SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION
暂无分享,去创建一个
[1] Jun Zhuang,et al. Balancing congestion and security in the presence of strategic applicants with private information , 2011, Eur. J. Oper. Res..
[2] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[3] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[4] J. V. Tucker,et al. Unifying computers and dynamical systems using the theory of synchronous concurrent algorithms , 2009, Appl. Math. Comput..
[5] Robert Powell,et al. Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.
[6] Todd Sandler,et al. Terrorist Signalling and the Value of Intelligence , 2007, British Journal of Political Science.
[7] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[8] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[9] Gilat Levy. Decision–Making Procedures for Committees of Careerist Experts , 2007 .
[10] V. Bier,et al. Subsidies in Interdependent Security With Heterogeneous Discount Rates , 2007 .
[11] A. Basuchoudhary,et al. Hiding in plain sight – using signals to detect terrorists , 2006 .
[12] L. Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[13] Gerald G. Brown,et al. A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..
[14] Gilbert Laporte,et al. A Continuous Model for Multistore Competitive Location , 2005, Oper. Res..
[15] Kenneth Hendricks,et al. Feints , 2004 .
[16] Peter P. Swire. A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security? , 2004, J. Telecommun. High Technol. Law.
[17] Eric Maskin,et al. The Politician and the Judge: Accountability in Government , 2004 .
[18] James Yetman,et al. SUICIDAL TERRORISM AND DISCRIMINATORY SCREENING: AN EFFICIENCY‐EQUITY TRADE‐OFF , 2004 .
[19] Kevin Zhu,et al. Information Transparency of Business-to-Business Electronic Markets: A Game-Theoretic Analysis , 2004, Manag. Sci..
[20] James H. Clifford,et al. Protecting the American Homeland: A Preliminary Analysis , 2003 .
[21] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[22] Molly J. Walker Wilson,et al. Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit , 2003 .
[23] V. Crawford. Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions , 2003 .
[24] D. Pinto. Secrets and Lies: Digital Security in a Networked World , 2003 .
[25] Andrea Prat,et al. The Wrong Kind of Transparency , 2002 .
[26] Peter R. Orszag,et al. Protecting the American Homeland: A Preliminary Analysis , 2002 .
[27] Lode Li. Information Sharing in a Supply Chain with Horizontal Competition , 2002, Manag. Sci..
[28] Robert M. Townsend,et al. Dynamic Mechanism Design with Hidden Income and Hidden Actions , 2002, J. Econ. Theory.
[29] Peter P. Swire. What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory , 2001, ArXiv.
[30] D. B. Montgomery,et al. First-mover (dis)advantages: Retrospective and link with the resource-based view , 1998 .
[31] Steven D. Levitt,et al. Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack , 1997 .
[32] S. Skaperdas. Contest success functions , 1996 .
[33] Mark J. Rozell. Executive Privilege: The Dilemma of Secrecy and Democratic Accountability , 1994 .
[34] Walter Enders,et al. The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis , 1993, American Political Science Review.
[35] Harvey E. Lapan,et al. Terrorism and signalling , 1993 .
[36] David M. Kreps,et al. Signaling Games and Stable Equilibria , 1987 .
[37] J. Sobel,et al. Equilibrium Selection in Signaling Games , 1987 .
[38] Esther Gal-Or,et al. First Mover Disadvantages with Private Information , 1987 .
[39] Steven J. Brams,et al. Superpower Games: Applying Game Theory to Superpower Conflict , 1985 .
[40] J. Sobel,et al. STRATEGIC INFORMATION TRANSMISSION , 1982 .
[41] Irwin Greenberg,et al. The Role of Deception in Decision Theory , 1982 .
[42] S. Brams,et al. Deception in simple voting games , 1977 .
[43] M. Spence. Job Market Signaling , 1973 .
[44] F. E. Rourke,et al. Secrecy and Publicity: Dilemmas of Democracy. , 1962 .
[45] David M Levinson,et al. First Mover Advantages , 2011 .
[46] Vicki M. Bier,et al. Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .
[47] Vicki M. Bier,et al. Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .
[48] J. Morgan,et al. Cheap Talk , 2005 .
[49] H. Kunreuther,et al. Interdependent Security , 2003 .
[50] Joao P. Hespanha,et al. Deception in Non-Cooperative Games with Partial Information , 2000 .
[51] G. Clark,et al. Accountability and corruption : public sector ethics , 1997 .
[52] I. Galnoor. Government secrecy in democracies , 1977 .
[53] D. Wise. The politics of lying;: Government deception, secrecy, and power , 1973 .