These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

146 related articles for article (PubMed ID: 21801189)

  • 1. Resource distribution in multiple attacks with imperfect detection of the attack outcome.
    Levitin G; Hausken K
    Risk Anal; 2012 Feb; 32(2):304-18. PubMed ID: 21801189
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Resource distribution in multiple attacks against a single target.
    Levitin G; Hausken K
    Risk Anal; 2010 Aug; 30(8):1231-9. PubMed ID: 20412523
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Choosing what to protect.
    Bier VM
    Risk Anal; 2007 Jun; 27(3):607-20. PubMed ID: 17640211
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Defender-Attacker Games with Asymmetric Player Utilities.
    Zhai Q; Peng R; Zhuang J
    Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Robust allocation of a defensive budget considering an attacker's private information.
    Nikoofal ME; Zhuang J
    Risk Anal; 2012 May; 32(5):930-43. PubMed ID: 22050276
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Defense resource distribution between protection and redundancy for constant resource stockpiling pace.
    Levitin G; Hausken K
    Risk Anal; 2011 Oct; 31(10):1632-45. PubMed ID: 21388424
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Efficiency of even separation of parallel elements with variable contest intensity.
    Hausken K; Levitin G
    Risk Anal; 2008 Oct; 28(5):1477-86. PubMed ID: 18631300
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
    Guan P; Zhuang J
    Risk Anal; 2016 Apr; 36(4):776-91. PubMed ID: 26713543
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Defender-Attacker Decision Tree Analysis to Combat Terrorism.
    Garcia RJ; von Winterfeldt D
    Risk Anal; 2016 Dec; 36(12):2258-2271. PubMed ID: 27037744
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory.
    Merrick JR; Leclerc P
    Risk Anal; 2016 Apr; 36(4):681-93. PubMed ID: 25039254
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Risk-distortion analysis for video collusion attacks: a mouse-and-cat game.
    Chen Y; Lin WS; Liu KJ
    IEEE Trans Image Process; 2010 Jul; 19(7):1798-807. PubMed ID: 20227981
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.
    Payyappalli VM; Zhuang J; Jose VRR
    Risk Anal; 2017 Nov; 37(11):2229-2245. PubMed ID: 28314059
    [TBL] [Abstract][Full Text] [Related]  

  • 13. How probabilistic risk assessment can mislead terrorism risk analysts.
    Brown GG; Cox LA
    Risk Anal; 2011 Feb; 31(2):196-204. PubMed ID: 20846169
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Some limitations of "Risk = Threat x Vulnerability x Consequence" for risk analysis of terrorist attacks.
    Cox LA
    Risk Anal; 2008 Dec; 28(6):1749-61. PubMed ID: 19000071
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Optimal resource allocation for defense of targets based on differing measures of attractiveness.
    Bier VM; Haphuriwat N; Menoyo J; Zimmerman R; Culpen AM
    Risk Anal; 2008 Jun; 28(3):763-70. PubMed ID: 18643831
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Attack-Defense Game Model with Multi-Type Attackers Considering Information Dilemma.
    Qi G; Li J; Xu C; Chen G; Yang K
    Entropy (Basel); 2022 Dec; 25(1):. PubMed ID: 36673201
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Estimating conditional probabilities of terrorist attacks: modeling adversaries with uncertain value tradeoffs.
    Levine ES
    Risk Anal; 2012 Feb; 32(2):294-303. PubMed ID: 21801187
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Zero-determinant strategy in stochastic Stackelberg asymmetric security game.
    Cheng Z; Chen G; Hong Y
    Sci Rep; 2023 Jul; 13(1):11308. PubMed ID: 37438579
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism.
    Mazicioglu D; Merrick JRW
    Risk Anal; 2018 May; 38(5):962-977. PubMed ID: 28881489
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.