Strategic and experimental analyses of conflict and terrorism
暂无分享,去创建一个
[1] Idean Salehyan. The Delegation of War to Rebel Organizations , 2010 .
[2] Kai A. Konrad,et al. Dynamic Contests and the Discouragement Effect , 2012 .
[3] Dan Kovenock,et al. The Optimal Defense of Networks of Targets , 2018 .
[4] Timothy Mathews,et al. A model of a multilateral proxy war with spillovers , 2018, Public Choice.
[5] S. Sanders,et al. RAISING THE COST OF REBELLION: THE ROLE OF THIRD‐PARTY INTERVENTION IN INTRASTATE CONFLICT , 2009 .
[6] Changxia Ke,et al. Brothers in Arms - An Experiment on the Alliance Puzzle , 2013, Games Econ. Behav..
[7] K. Gleditsch,et al. Explaining External Support for Insurgent Groups , 2011, International Organization.
[8] J. Neumann,et al. Theory of games and economic behavior , 1945, 100 Years of Math Milestones.
[9] James W. Boudreau,et al. Stag hunt contests and alliance formation , 2018, Public Choice.
[10] Ron Siegel,et al. Asymmetric all-pay auctions with interdependent valuations , 2014, J. Econ. Theory.
[11] Yang-Ming Chang,et al. A game-theoretic analysis of international trade and political conflict over external territories , 2019 .
[12] Zijun Luo,et al. A model of terrorism and counterterrorism with location choices , 2019 .
[13] War and peace: Third-party intervention in conflict , 2007 .
[14] T. Schelling. The Strategy of Conflict , 1963 .
[15] Kai A. Konrad,et al. The Alliance Formation Puzzle and Capacity Constraints , 2008 .
[16] Timothy Mathews,et al. The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack * , 2012 .
[17] Jack Hirshleifer,et al. The analytics of continuing conflict , 1988, Synthese.
[18] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[19] The role of noise in alliance formation and collusion in conflicts , 2017 .
[20] Derek J. Clark,et al. Asymmetric Conflict , 2007 .
[21] Michael R. Baye,et al. The all-pay auction with complete information , 1990 .
[22] J. Hirshleifer. Conflict and rent-seeking success functions: Ratio vs. difference models of relative success , 1989 .
[23] S. Skaperdas,et al. Guns, Butter, and Openness: On the Relationship between Security and Trade , 2001 .
[24] Diego Aycinena,et al. Valuation structure in incomplete information contests: experimental evidence , 2018, Public Choice.
[25] Roman M. Sheremeta,et al. The attack and defense of weakest-link networks , 2010, Public Choice.
[26] Kofi O. Nti. Rent-seeking with asymmetric valuations , 1999 .
[27] Timothy Mathews,et al. Simple analytics of the impact of terror generation on attacker–defender interactions , 2019 .
[28] Kai A. Konrad,et al. Strategy and Dynamics in Contests , 2009 .
[29] J. Hirshleifer. From weakest-link to best-shot: The voluntary provision of public goods , 1983 .
[30] J. Morgan,et al. An Analysis of the War of Attrition and the All-Pay Auction , 1997 .
[31] S. Polachek,et al. Conflict and Trade , 1980 .