Advanced Sciences and Technologies for Security Applications
暂无分享,去创建一个
Quanyan Zhu | Stefan Rass | Sandra König | Stefan Schauer | Quanyan Zhu | S. Rass | A. Masys | S. Schauer | Sandra König | S. Zhu
[1] Elba E. Serrano,et al. Neuroethics Guiding Principles for the NIH BRAIN Initiative , 2018, The Journal of Neuroscience.
[2] Nora D. Volkow,et al. Neuroethics for the National Institutes of Health BRAIN Initiative , 2018, The Journal of Neuroscience.
[3] Edward Perello,et al. Editing Biosecurity: Needs and Strategies for Governing Genome Editing , 2018 .
[4] Uma Chunduri,et al. Preferred Path Routing - A Next-Generation Routing Framework beyond Segment Routing , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[5] Division on Earth. Governance of Dual Use Research in the Life Sciences , 2018 .
[6] M. Dando,et al. Preventing chemical weapons as sciences converge , 2018, Science.
[7] T. Kuroki. New Classification of Research Misconduct from the Viewpoint of Truth, Trust, and Risk , 2018, Accountability in research.
[8] Quanyan Zhu,et al. Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.
[9] M. Dando,et al. Ethics, neuroscience, and public policy , 2018, The Routledge Handbook of Ethics and Public Policy.
[10] Xiang Liao,et al. The paraventricular thalamus is a critical thalamic area for wakefulness , 2018, Science.
[11] D. Caetano-Anollés,et al. Agricultural research, or a new bioweapon system? , 2018, Science.
[12] Anna Devor,et al. Neuroethics Questions to Guide Ethical Research in the International Brain Initiatives , 2018, Neuron.
[13] M. Platt,et al. Opportunities and challenges for intranasal oxytocin treatment studies in nonhuman primates , 2018, American journal of primatology.
[14] Rong-wei Zhang,et al. The Locus Coeruleus Modulates Intravenous General Anesthesia of Zebrafish via a Cooperative Mechanism. , 2018, Cell reports.
[15] W. Joiner. The Neurobiological Basis of Sleep and Sleep Disorders. , 2018, Physiology.
[16] Stefan Rass,et al. Security from the Adversary's Inertia-Controlling Convergence Speed When Playing Mixed Strategy Equilibria , 2018, Games.
[17] Stefan Rass,et al. Trust and Distrust: On Sense and Nonsense in Big Data , 2018, Privacy and Identity Management.
[18] M. Lipsitch,et al. Opinion: Risk to study nonparticipants: A procedural approach , 2018, Proceedings of the National Academy of Sciences.
[19] Masaki Isoda,et al. Development of social systems neuroscience using macaques , 2018, Proceedings of the Japan Academy. Series B, Physical and biological sciences.
[20] Dimitri Perrin,et al. Muscarinic Acetylcholine Receptors Chrm1 and Chrm3 Are Essential for REM Sleep. , 2018, Cell reports.
[21] Saheli Datta Burton,et al. Understanding Interstate Competitiveness and International Security in European Dual-Use Research , 2018, Living Machines.
[22] Sandra König,et al. Assessing the Impact of Malware Attacks in Utility Networks , 2018 .
[23] Stefan Rass,et al. Game Theory for Security and Risk Management: From Theory to Practice , 2018 .
[24] Quanyan Zhu,et al. A hybrid stochastic game for secure control of cyber-physical systems , 2018, Autom..
[25] K. J. Parker,et al. Adaptive developmental plasticity in rhesus macaques: the serotonin transporter gene interacts with maternal care to affect juvenile social behaviour , 2018, Proceedings of the Royal Society B: Biological Sciences.
[26] L. Young,et al. Bridging the gap between rodents and humans: The role of non‐human primates in oxytocin research , 2018, American journal of primatology.
[27] Ming Song,et al. Brain Network Studies in Chronic Disorders of Consciousness: Advances and Perspectives , 2018, Neuroscience Bulletin.
[28] Stefan Rass,et al. Risk Assessment Uncertainties in Cybersecurity Investments , 2018, Games.
[29] L. de Lecea,et al. Hypocretin as a Hub for Arousal and Motivation , 2018, Front. Neurol..
[30] S. Salloch. The dual use of research ethics committees: why professional self-governance falls short in preserving biosecurity , 2018, BMC Medical Ethics.
