These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

167 related articles for article (PubMed ID: 25683347)

  • 1. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.
    Kroshl WM; Sarkani S; Mazzuchi TA
    Risk Anal; 2015 Sep; 35(9):1690-705. PubMed ID: 25683347
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers.
    Golalikhani M; Zhuang J
    Risk Anal; 2011 Apr; 31(4):533-47. PubMed ID: 21105882
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A game theoretical model for location of terror response facilities under capacitated resources.
    Meng L; Kang Q; Han C; Xu W; Wu Q
    ScientificWorldJournal; 2013; 2013():742845. PubMed ID: 24459446
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things.
    Liu B; Xu H; Zhou X
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30469434
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Robust allocation of a defensive budget considering an attacker's private information.
    Nikoofal ME; Zhuang J
    Risk Anal; 2012 May; 32(5):930-43. PubMed ID: 22050276
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects.
    Aziz RA; He M; Zhuang J
    Risk Anal; 2020 Jul; 40(7):1481-1506. PubMed ID: 32426876
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Characterizing contract-based multiagent resource allocation in networks.
    An B; Lesser V
    IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):575-86. PubMed ID: 19955040
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
    Guan P; Zhuang J
    Risk Anal; 2016 Apr; 36(4):776-91. PubMed ID: 26713543
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Choosing what to protect.
    Bier VM
    Risk Anal; 2007 Jun; 27(3):607-20. PubMed ID: 17640211
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Adversarial risk analysis for counterterrorism modeling.
    Rios J; Rios Insua D
    Risk Anal; 2012 May; 32(5):894-915. PubMed ID: 22150163
    [TBL] [Abstract][Full Text] [Related]  

  • 13. How probabilistic risk assessment can mislead terrorism risk analysts.
    Brown GG; Cox LA
    Risk Anal; 2011 Feb; 31(2):196-204. PubMed ID: 20846169
    [TBL] [Abstract][Full Text] [Related]  

  • 14. An attack-defense game model in infrastructure networks under link hiding.
    Qi G; Li J; Xu X; Chen G; Yang K
    Chaos; 2022 Nov; 32(11):113109. PubMed ID: 36456310
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Defender-Attacker Games with Asymmetric Player Utilities.
    Zhai Q; Peng R; Zhuang J
    Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Controlling collective dynamics in complex minority-game resource-allocation systems.
    Zhang JQ; Huang ZG; Dong JQ; Huang L; Lai YC
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 May; 87(5):052808. PubMed ID: 23767585
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Defender-Attacker Decision Tree Analysis to Combat Terrorism.
    Garcia RJ; von Winterfeldt D
    Risk Anal; 2016 Dec; 36(12):2258-2271. PubMed ID: 27037744
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Attacker Deterrence and Perceived Risk in a Stackelberg Security Game.
    Ridinger G; John RS; McBride M; Scurich N
    Risk Anal; 2016 Aug; 36(8):1666-81. PubMed ID: 26889768
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management.
    Merrick J; Parnell GS
    Risk Anal; 2011 Sep; 31(9):1488-510. PubMed ID: 21418080
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Cyber War Game in Temporal Networks.
    Cho JH; Gao J
    PLoS One; 2016; 11(2):e0148674. PubMed ID: 26859840
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.