BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

170 related articles for article (PubMed ID: 25683347)

  • 1. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.
    Kroshl WM; Sarkani S; Mazzuchi TA
    Risk Anal; 2015 Sep; 35(9):1690-705. PubMed ID: 25683347
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers.
    Golalikhani M; Zhuang J
    Risk Anal; 2011 Apr; 31(4):533-47. PubMed ID: 21105882
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A game theoretical model for location of terror response facilities under capacitated resources.
    Meng L; Kang Q; Han C; Xu W; Wu Q
    ScientificWorldJournal; 2013; 2013():742845. PubMed ID: 24459446
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things.
    Liu B; Xu H; Zhou X
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30469434
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Robust allocation of a defensive budget considering an attacker's private information.
    Nikoofal ME; Zhuang J
    Risk Anal; 2012 May; 32(5):930-43. PubMed ID: 22050276
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects.
    Aziz RA; He M; Zhuang J
    Risk Anal; 2020 Jul; 40(7):1481-1506. PubMed ID: 32426876
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Characterizing contract-based multiagent resource allocation in networks.
    An B; Lesser V
    IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):575-86. PubMed ID: 19955040
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
    Guan P; Zhuang J
    Risk Anal; 2016 Apr; 36(4):776-91. PubMed ID: 26713543
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Choosing what to protect.
    Bier VM
    Risk Anal; 2007 Jun; 27(3):607-20. PubMed ID: 17640211
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Adversarial risk analysis for counterterrorism modeling.
    Rios J; Rios Insua D
    Risk Anal; 2012 May; 32(5):894-915. PubMed ID: 22150163
    [TBL] [Abstract][Full Text] [Related]  

  • 13. How probabilistic risk assessment can mislead terrorism risk analysts.
    Brown GG; Cox LA
    Risk Anal; 2011 Feb; 31(2):196-204. PubMed ID: 20846169
    [TBL] [Abstract][Full Text] [Related]  

  • 14. An attack-defense game model in infrastructure networks under link hiding.
    Qi G; Li J; Xu X; Chen G; Yang K
    Chaos; 2022 Nov; 32(11):113109. PubMed ID: 36456310
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Defender-Attacker Games with Asymmetric Player Utilities.
    Zhai Q; Peng R; Zhuang J
    Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Controlling collective dynamics in complex minority-game resource-allocation systems.
    Zhang JQ; Huang ZG; Dong JQ; Huang L; Lai YC
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 May; 87(5):052808. PubMed ID: 23767585
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Defender-Attacker Decision Tree Analysis to Combat Terrorism.
    Garcia RJ; von Winterfeldt D
    Risk Anal; 2016 Dec; 36(12):2258-2271. PubMed ID: 27037744
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Attacker Deterrence and Perceived Risk in a Stackelberg Security Game.
    Ridinger G; John RS; McBride M; Scurich N
    Risk Anal; 2016 Aug; 36(8):1666-81. PubMed ID: 26889768
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management.
    Merrick J; Parnell GS
    Risk Anal; 2011 Sep; 31(9):1488-510. PubMed ID: 21418080
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Cyber War Game in Temporal Networks.
    Cho JH; Gao J
    PLoS One; 2016; 11(2):e0148674. PubMed ID: 26859840
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.