[31] P. Bregestovski,et al. Light‐induced regulation of ligand‐gated channel activity , 2018, British journal of pharmacology.
[32] Hideyuki Okano,et al. Investigation of brain science and neurological/psychiatric disorders using genetically modified non-human primates , 2018, Current Opinion in Neurobiology.
[33] Diana A. Liao,et al. Constraints and flexibility during vocal development: insights from marmoset monkeys , 2018, Current Opinion in Behavioral Sciences.
[34] D. Normile. China's ambitious brain science project inches forward. , 2018, Science.
[35] Quanyan Zhu,et al. A Multi-Layer Feedback System Approach to Resilient Connectivity of Remotely Deployed Mobile Internet of Things , 2018, IEEE Transactions on Cognitive Communications and Networking.
[36] A. Whiten,et al. The pervasive role of social learning in primate lifetime development , 2018, Behavioral Ecology and Sociobiology.
[37] Noritaka Ichinohe,et al. Inequity aversion is observed in common marmosets but not in marmoset models of autism induced by prenatal exposure to valproic acid , 2018, Behavioural Brain Research.
[38] Stefan Rass,et al. Password Security as a Game of Entropies , 2018, Entropy.
[39] M. Gaillard. Looking for Neuroethics in Japan , 2018 .
[40] G. Palchik,et al. Monkey Business? Development, Influence, and Ethics of Potentially Dual-Use Brain Science on the World Stage , 2018 .
[41] Quanyan Zhu,et al. On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats , 2018, IEEE Access.
[42] Walid Saad,et al. Stochastic Games for Power Grid Protection Against Coordinated Cyber-Physical Attacks , 2018, IEEE Transactions on Smart Grid.
[43] C. Saper,et al. A hypothalamic circuit for the circadian control of aggression , 2018, Nature Neuroscience.
[44] C. Yokoyama,et al. Individual identity and affective valence in marmoset calls: in vivo brain imaging with vocal sound playback , 2018, Animal Cognition.
[45] Nikolas Rose,et al. The integrated ethics and society programme of the Human Brain Project: reflecting on an ongoing experience , 2018 .
[46] Quanyan Zhu,et al. A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[47] B. Stahl,et al. Accompanying technology development in the Human Brain Project: From foresight to ethics management , 2018, Futures.
[48] Genserik Reniers,et al. Applying a Bayesian Stackelberg game for securing a chemical plant , 2018 .
[49] Quanyan Zhu,et al. On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT) , 2018, IEEE Transactions on Wireless Communications.
[50] C. Lovejoy,et al. A neurochemical hypothesis for the origin of hominids , 2018, Proceedings of the National Academy of Sciences.
[51] Jill Barr-Walker,et al. Fentanyl, fentanyl analogs and novel synthetic opioids: A comprehensive review , 2017, Neuropharmacology.
[52] Nikolas Rose,et al. The Limits of Dual Use , 2018 .
[53] Stefan Schauer,et al. A Risk Management Approach for Highly Interconnected Networks , 2018 .
[54] O. Burmeister,et al. “Who Was That Masked Man?”: System Penetrations—Friend or Foe? , 2018 .
[55] M. Dando,et al. Dual-Use Nano-Neurotechnology: An assessment of the implications of trends in science and technology. , 2018, Politics and the life sciences : the journal of the Association for Politics and the Life Sciences.
[56] Andrea Gawrylewski,et al. Think Tank: Forty Neuroscientists Explore the Biological Roots of Human Experience. , 2018 .
[57] Radha Poovendran,et al. Decision and Game Theory for Security , 2018, Lecture Notes in Computer Science.
[58] Jeremiah K Morrow,et al. New perspectives on the neurophysiology of primate amygdala emerging from the study of naturalistic social behaviors. , 2018, Wiley interdisciplinary reviews. Cognitive science.
[59] Annegret L. Falkner,et al. Ventromedial Hypothalamus and the Generation of Aggression , 2017, Front. Syst. Neurosci..
[60] Young T. Hong,et al. Converging Prefronto-Insula-Amygdala Pathways in Negative Emotion Regulation in Marmoset Monkeys , 2017, Biological Psychiatry.
[61] J. Giordano,et al. Gene editing using CRISPR/Cas9: implications for dual-use and biosecurity , 2017, Protein & Cell.
