of goal scoring opportunities in futsal.
Vilar L; Araújo D; Davids K; Travassos B; Duarte R; Parreira J
Eur J Sport Sci; 2014; 14(1):28-35. PubMed ID: 24533492
[TBL] [Abstract][Full Text] [Related]
14. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
Moisan F; Gonzalez C
Front Psychol; 2017; 8():982. PubMed ID: 28690557
[TBL] [Abstract][Full Text] [Related]
15. An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects.
Aziz RA; He M; Zhuang J
Risk Anal; 2020 Jul; 40(7):1481-1506. PubMed ID: 32426876
[TBL] [Abstract][Full Text] [Related]
16. Risk-distortion analysis for video collusion attacks: a mouse-and-cat game.
Chen Y; Lin WS; Liu KJ
IEEE Trans Image Process; 2010 Jul; 19(7):1798-807. PubMed ID: 20227981
[TBL] [Abstract][Full Text] [Related]
17. Resource distribution in multiple attacks against a single target.
Levitin G; Hausken K
Risk Anal; 2010 Aug; 30(8):1231-9. PubMed ID: 20412523
[TBL] [Abstract][Full Text] [Related]
18. Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism.
Mazicioglu D; Merrick JRW
Risk Anal; 2018 May; 38(5):962-977. PubMed ID: 28881489
[TBL] [Abstract][Full Text] [Related]
19. On being unpredictable and winning.
De Dreu CKW; Gross J; Arciniegas A; Hoenig LC; Rojek-Giffin M; Scheepers DT
J Pers Soc Psychol; 2024 Mar; 126(3):369-389. PubMed ID: 38647439
[TBL] [Abstract][Full Text] [Related]
20. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.
Kroshl WM; Sarkani S; Mazzuchi TA
Risk Anal; 2015 Sep; 35(9):1690-705. PubMed ID: 25683347
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]