BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

201 related articles for article (PubMed ID: 22050276)

  • 1. Robust allocation of a defensive budget considering an attacker's private information.
    Nikoofal ME; Zhuang J
    Risk Anal; 2012 May; 32(5):930-43. PubMed ID: 22050276
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Optimal resource allocation for defense of targets based on differing measures of attractiveness.
    Bier VM; Haphuriwat N; Menoyo J; Zimmerman R; Culpen AM
    Risk Anal; 2008 Jun; 28(3):763-70. PubMed ID: 18643831
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers.
    Golalikhani M; Zhuang J
    Risk Anal; 2011 Apr; 31(4):533-47. PubMed ID: 21105882
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cost of equity in homeland security resource allocation in the face of a strategic attacker.
    Shan X; Zhuang J
    Risk Anal; 2013 Jun; 33(6):1083-99. PubMed ID: 23256552
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Choosing what to protect.
    Bier VM
    Risk Anal; 2007 Jun; 27(3):607-20. PubMed ID: 17640211
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Defender-Attacker Games with Asymmetric Player Utilities.
    Zhai Q; Peng R; Zhuang J
    Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Resource distribution in multiple attacks with imperfect detection of the attack outcome.
    Levitin G; Hausken K
    Risk Anal; 2012 Feb; 32(2):304-18. PubMed ID: 21801189
    [TBL] [Abstract][Full Text] [Related]  

  • 9. An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects.
    Aziz RA; He M; Zhuang J
    Risk Anal; 2020 Jul; 40(7):1481-1506. PubMed ID: 32426876
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
    Guan P; Zhuang J
    Risk Anal; 2016 Apr; 36(4):776-91. PubMed ID: 26713543
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.
    Payyappalli VM; Zhuang J; Jose VRR
    Risk Anal; 2017 Nov; 37(11):2229-2245. PubMed ID: 28314059
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A value model for evaluating homeland security decisions.
    Keeney RL; von Winterfeldt D
    Risk Anal; 2011 Sep; 31(9):1470-87. PubMed ID: 21388426
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Reasons for secrecy and deception in homeland-security resource allocation.
    Zhuang J; Bier VM
    Risk Anal; 2010 Dec; 30(12):1737-43. PubMed ID: 20626681
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Adversarial risk analysis for counterterrorism modeling.
    Rios J; Rios Insua D
    Risk Anal; 2012 May; 32(5):894-915. PubMed ID: 22150163
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Defender-Attacker Decision Tree Analysis to Combat Terrorism.
    Garcia RJ; von Winterfeldt D
    Risk Anal; 2016 Dec; 36(12):2258-2271. PubMed ID: 27037744
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Zero-determinant strategy in stochastic Stackelberg asymmetric security game.
    Cheng Z; Chen G; Hong Y
    Sci Rep; 2023 Jul; 13(1):11308. PubMed ID: 37438579
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution.
    Ni Z; Paul S
    IEEE Trans Neural Netw Learn Syst; 2019 Sep; 30(9):2684-2695. PubMed ID: 30624227
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism.
    Mazicioglu D; Merrick JRW
    Risk Anal; 2018 May; 38(5):962-977. PubMed ID: 28881489
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Attack-Defense Game Model with Multi-Type Attackers Considering Information Dilemma.
    Qi G; Li J; Xu C; Chen G; Yang K
    Entropy (Basel); 2022 Dec; 25(1):. PubMed ID: 36673201
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory.
    Merrick JR; Leclerc P
    Risk Anal; 2016 Apr; 36(4):681-93. PubMed ID: 25039254
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.