[62] Diane DiEuliis,et al. Biosecurity Implications for the Synthesis of Horsepox, an Orthopoxvirus. , 2017, Health security.
[63] Quanyan Zhu,et al. A game-theoretic defense against data poisoning attacks in distributed support vector machines , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[64] Kathleen Steinhöfel,et al. Converging and emerging threats to health security , 2017, Environment Systems and Decisions.
[65] Adam N. Phillips,et al. The Neural Basis of Changing Social Norms through Persuasion , 2017, Scientific Reports.
[66] Stefan Rass. On Game-Theoretic Risk Management (Part Three) - Modeling and Applications , 2017 .
[67] M. Bruchas,et al. Polymorphic computation in locus coeruleus networks , 2017, Nature Neuroscience.
[68] Stefan Rass,et al. On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies , 2017, GameSec.
[69] Quanyan Zhu,et al. A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.
[70] Branislav Bosanský,et al. Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security , 2017, GameSec.
[71] Quanyan Zhu,et al. Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles , 2017, GameSec.
[72] Rosario Gennaro,et al. Efficient Rational Proofs for Space Bounded Computations , 2017, GameSec.
[73] David Baker,et al. Controlling the bioactivity of a peptide hormone in vivo by reversible self-assembly , 2017, Nature Communications.
[74] Juan Huang,et al. Sleep homeostasis regulated by 5HT2b receptor in a small subset of neurons in the dorsal fan-shaped body of drosophila , 2017, eLife.
[75] Olivier Darbin,et al. Editorial: Pathophysiology of the Basal Ganglia and Movement Disorders: Gaining New Insights from Modeling and Experimentation, to Influence the Clinic , 2017, Front. Hum. Neurosci..
[76] Edgar A Ycu,et al. Modular organization of the brainstem noradrenaline system coordinates opposing learning states , 2017, Nature Neuroscience.
[77] Kenji Matsumoto,et al. An eye tracking system for monitoring face scanning patterns reveals the enhancing effect of oxytocin on eye contact in common marmosets , 2017, Psychoneuroendocrinology.
[78] Steve W C Chang. An Emerging Field of Primate Social Neurophysiology: Current Developments , 2017, eNeuro.
[79] L. Leenen,et al. Accuracy of prehospital triage protocols in selecting severely injured patients: A systematic review , 2017, The journal of trauma and acute care surgery.
[80] Quanyan Zhu,et al. Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games , 2017, IEEE Transactions on Information Forensics and Security.
[81] Quanyan Zhu,et al. A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery: 125 , 2017, PERV.
[82] Cori Vilella,et al. Enjoying cooperative games: The R package GameTheory , 2017, Appl. Math. Comput..
[83] G. Stuber,et al. Locus coeruleus to basolateral amygdala noradrenergic projections promote anxiety-like behavior , 2017, eLife.
[84] Asif A. Ghazanfar,et al. Vocal Learning via Social Reinforcement by Infant Marmoset Monkeys , 2017, Current Biology.
[85] Moody T. Chu,et al. Markov chains with memory, tensor formulation, and the dynamics of power iteration , 2017, Appl. Math. Comput..
[86] Quanyan Zhu,et al. A mean-field stackelberg game approach for obfuscation adoption in empirical risk minimization , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[87] Marcello Massimini,et al. Shaping the Default Activity Pattern of the Cortical Network , 2017, Neuron.
[88] Hui Yang,et al. One-step generation of complete gene knockout mice and monkeys by CRISPR/Cas9-mediated gene editing with multiple sgRNAs , 2017, Cell Research.
[89] Clifford B Saper,et al. Wake–sleep circuitry: an overview , 2017, Current Opinion in Neurobiology.
[90] Y. Dan,et al. Editorial overview: Neurobiology of sleep 2017 , 2017, Current Opinion in Neurobiology.
[91] Steve Alpern,et al. Periodic Patrols on the Line and Other Networks , 2017 .
[92] Daisuke Ono,et al. Hypothalamic regulation of the sleep/wake cycle , 2017, Neuroscience Research.
[93] Y. Hayashi,et al. Sleep in vertebrate and invertebrate animals, and insights into the function and evolution of sleep , 2017, Neuroscience Research.
