201 related articles for article (PubMed ID: 22050276)
1. Robust allocation of a defensive budget considering an attacker's private information.
Nikoofal ME; Zhuang J
Risk Anal; 2012 May; 32(5):930-43. PubMed ID: 22050276
[TBL] [Abstract][Full Text] [Related]
2. Optimal resource allocation for defense of targets based on differing measures of attractiveness.
Bier VM; Haphuriwat N; Menoyo J; Zimmerman R; Culpen AM
Risk Anal; 2008 Jun; 28(3):763-70. PubMed ID: 18643831
[TBL] [Abstract][Full Text] [Related]
3. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers.
Golalikhani M; Zhuang J
Risk Anal; 2011 Apr; 31(4):533-47. PubMed ID: 21105882
[TBL] [Abstract][Full Text] [Related]
4. Cost of equity in homeland security resource allocation in the face of a strategic attacker.
Shan X; Zhuang J
Risk Anal; 2013 Jun; 33(6):1083-99. PubMed ID: 23256552
[TBL] [Abstract][Full Text] [Related]
5. Choosing what to protect.
Bier VM
Risk Anal; 2007 Jun; 27(3):607-20. PubMed ID: 17640211
[TBL] [Abstract][Full Text] [Related]
6. Defender-Attacker Games with Asymmetric Player Utilities.
Zhai Q; Peng R; Zhuang J
Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
[TBL] [Abstract][Full Text] [Related]
7. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
Moisan F; Gonzalez C
Front Psychol; 2017; 8():982. PubMed ID: 28690557
[TBL] [Abstract][Full Text] [Related]
8. Resource distribution in multiple attacks with imperfect detection of the attack outcome.
Levitin G; Hausken K
Risk Anal; 2012 Feb; 32(2):304-18. PubMed ID: 21801189
[TBL] [Abstract][Full Text] [Related]
9. An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects.
Aziz RA; He M; Zhuang J
Risk Anal; 2020 Jul; 40(7):1481-1506. PubMed ID: 32426876
[TBL] [Abstract][Full Text] [Related]
10. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
Guan P; Zhuang J
Risk Anal; 2016 Apr; 36(4):776-91. PubMed ID: 26713543
[TBL] [Abstract][Full Text] [Related]
11. Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.
Payyappalli VM; Zhuang J; Jose VRR
Risk Anal; 2017 Nov; 37(11):2229-2245. PubMed ID: 28314059
[TBL] [Abstract][Full Text] [Related]
12. A value model for evaluating homeland security decisions.
Keeney RL; von Winterfeldt D
Risk Anal; 2011 Sep; 31(9):1470-87. PubMed ID: 21388426
[TBL] [Abstract][Full Text] [Related]
13. Reasons for secrecy and deception in homeland-security resource allocation.
Zhuang J; Bier VM
Risk Anal; 2010 Dec; 30(12):1737-43. PubMed ID: 20626681
[TBL] [Abstract][Full Text] [Related]
14. Adversarial risk analysis for counterterrorism modeling.
Rios J; Rios Insua D
Risk Anal; 2012 May; 32(5):894-915. PubMed ID: 22150163
[TBL] [Abstract][Full Text] [Related]
15. Defender-Attacker Decision Tree Analysis to Combat Terrorism.
Garcia RJ; von Winterfeldt D
Risk Anal; 2016 Dec; 36(12):2258-2271. PubMed ID: 27037744
[TBL] [Abstract][Full Text] [Related]
16. Zero-determinant strategy in stochastic Stackelberg asymmetric security game.
Cheng Z; Chen G; Hong Y
Sci Rep; 2023 Jul; 13(1):11308. PubMed ID: 37438579
[TBL] [Abstract][Full Text] [Related]
17. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution.
Ni Z; Paul S
IEEE Trans Neural Netw Learn Syst; 2019 Sep; 30(9):2684-2695. PubMed ID: 30624227
[TBL] [Abstract][Full Text] [Related]
18. Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism.
Mazicioglu D; Merrick JRW
Risk Anal; 2018 May; 38(5):962-977. PubMed ID: 28881489
[TBL] [Abstract][Full Text] [Related]
19. Attack-Defense Game Model with Multi-Type Attackers Considering Information Dilemma.
Qi G; Li J; Xu C; Chen G; Yang K
Entropy (Basel); 2022 Dec; 25(1):. PubMed ID: 36673201
[TBL] [Abstract][Full Text] [Related]
20. Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory.
Merrick JR; Leclerc P
Risk Anal; 2016 Apr; 36(4):681-93. PubMed ID: 25039254
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]