94 related articles for article (PubMed ID: 21388424)
1. Defense resource distribution between protection and redundancy for constant resource stockpiling pace.
Levitin G; Hausken K
Risk Anal; 2011 Oct; 31(10):1632-45. PubMed ID: 21388424
[TBL] [Abstract][Full Text] [Related]
2. Resource distribution in multiple attacks with imperfect detection of the attack outcome.
Levitin G; Hausken K
Risk Anal; 2012 Feb; 32(2):304-18. PubMed ID: 21801189
[TBL] [Abstract][Full Text] [Related]
3. Choosing what to protect.
Bier VM
Risk Anal; 2007 Jun; 27(3):607-20. PubMed ID: 17640211
[TBL] [Abstract][Full Text] [Related]
4. Defender-Attacker Games with Asymmetric Player Utilities.
Zhai Q; Peng R; Zhuang J
Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
[TBL] [Abstract][Full Text] [Related]
5. Efficiency of even separation of parallel elements with variable contest intensity.
Hausken K; Levitin G
Risk Anal; 2008 Oct; 28(5):1477-86. PubMed ID: 18631300
[TBL] [Abstract][Full Text] [Related]
6. Resource distribution in multiple attacks against a single target.
Levitin G; Hausken K
Risk Anal; 2010 Aug; 30(8):1231-9. PubMed ID: 20412523
[TBL] [Abstract][Full Text] [Related]
7. Optimal resource allocation for defense of targets based on differing measures of attractiveness.
Bier VM; Haphuriwat N; Menoyo J; Zimmerman R; Culpen AM
Risk Anal; 2008 Jun; 28(3):763-70. PubMed ID: 18643831
[TBL] [Abstract][Full Text] [Related]
8. Robust allocation of a defensive budget considering an attacker's private information.
Nikoofal ME; Zhuang J
Risk Anal; 2012 May; 32(5):930-43. PubMed ID: 22050276
[TBL] [Abstract][Full Text] [Related]
9. Some limitations of "Risk = Threat x Vulnerability x Consequence" for risk analysis of terrorist attacks.
Cox LA
Risk Anal; 2008 Dec; 28(6):1749-61. PubMed ID: 19000071
[TBL] [Abstract][Full Text] [Related]
10. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
Guan P; Zhuang J
Risk Anal; 2016 Apr; 36(4):776-91. PubMed ID: 26713543
[TBL] [Abstract][Full Text] [Related]
11. Risk-distortion analysis for video collusion attacks: a mouse-and-cat game.
Chen Y; Lin WS; Liu KJ
IEEE Trans Image Process; 2010 Jul; 19(7):1798-807. PubMed ID: 20227981
[TBL] [Abstract][Full Text] [Related]
12. Defender-Attacker Decision Tree Analysis to Combat Terrorism.
Garcia RJ; von Winterfeldt D
Risk Anal; 2016 Dec; 36(12):2258-2271. PubMed ID: 27037744
[TBL] [Abstract][Full Text] [Related]
13. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
Moisan F; Gonzalez C
Front Psychol; 2017; 8():982. PubMed ID: 28690557
[TBL] [Abstract][Full Text] [Related]
14. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers.
Golalikhani M; Zhuang J
Risk Anal; 2011 Apr; 31(4):533-47. PubMed ID: 21105882
[TBL] [Abstract][Full Text] [Related]
15. Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.
Payyappalli VM; Zhuang J; Jose VRR
Risk Anal; 2017 Nov; 37(11):2229-2245. PubMed ID: 28314059
[TBL] [Abstract][Full Text] [Related]
16. Upflow anaerobic sludge blanket reactor--a review.
Bal AS; Dhagat NN
Indian J Environ Health; 2001 Apr; 43(2):1-82. PubMed ID: 12397675
[TBL] [Abstract][Full Text] [Related]
17. Defensive Resource Allocation: The Roles of Forecast Information and Risk Control.
Dong Y; Chen X; Hunt K; Zhuang J
Risk Anal; 2021 Aug; 41(8):1304-1322. PubMed ID: 33175412
[TBL] [Abstract][Full Text] [Related]
18. Risk management frameworks for human health and environmental risks.
Jardine C; Hrudey S; Shortreed J; Craig L; Krewski D; Furgal C; McColl S
J Toxicol Environ Health B Crit Rev; 2003; 6(6):569-720. PubMed ID: 14698953
[TBL] [Abstract][Full Text] [Related]
19. Zero-determinant strategy in stochastic Stackelberg asymmetric security game.
Cheng Z; Chen G; Hong Y
Sci Rep; 2023 Jul; 13(1):11308. PubMed ID: 37438579
[TBL] [Abstract][Full Text] [Related]
20. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.
Kroshl WM; Sarkani S; Mazzuchi TA
Risk Anal; 2015 Sep; 35(9):1690-705. PubMed ID: 25683347
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]