[94] Michihiro Mieda. The roles of orexins in sleep/wake regulation , 2017, Neuroscience Research.
[95] A. Espay,et al. Parkinson Disease: An Evolutionary Perspective , 2017, Front. Neurol..
[96] Quanyan Zhu,et al. Optimizing mission critical data dissemination in massive IoT networks , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[97] Quanyan Zhu,et al. A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks , 2017, SCAV@CPSWeek.
[98] J. Peever,et al. GABA Cells in the Central Nucleus of the Amygdala Promote Cataplexy , 2017, The Journal of Neuroscience.
[99] B. Lowell,et al. GABAergic Neurons of the Central Amygdala Promote Cataplexy , 2017, The Journal of Neuroscience.
[100] Quanyan Zhu,et al. Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory , 2017, IEEE Access.
[101] Sébastien Tremblay,et al. Social Decision-Making and the Brain: A Comparative Perspective , 2017, Trends in Cognitive Sciences.
[102] The Lancet Neurology. The Human Brain Project: adjusting the flagship's course , 2017, The Lancet Neurology.
[103] Qian Tao,et al. A retinoraphe projection regulates serotonergic activity and looming-evoked defensive behaviour , 2017, Nature Communications.
[104] M. Platt,et al. Can self-awareness be taught? Monkeys pass the mirror test—again , 2017, Proceedings of the National Academy of Sciences.
[105] Christian List,et al. Probabilistic opinion pooling generalized. Part one: general agendas , 2017, Soc. Choice Welf..
[106] Jisheng Han,et al. Genes Related to Oxytocin and Arginine-Vasopressin Pathways: Associations with Autism Spectrum Disorders , 2017, Neuroscience Bulletin.
[107] Chi K. Tse,et al. Modeling the Dynamics of Cascading Failures in Power Systems , 2017, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.
[108] Z. Qiu,et al. Non-human Primate Models for Brain Disorders – Towards Genetic Manipulations via Innovative Technology , 2017, Neuroscience Bulletin.
[109] Quanyan Zhu,et al. A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017, IEEE Journal on Selected Areas in Communications.
[110] Ling Wang,et al. Mu-ming Poo: China Brain Project and the future of Chinese neuroscience , 2017 .
[111] M. Poo,et al. Spontaneous expression of mirror self-recognition in monkeys after learning precise visual-proprioceptive association for mirror images , 2017, Proceedings of the National Academy of Sciences.
[112] Walid Saad,et al. Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game , 2017, 2017 IEEE International Conference on Communications (ICC).
[113] M. A. MacIver,et al. Neuroscience Needs Behavior: Correcting a Reductionist Bias , 2017, Neuron.
[114] S. Kern,et al. Characterization and pathogenesis of aerosolized eastern equine encephalitis in the common marmoset (Callithrix jacchus) , 2017, Virology Journal.
[115] M. Bruchas,et al. Optogenetic approaches for dissecting neuromodulation and GPCR signaling in neural circuits. , 2017, Current opinion in pharmacology.
[116] Stefan Rass,et al. Defending Against Advanced Persistent Threats Using Game-Theory , 2017, PloS one.
[117] Mohammad Ashiqur Rahman,et al. Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense , 2015, SafeConfig@CCS.
[118] Kai Sun,et al. Estimating the Propagation of Interdependent Cascading Outages With Multi-Type Branching Processes , 2014, IEEE Transactions on Power Systems.
[119] S. Rass,et al. Visual Risk Specification and Aggregation , 2017 .
[120] I. Linkov,et al. An Introduction to Resilience for Critical Infrastructures , 2017 .
[121] H. Okano,et al. Neuroscience Research Using Non-human Primate Models and Genome Editing , 2017 .
[122] Neringa Mickevičiūtė,et al. Lessons from the past for weapons of the future , 2017 .
[123] T. Murphy. FENTANYL : THE NEXT WAVE OF THE OPIOID CRISIS ” SUBCOMMITTEE ON OVERSIGHT AND INVESTIGATIONS COMMITTEE ON ENERGY AND COMMERCE UNITED STATES HOUSE OF REPRESENTATIVES The Honorable , 2017 .
[124] Norepinephrine Transporter in Major Depressive Disorder: A PET Study. , 2017, The American journal of psychiatry.
