These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

87 related articles for article (PubMed ID: 25929274)

  • 1. Quantifying Adversary Capabilities to Inform Defensive Resource Allocation.
    Wang C; Bier VM
    Risk Anal; 2016 Apr; 36(4):756-75. PubMed ID: 25929274
    [TBL] [Abstract][Full Text] [Related]  

  • 2. An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects.
    Aziz RA; He M; Zhuang J
    Risk Anal; 2020 Jul; 40(7):1481-1506. PubMed ID: 32426876
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
    Guan P; Zhuang J
    Risk Anal; 2016 Apr; 36(4):776-91. PubMed ID: 26713543
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cost of equity in homeland security resource allocation in the face of a strategic attacker.
    Shan X; Zhuang J
    Risk Anal; 2013 Jun; 33(6):1083-99. PubMed ID: 23256552
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Robust allocation of a defensive budget considering an attacker's private information.
    Nikoofal ME; Zhuang J
    Risk Anal; 2012 May; 32(5):930-43. PubMed ID: 22050276
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Attacker Deterrence and Perceived Risk in a Stackelberg Security Game.
    Ridinger G; John RS; McBride M; Scurich N
    Risk Anal; 2016 Aug; 36(8):1666-81. PubMed ID: 26889768
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.
    Kroshl WM; Sarkani S; Mazzuchi TA
    Risk Anal; 2015 Sep; 35(9):1690-705. PubMed ID: 25683347
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Estimating conditional probabilities of terrorist attacks: modeling adversaries with uncertain value tradeoffs.
    Levine ES
    Risk Anal; 2012 Feb; 32(2):294-303. PubMed ID: 21801187
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Zero-determinant strategy in stochastic Stackelberg asymmetric security game.
    Cheng Z; Chen G; Hong Y
    Sci Rep; 2023 Jul; 13(1):11308. PubMed ID: 37438579
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Optimal resource allocation for defense of targets based on differing measures of attractiveness.
    Bier VM; Haphuriwat N; Menoyo J; Zimmerman R; Culpen AM
    Risk Anal; 2008 Jun; 28(3):763-70. PubMed ID: 18643831
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers.
    Golalikhani M; Zhuang J
    Risk Anal; 2011 Apr; 31(4):533-47. PubMed ID: 21105882
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things.
    Liu B; Xu H; Zhou X
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30469434
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective.
    Zeng C; Ren B; Li M; Liu H; Chen J
    Chaos; 2019 Aug; 29(8):083129. PubMed ID: 31472502
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Adversarial risk analysis for counterterrorism modeling.
    Rios J; Rios Insua D
    Risk Anal; 2012 May; 32(5):894-915. PubMed ID: 22150163
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Modeling defensive resource allocation in multilayered systems under probabilistic and strategic risks.
    Wei Z; Zhuang J
    Risk Anal; 2024 Jul; ():. PubMed ID: 38991762
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Defender-Attacker Games with Asymmetric Player Utilities.
    Zhai Q; Peng R; Zhuang J
    Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.
    Payyappalli VM; Zhuang J; Jose VRR
    Risk Anal; 2017 Nov; 37(11):2229-2245. PubMed ID: 28314059
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Security risk assessment of projects in high-risk areas based on attack-defense game model.
    Yao Y; Chen W
    Sci Rep; 2023 Aug; 13(1):13293. PubMed ID: 37587177
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Resource distribution in multiple attacks against a single target.
    Levitin G; Hausken K
    Risk Anal; 2010 Aug; 30(8):1231-9. PubMed ID: 20412523
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.