Redundancy vs. Protection vs. False Targets for Systems Under Attack
暂无分享,去创建一个
[1] Kjell Hausken,et al. Protection vs. redundancy in homogeneous parallel systems , 2008, Reliab. Eng. Syst. Saf..
[2] Vicki M. Bier,et al. Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .
[3] Kjell Hausken. Strategic defense and attack for series and parallel reliability systems , 2008, Eur. J. Oper. Res..
[4] V. Bier,et al. Perfect aggregation for a class of general reliability models with Bayesian updating , 1995 .
[5] Vicki M. Bier,et al. Accident Precursor Analysis and Management: Reducing Technological Risk Through Diligence , 2004 .
[6] Gregory Levitin,et al. Optimal Distribution of Constrained Resources in Bi-contest Detection-Impact Game , 2009 .
[7] Gregory Levitin,et al. Optimizing survivability of vulnerable series-parallel multi-state systems , 2003, Reliab. Eng. Syst. Saf..
[8] Sung-Ha Hwang,et al. Contest Success Functions: Theory and Evidence , 2009 .
[9] Vicki M. Bier,et al. Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .
[10] Gregory Levitin,et al. Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm , 2003, Reliab. Eng. Syst. Saf..
[11] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[12] T. Sandler,et al. The Political Economy of Terrorism: The Economic Impact of Transnational Terrorism , 2005 .
[13] V.M Bier,et al. On the state of the art: risk communication to the public , 2001, Reliab. Eng. Syst. Saf..
[14] Gregory Levitin,et al. Optimal separation of elements in vulnerable multi-state systems , 2001, Reliab. Eng. Syst. Saf..
[15] G. Tullock. Efficient Rent Seeking , 2001 .
[16] Walter Enders,et al. Applying analytical methods to study terrorism , 2007 .
[17] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[18] Gregory Levitin,et al. False targets efficiency in defense strategy , 2009, Eur. J. Oper. Res..
[19] K. Hausken. Production and Conflict Models Versus Rent-Seeking Models , 2005 .
[20] Robert Powell,et al. Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..
[21] Todd Sandler,et al. Terrorist Signalling and the Value of Intelligence , 2007, British Journal of Political Science.
[22] Robert Powell,et al. Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.
[23] T. Sandler,et al. Global Terrorism: Deterrence Versus Pre-Emption , 2006 .
[24] Vicki M. Bier,et al. Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..
[25] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[26] Vicki M. Bier,et al. Optimal Allocation of Resources for Defense of Simple Series and Parallel Systems from Determined Adversaries , 2003 .
[27] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[28] Vicki M. Bier. Challenges to the Acceptance of Probabilistic Risk Analysis , 1999 .
[29] Todd Sandler,et al. Terrorist backlash, terrorism mitigation, and policy delegation , 2007 .
[30] Gregory Levitin. Optimal Defense Strategy Against Intentional Attacks , 2007, IEEE Transactions on Reliability.
[31] Gregory Levitin. Optimizing Defense Strategies for Complex Multi-State Systems , 2009 .
[32] D. Shier. Network Reliability and Algebraic Structures , 1991 .
[33] Gregory Levitin,et al. Optimal multilevel protection in series-parallel systems , 2003, Reliab. Eng. Syst. Saf..