[125] Stefan Rass,et al. Decisions with Uncertain Consequences—A Total Ordering on Loss-Distributions , 2016, PloS one.
[126] Naeem Siddiqi,et al. Intelligent Credit Scoring: Building and Implementing Better Credit Risk Scorecards , 2016 .
[127] Genserik Reniers,et al. A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks. , 2016, Risk analysis : an official publication of the Society for Risk Analysis.
[128] Alois Knoll,et al. The Human Brain Project: Creating a European Research Infrastructure to Decode the Human Brain , 2016, Neuron.
[129] Quanyan Zhu,et al. GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats , 2016, GameSec.
[130] Anjon Basak,et al. Combining Graph Contraction and Strategy Generation for Green Security Games , 2016, GameSec.
[131] Nancy Y. Ip,et al. China Brain Project: Basic Neuroscience, Brain Diseases, and Brain-Inspired Computing , 2016, Neuron.
[132] Y. Yamaguchi,et al. Brain/MINDS: A Japanese National Brain Project for Marmoset Neuroscience , 2016, Neuron.
[133] C. Grady,et al. Neuroethics in the Age of Brain Projects , 2016, Neuron.
[134] Steve Alpern,et al. Patrolling a Pipeline , 2016, GameSec.
[135] Diana M. Bowman,et al. Neurotechnology and Society: Strengthening Responsible Innovation in Brain Science , 2016, Neuron.
[136] Vivien Marx,et al. Neurobiology: learning from marmosets , 2016, Nature Methods.
[137] Peter Schartner,et al. On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack , 2016, IEEE Access.
[138] S. Grillner,et al. The Basal Ganglia Over 500 Million Years , 2016, Current Biology.
[139] John Yen,et al. Towards probabilistic identification of zero-day attack paths , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[140] N. Mundy,et al. Brain evolution and development: adaptation, allometry and constraint , 2016, Proceedings of the Royal Society B: Biological Sciences.
[141] Steve Alpern,et al. Patrolling a Border , 2016, Oper. Res..
[142] Christof Koch,et al. Worldwide initiatives to advance brain research , 2016, Nature Neuroscience.
[143] Masahiko Watanabe,et al. Crucial Roles of the Endocannabinoid 2-Arachidonoylglycerol in the Suppression of Epileptic Seizures. , 2016, Cell reports.
[144] A. Inutsuka,et al. The integrative role of orexin/hypocretin neurons in nociceptive perception and analgesic regulation , 2016, Scientific Reports.
[145] Quanyan Zhu,et al. Cross-layer secure cyber-physical control system design for networked 3D printers , 2016, 2016 American Control Conference (ACC).
[146] Quanyan Zhu,et al. Interdependent network formation games with an application to critical infrastructures , 2016, 2016 American Control Conference (ACC).
[147] N. Stott. Chemical control: Regulation of incapacitating chemical agent weapons, riot control agents and their means of delivery , 2016 .
[148] Babak Sarani,et al. The profile of wounding in civilian public mass shooting fatalities , 2016, The journal of trauma and acute care surgery.
[149] Yun Liu,et al. Agent-based computational modelling of social risk responses , 2016, Eur. J. Oper. Res..
[150] Li Jiang,et al. Cholinergic Signaling Controls Conditioned Fear Behaviors and Enhances Plasticity of Cortical-Amygdala Circuits , 2016, Neuron.
[151] S. Maier,et al. Morphine paradoxically prolongs neuropathic pain in rats by amplifying spinal NLRP3 inflammasome activation , 2016, Proceedings of the National Academy of Sciences.
[152] Tony Q. S. Quek,et al. A game theoretic model for enabling honeypots in IoT networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[153] Paul D. Whissell,et al. The Use of DREADDs to Deconstruct Behavior , 2016, Front. Genet..
[154] K. Ressler,et al. Mouse models of fear-related disorders: Cell-type-specific manipulations in amygdala , 2016, Neuroscience.
[155] Clarence Filsfils,et al. Source Packet Routing in Networking (SPRING) Problem Statement and Requirements , 2016, RFC.
[156] V. Pitschmann,et al. Military Importance of Natural Toxins and Their Analogs , 2016, Molecules.
[157] F. D. Waal. Are We Smart Enough to Know How Smart Animals Are , 2016 .
[158] David A. Leopold,et al. Marmosets: A Neuroscientific Model of Human Social Behavior , 2016, Neuron.
