These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

142 related articles for article (PubMed ID: 21801189)

  • 21. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.
    Dutt V; Ahn YS; Gonzalez C
    Hum Factors; 2013 Jun; 55(3):605-18. PubMed ID: 23829034
    [TBL] [Abstract][Full Text] [Related]  

  • 23. On being unpredictable and winning.
    De Dreu CKW; Gross J; Arciniegas A; Hoenig LC; Rojek-Giffin M; Scheepers DT
    J Pers Soc Psychol; 2024 Mar; 126(3):369-389. PubMed ID: 38647439
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Adversarial risk analysis with incomplete information: a level-kā€‚approach.
    Rothschild C; McLay L; Guikema S
    Risk Anal; 2012 Jul; 32(7):1219-31. PubMed ID: 22035126
    [TBL] [Abstract][Full Text] [Related]  

  • 25. The machine giveth and the machine taketh away: a parrot attack on clinical text deidentified with hiding in plain sight.
    Carrell DS; Cronkite DJ; Li MR; Nyemba S; Malin BA; Aberdeen JS; Hirschman L
    J Am Med Inform Assoc; 2019 Dec; 26(12):1536-1544. PubMed ID: 31390016
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Modelling and Research on Intuitionistic Fuzzy Goal-Based Attack and Defence Game for Infrastructure Networks.
    Li Z; Liu J; Dong Y; Ren J; Li W
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998250
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Probabilistic risk analysis and terrorism risk.
    Ezell BC; Bennett SP; von Winterfeldt D; Sokolowski J; Collins AJ
    Risk Anal; 2010 Apr; 30(4):575-89. PubMed ID: 20522198
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Applying decision tree induction for identification of important attributes in one-versus-one player interactions: a hockey exemplar.
    Morgan S; Williams MD; Barnes C
    J Sports Sci; 2013; 31(10):1031-7. PubMed ID: 23409787
    [TBL] [Abstract][Full Text] [Related]  

  • 29. When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time.
    Miller D; Wang Y; Kesidis G
    Neural Comput; 2019 Aug; 31(8):1624-1670. PubMed ID: 31260390
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Detection Games under Fully Active Adversaries.
    Tondi B; Merhav N; Barni M
    Entropy (Basel); 2018 Dec; 21(1):. PubMed ID: 33266739
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Adversarial risk analysis for counterterrorism modeling.
    Rios J; Rios Insua D
    Risk Anal; 2012 May; 32(5):894-915. PubMed ID: 22150163
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Optimal stopping analysis of a radiation detection system to protect cities from a nuclear terrorist attack.
    Atkinson MP; Cao Z; Wein LM
    Risk Anal; 2008 Apr; 28(2):353-71. PubMed ID: 18419654
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.
    Kroshl WM; Sarkani S; Mazzuchi TA
    Risk Anal; 2015 Sep; 35(9):1690-705. PubMed ID: 25683347
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Spatiotemporal characteristics of an attacker's strategy to pass a defender effectively in a computer-based one-on-one task.
    Tsutsui K; Shinya M; Kudo K
    Sci Rep; 2019 Nov; 9(1):17260. PubMed ID: 31754199
    [TBL] [Abstract][Full Text] [Related]  

  • 35. A Study on a Sequential One-Defender-N-Attacker Game.
    Xu Z; Zhuang J
    Risk Anal; 2019 Jun; 39(6):1414-1432. PubMed ID: 30602071
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks.
    Piccinelli R; Sansavini G; Lucchetti R; Zio E
    Risk Anal; 2017 Nov; 37(11):2182-2190. PubMed ID: 28230257
    [TBL] [Abstract][Full Text] [Related]  

  • 37. An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects.
    Aziz RA; He M; Zhuang J
    Risk Anal; 2020 Jul; 40(7):1481-1506. PubMed ID: 32426876
    [TBL] [Abstract][Full Text] [Related]  

  • 38. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution.
    Ni Z; Paul S
    IEEE Trans Neural Netw Learn Syst; 2019 Sep; 30(9):2684-2695. PubMed ID: 30624227
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers.
    Golalikhani M; Zhuang J
    Risk Anal; 2011 Apr; 31(4):533-47. PubMed ID: 21105882
    [TBL] [Abstract][Full Text] [Related]  

  • 40. A model for a smallpox-vaccination policy.
    Bozzette SA; Boer R; Bhatnagar V; Brower JL; Keeler EB; Morton SC; Stoto MA
    N Engl J Med; 2003 Jan; 348(5):416-25. PubMed ID: 12496353
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 8.