BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

94 related articles for article (PubMed ID: 21388424)

  • 1. Defense resource distribution between protection and redundancy for constant resource stockpiling pace.
    Levitin G; Hausken K
    Risk Anal; 2011 Oct; 31(10):1632-45. PubMed ID: 21388424
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Resource distribution in multiple attacks with imperfect detection of the attack outcome.
    Levitin G; Hausken K
    Risk Anal; 2012 Feb; 32(2):304-18. PubMed ID: 21801189
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Choosing what to protect.
    Bier VM
    Risk Anal; 2007 Jun; 27(3):607-20. PubMed ID: 17640211
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Defender-Attacker Games with Asymmetric Player Utilities.
    Zhai Q; Peng R; Zhuang J
    Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Efficiency of even separation of parallel elements with variable contest intensity.
    Hausken K; Levitin G
    Risk Anal; 2008 Oct; 28(5):1477-86. PubMed ID: 18631300
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Resource distribution in multiple attacks against a single target.
    Levitin G; Hausken K
    Risk Anal; 2010 Aug; 30(8):1231-9. PubMed ID: 20412523
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Optimal resource allocation for defense of targets based on differing measures of attractiveness.
    Bier VM; Haphuriwat N; Menoyo J; Zimmerman R; Culpen AM
    Risk Anal; 2008 Jun; 28(3):763-70. PubMed ID: 18643831
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Robust allocation of a defensive budget considering an attacker's private information.
    Nikoofal ME; Zhuang J
    Risk Anal; 2012 May; 32(5):930-43. PubMed ID: 22050276
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Some limitations of "Risk = Threat x Vulnerability x Consequence" for risk analysis of terrorist attacks.
    Cox LA
    Risk Anal; 2008 Dec; 28(6):1749-61. PubMed ID: 19000071
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
    Guan P; Zhuang J
    Risk Anal; 2016 Apr; 36(4):776-91. PubMed ID: 26713543
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Risk-distortion analysis for video collusion attacks: a mouse-and-cat game.
    Chen Y; Lin WS; Liu KJ
    IEEE Trans Image Process; 2010 Jul; 19(7):1798-807. PubMed ID: 20227981
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Defender-Attacker Decision Tree Analysis to Combat Terrorism.
    Garcia RJ; von Winterfeldt D
    Risk Anal; 2016 Dec; 36(12):2258-2271. PubMed ID: 27037744
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers.
    Golalikhani M; Zhuang J
    Risk Anal; 2011 Apr; 31(4):533-47. PubMed ID: 21105882
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.
    Payyappalli VM; Zhuang J; Jose VRR
    Risk Anal; 2017 Nov; 37(11):2229-2245. PubMed ID: 28314059
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Upflow anaerobic sludge blanket reactor--a review.
    Bal AS; Dhagat NN
    Indian J Environ Health; 2001 Apr; 43(2):1-82. PubMed ID: 12397675
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Defensive Resource Allocation: The Roles of Forecast Information and Risk Control.
    Dong Y; Chen X; Hunt K; Zhuang J
    Risk Anal; 2021 Aug; 41(8):1304-1322. PubMed ID: 33175412
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Risk management frameworks for human health and environmental risks.
    Jardine C; Hrudey S; Shortreed J; Craig L; Krewski D; Furgal C; McColl S
    J Toxicol Environ Health B Crit Rev; 2003; 6(6):569-720. PubMed ID: 14698953
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Zero-determinant strategy in stochastic Stackelberg asymmetric security game.
    Cheng Z; Chen G; Hong Y
    Sci Rep; 2023 Jul; 13(1):11308. PubMed ID: 37438579
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.
    Kroshl WM; Sarkani S; Mazzuchi TA
    Risk Anal; 2015 Sep; 35(9):1690-705. PubMed ID: 25683347
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.