[159] Genserik Reniers,et al. On the assessment of uncertainty in risk diagrams , 2016 .
[160] B. Roth,et al. New Technologies for Elucidating Opioid Receptor Function. , 2016, Trends in pharmacological sciences.
[161] Majeed M. Hayat,et al. Cascading Failures in Interdependent Infrastructures: An Interdependent Markov-Chain Approach , 2016, IEEE Transactions on Smart Grid.
[162] A. Berkowitz. Governing Behavior: How Nerve Cell Dictatorships and Democracies Control Everything We Do , 2016 .
[163] C. Patrick,et al. Reshaping clinical science: Introduction to the Special Issue on Psychophysiology and the NIMH Research Domain Criteria (RDoC) initiative. , 2016, Psychophysiology.
[164] Feng Zhang,et al. Applications of CRISPR–Cas systems in neuroscience , 2015, Nature Reviews Neuroscience.
[165] S. Elliott,et al. 25C-NBOMe as a New Hallucinogen , 2016 .
[166] A. Masys. Disrupting Terrorist and Criminal Networks: Crime Script Analysis Through DODAF Applications , 2016 .
[167] Award for Distinguished Scientific Contributions: Terrie E. Moffitt and Avshalom Caspi. , 2016, The American psychologist.
[168] Petra Himmel,et al. Psychopharmacology Drugs The Brain And Behavior , 2016 .
[169] John M. Pearson,et al. Neural mechanisms of social decision-making in the primate amygdala , 2015, Proceedings of the National Academy of Sciences.
[170] M. Cho,et al. Engineering Values Into Genetic Engineering: A Proposed Analytic Framework for Scientific Social Responsibility , 2015, The American journal of bioethics : AJOB.
[171] R. J. Cadigan,et al. Scientific Social Responsibility: Lessons From the Corporate Social Responsibility Movement , 2015, The American journal of bioethics : AJOB.
[172] M. Dando,et al. Preventing Biological Threats: What You Can Do. , 2015 .
[173] Quanyan Zhu,et al. Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks , 2015, GameSec.
[174] S. Grillner,et al. The basal ganglia downstream control of brainstem motor centres—an evolutionarily conserved strategy , 2015, Current Opinion in Neurobiology.
[175] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[176] Rui Zhang,et al. Secure and resilient distributed machine learning under adversarial environments , 2015, 2015 18th International Conference on Information Fusion (Fusion).
[177] David Banks,et al. Adversarial Risk Analysis , 2015, IWSPA@CODASPY.
[178] Kenneth Rose,et al. Optimal Zero-Delay Jamming Over an Additive Noise Channel , 2015, IEEE Transactions on Information Theory.
[179] Bryan L Roth,et al. Structure and function of serotonin G protein-coupled receptors. , 2015, Pharmacology & therapeutics.
[180] Hideyuki Okano,et al. Brain/MINDS: brain-mapping project in Japan , 2015, Philosophical Transactions of the Royal Society B: Biological Sciences.
[181] David A. Leopold,et al. Brains, Genes, and Primates , 2015, Neuron.
[182] S. Gilbert,et al. The significance and scope of evolutionary developmental biology: a vision for the 21st century , 2015, Evolution & development.
[183] E. Marder,et al. Robust circuit rhythms in small circuits arise from variable circuit components and mechanisms , 2015, Current Opinion in Neurobiology.
[184] Ralph Adolphs,et al. The unsolved problems of neuroscience , 2015, Trends in Cognitive Sciences.
[185] Quanyan Zhu,et al. Deception by Design: Evidence-Based Signaling Games for Network Defense , 2015, WEIS.
[186] I. Ojanperä,et al. Fatal poisoning in drug addicts in the Nordic countries in 2012. , 2015, Forensic science international.
[187] Emery N. Brown,et al. The BRAIN Initiative: developing technology to catalyse neuroscience discovery , 2015, Philosophical Transactions of the Royal Society B: Biological Sciences.
[188] James R. Clapper. Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community, Senate Armed Services Committee, James R. Clapper, Director of National Intelligence, February 26, 2015 , 2015 .
[189] Quanyan Zhu,et al. A cyber-physical game framework for secure and resilient multi-agent autonomous systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[190] Doug Rossinow. Six. 1983: The World at the Brink , 2015 .
