Adversarial Risk Analysis for Enhancing Combat Simulation Models
暂无分享,去创建一个
[1] David Banks,et al. Adversarial risk analysis: Borel games , 2011 .
[2] Bernt Åkesson,et al. COMPARING SIMULATED RESULTS AND ACTUAL BATTLE EVENTS FROM 1944 – A case study using Sandis software , 2015 .
[3] Shahram Sarkani,et al. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent‐Based Simulation , 2015, Risk analysis : an official publication of the Society for Risk Analysis.
[4] S. Meng,et al. A game-theoretic approach to assess adversarial risks , 2014 .
[5] Casey Rothschild,et al. Adversarial risk analysis with incomplete information: a level-k approach. , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[6] Paul K. Davis,et al. The Base of Sand Problem: A White Paper on the State of Military Combat Modeling , 1991 .
[7] Alan R. Washburn,et al. Combat Modeling , 2009 .
[8] R. Hall,et al. Survey of Literature on Strategic Decision Making in the Presence of Adversaries Survey of Literature on Strategic Decision Making in the Presence of Adversaries Create Interim Report , 2005 .
[9] Roger B. Myerson,et al. Game theory - Analysis of Conflict , 1991 .
[10] Sarit Kraus,et al. The adversarial activity model for bounded rational agents , 2010, Autonomous Agents and Multi-Agent Systems.
[11] Ronald A. Howard,et al. Analysis of National Strategies to Counter a Country's Nuclear Weapons Program , 2011, Decis. Anal..
[12] Ronald A. Howard,et al. Influence Diagrams , 2005, Decis. Anal..
[13] David Banks,et al. Adversarial Risk Analysis , 2015, IWSPA@CODASPY.
[14] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[15] Debopam Bhattacharya,et al. Inferring Optimal Peer Assignment From Experimental Data , 2009 .
[16] Dan Kovenock,et al. Conflicts with Multiple Battlefields , 2010, SSRN Electronic Journal.
[17] Michael Buro,et al. Fast Heuristic Search for RTS Game Combat Scenarios , 2012, AIIDE.
[18] Patrick D. Larkey,et al. Subjective Probability and the Theory of Games , 1982 .
[19] Bernt Åkesson,et al. An approximative method of simulating a duel , 2012, Proceedings Title: Proceedings of the 2012 Winter Simulation Conference (WSC).
[20] William Reese. 5 – Deception in a Game Theoretic Framework , 1981 .
[21] Jesus Rios,et al. Adversarial Risk Analysis for Counterterrorism Modeling , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[22] Gerald G. Brown,et al. The Fast Theater Model (FATHM) , 2007 .
[23] Ahti Salo,et al. Cost-efficiency analysis of weapon system portfolios , 2012, Eur. J. Oper. Res..
[24] Esa Lappi. Computational methods for tactical simulations , 2012 .
[25] Andreas Tolk,et al. Tutorial on the engineering principles of combat modeling and distributed simulation , 2016, 2016 Winter Simulation Conference (WSC).
[26] Juho Roponen,et al. Kaksintaistelun approksimatiivinen mallintaminen , 2013 .
[27] Seth D. Guikema,et al. Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .
[28] Uriel G. Rothblum,et al. Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..
[29] Eugene Santos,et al. Adversarial Models for Opponent Intent Inferencing , 2006 .
[30] ปิยดา สมบัติวัฒนา. Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .