These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

130 related articles for article (PubMed ID: 36456310)

  • 1. An attack-defense game model in infrastructure networks under link hiding.
    Qi G; Li J; Xu X; Chen G; Yang K
    Chaos; 2022 Nov; 32(11):113109. PubMed ID: 36456310
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Attack-Defense Game Model with Multi-Type Attackers Considering Information Dilemma.
    Qi G; Li J; Xu C; Chen G; Yang K
    Entropy (Basel); 2022 Dec; 25(1):. PubMed ID: 36673201
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective.
    Zeng C; Ren B; Li M; Liu H; Chen J
    Chaos; 2019 Aug; 29(8):083129. PubMed ID: 31472502
    [TBL] [Abstract][Full Text] [Related]  

  • 4. An Attacker-Defender Game Model with Constrained Strategies.
    Ren J; Liu J; Dong Y; Li Z; Li W
    Entropy (Basel); 2024 Jul; 26(8):. PubMed ID: 39202094
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Attacker-defender game from a network science perspective.
    Li YP; Tan SY; Deng Y; Wu J
    Chaos; 2018 May; 28(5):051102. PubMed ID: 29857681
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Modelling and Research on Intuitionistic Fuzzy Goal-Based Attack and Defence Game for Infrastructure Networks.
    Li Z; Liu J; Dong Y; Ren J; Li W
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998250
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution.
    Ni Z; Paul S
    IEEE Trans Neural Netw Learn Syst; 2019 Sep; 30(9):2684-2695. PubMed ID: 30624227
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.
    Kroshl WM; Sarkani S; Mazzuchi TA
    Risk Anal; 2015 Sep; 35(9):1690-705. PubMed ID: 25683347
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Defender-Attacker Games with Asymmetric Player Utilities.
    Zhai Q; Peng R; Zhuang J
    Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Cyber War Game in Temporal Networks.
    Cho JH; Gao J
    PLoS One; 2016; 11(2):e0148674. PubMed ID: 26859840
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Study on a Sequential One-Defender-N-Attacker Game.
    Xu Z; Zhuang J
    Risk Anal; 2019 Jun; 39(6):1414-1432. PubMed ID: 30602071
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things.
    Liu B; Xu H; Zhou X
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30469434
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Attacker Deterrence and Perceived Risk in a Stackelberg Security Game.
    Ridinger G; John RS; McBride M; Scurich N
    Risk Anal; 2016 Aug; 36(8):1666-81. PubMed ID: 26889768
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Game-Theoretic Approach to Information-Flow Control via Protocol Composition.
    Alvim MS; Chatzikokolakis K; Kawamoto Y; Palamidessi C
    Entropy (Basel); 2018 May; 20(5):. PubMed ID: 33265472
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
    Rao NS; Poole SW; Ma CY; He F; Zhuang J; Yau DK
    Risk Anal; 2016 Apr; 36(4):694-710. PubMed ID: 25847370
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Learning-Based Solution for an Adversarial Repeated Game in Cyber-Physical Power Systems.
    Paul S; Ni Z; Mu C
    IEEE Trans Neural Netw Learn Syst; 2020 Nov; 31(11):4512-4523. PubMed ID: 31899439
    [TBL] [Abstract][Full Text] [Related]  

  • 19. An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects.
    Aziz RA; He M; Zhuang J
    Risk Anal; 2020 Jul; 40(7):1481-1506. PubMed ID: 32426876
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks.
    Piccinelli R; Sansavini G; Lucchetti R; Zio E
    Risk Anal; 2017 Nov; 37(11):2182-2190. PubMed ID: 28230257
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.