[191] C. Macintyre,et al. Re-thinking the ethics of dual-use research of concern on transmissible pathogens , 2015, Environment Systems and Decisions.
[192] Kelsey E. Medeiros,et al. Researcher Perceptions of Ethical Guidelines and Codes of Conduct , 2015, Accountability in research.
[193] A. Philip Dawid,et al. On individual risk , 2014, Synthese.
[194] Kai Sun,et al. An Interaction Model for Simulation and Mitigation of Cascading Failures , 2014, IEEE Transactions on Power Systems.
[195] R. Skotnes. RISK PERCEPTION REGARDING THE SAFETY AND SECURITY OF ICT SYSTEMS IN ELECTRIC POWER SUPPLY NETWORK COMPANIES , 2015 .
[196] T. Stanley. The fentanyl story. , 2014, The journal of pain : official journal of the American Pain Society.
[197] Stefan Rass,et al. Numerical Computation of Multi-goal Security Strategies , 2014, GameSec.
[198] Quanyan Zhu,et al. A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design , 2014, GameSec.
[199] P. Bateson,et al. Lab animals: Can GM marmoset use be justified? , 2014, Nature.
[200] Stefan Rass,et al. Secure Communication over Software-Defined Networks , 2015, Mob. Networks Appl..
[201] Thomas Douglas. The dual-use problem, scientific isolationism and the division of moral labour , 2014, Monash bioethics review.
[202] David Cyranoski,et al. Marmosets are stars of Japan’s ambitious brain project , 2014, Nature.
[203] A. Ghazanfar,et al. The neurobiology of primate vocal communication , 2014, Current Opinion in Neurobiology.
[204] Matlab. Matlab (the language of technical computing): using matlab graphics ver.5 , 2014 .
[205] Ping Chen,et al. A Study on Advanced Persistent Threats , 2014, Communications and Multimedia Security.
[206] Yves Frégnac,et al. Neuroscience: Where is the brain in the Human Brain Project? , 2014, Nature.
[207] Roberto De Prisco,et al. Forward Secure Non-Interactive Key Exchange , 2014, SCN.
[208] Steve Alpern,et al. Accumulation games on graphs , 2014, Networks.
[209] Konstantinos Psounis,et al. Will cyber-insurance improve network security? A market analysis , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[210] Sungwook Kim,et al. Game Theory Applications in Network Design , 2014 .
[211] David J. Anderson,et al. A Framework for Studying Emotions across Species , 2014, Cell.
[212] G. Schneider. Brain Structure and Its Origins: in Development and in Evolution of Behavior and the Mind , 2014 .
[213] Jamal Raiyn,et al. A survey of Cyber Attack Detection Strategies , 2014 .
[214] Brenton Kenkel,et al. Estimating Extensive Form Games in R , 2014 .
[215] Nasir Ghani,et al. Stochastic Analysis of Cascading-Failure Dynamics in Power Grids , 2014, IEEE Transactions on Power Systems.
[216] M. Dando. Neuroscience and the Future of Chemical-Biological Weapons , 2014 .
[217] Asuman E. Ozdaglar,et al. Network Security and Contagion , 2013, PERV.
[218] C. Weber. Determinants of Risk Tolerance , 2014 .
[219] Rémi Boivin,et al. Macrosocial Network Analysis: The Case of Transnational Drug Trafficking , 2014 .
[220] R Core Team,et al. R: A language and environment for statistical computing. , 2014 .
[221] Min Ouyang,et al. Review on modeling and simulation of interdependent critical infrastructure systems , 2014, Reliab. Eng. Syst. Saf..
[222] Stefan Rass. Complexity of Network Design for Private Communication and the P-vs-NP Question , 2014 .
[223] S. Rajsbaum. Foundations of Cryptography , 2014 .
[224] Yoshio Okamoto,et al. General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction , 2016, IACR Cryptol. ePrint Arch..
[225] ปิยดา สมบัติวัฒนา. Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .
[226] Daniel Slamanig,et al. Cryptography for Security and Privacy in Cloud Computing , 2013 .
[227] Ueli Maurer,et al. Rational Protocol Design: Cryptography against Incentive-Driven Adversaries , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[228] Quanyan Zhu,et al. Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[229] Michael L. Platt,et al. Neuroethology of primate social behavior , 2013, Proceedings of the National Academy of Sciences.
[230] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[231] L. Degenhardt,et al. Trends in fentanyl prescriptions and fentanyl-related mortality in Australia. , 2013, Drug and alcohol review.
[232] Kamal Jamshidi,et al. GTXOP: A Game Theoretic Approach for QoS Provisioning Using Transmission Opportunity Tuning , 2013, PloS one.
[233] Stefan Rass,et al. On Bayesian Trust and Risk Forecasting for Compound Systems , 2013, 2013 Seventh International Conference on IT Security Incident Management and IT Forensics.
[234] Shengwei Mei,et al. Towards Estimating the Statistics of Simulated Cascades of Outages With Branching Processes , 2013, IEEE Transactions on Power Systems.
[235] Anthony Dudo,et al. The “Science” of Science Communication , 2013 .
[236] Quanyan Zhu,et al. Deployment and exploitation of deceptive honeybots in social networks , 2012, 52nd IEEE Conference on Decision and Control.
[237] Kate Larson,et al. A Consensual Linear Opinion Pool , 2012, IJCAI.
[238] Felix A. Fischer,et al. On the Rate of Convergence of Fictitious Play , 2010, Theory of Computing Systems.
[239] Anders Karlström,et al. Scheduling choices under rank dependent utility maximization , 2014 .
[240] Stefan Rass,et al. On Game-Theoretic Network Security Provisioning , 2012, Journal of Network and Systems Management.
[241] Quanyan Zhu,et al. GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks , 2012, IEEE Journal on Selected Areas in Communications.
[242] C. Timperley,et al. Analysis of clothing and urine from Moscow theatre siege casualties reveals carfentanil and remifentanil use. , 2012, Journal of analytical toxicology.
[243] Alexander Kelle,et al. Preventing a Biochemical Arms Race , 2012 .
[244] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[245] Jeremy Busby,et al. Social risk amplification as an attribution: the case of zoonotic disease outbreaks , 2012 .
[246] E. D’Angelo. The human brain project. , 2012, Functional neurology.
[247] Sushil Jajodia,et al. Moving Target Defense II: Application of Game Theory and Adversarial Modeling , 2012 .
[248] J. Panksepp,et al. The Archaeology of Mind: Neuroevolutionary Origins of Human Emotions , 2012 .
[249] D. Spyker,et al. Inhaled Fentanyl Aerosol in Healthy Volunteers: Pharmacokinetics and Pharmacodynamics , 2012, Anesthesia and analgesia.
[250] S. Eriksson,et al. Ethical Competence in Dual use Life Science Research , 2012 .
[251] Casey Rothschild,et al. Adversarial risk analysis with incomplete information: a level-k approach. , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[252] Bo Zhang,et al. Analysis of cascading failure in complex power networks under the load local preferential redistribution rule , 2012 .
[253] L. Rüschendorf,et al. Ordering of multivariate risk models with respect to extreme portfolio losses , 2012 .
[254] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[255] Anna Scaglione,et al. A Markov-Transition Model for Cascading Failures in Power Grids , 2012, 2012 45th Hawaii International Conference on System Sciences.
[256] Alpen-Adria. Turning Quantum Cryptography against itself: How to avoid indirect eavesdropping in quantum networks by passive and active adversaries , 2012 .
[257] Stefano Panzieri,et al. Modeling and simulation of critical infrastructures , 2012 .
[258] A. Simpson,et al. Development of an acute model of inhalational melioidosis in the common marmoset (Callithrix jacchus) , 2011, International journal of experimental pathology.
[259] B. Thomas,et al. Hijacking of Basic Research: The Case of Synthetic Cannabinoids. , 2011, Methods report.
[260] Walid Saad,et al. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[261] Lisa Rajbhandari,et al. Mapping between Classical Risk Management and Game Theoretical Approaches , 2011, Communications and Multimedia Security.
[262] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[263] J. Panksepp. Cross-Species Affective Neuroscience Decoding of the Primal Affective Experiences of Humans and Related Animals , 2011, PloS one.
[264] Steve Alpern,et al. Patrolling Games , 2011, Oper. Res..
[265] Anoop Singhal,et al. Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs , 2011 .
[266] Peter Schartner,et al. Information-leakage in hybrid randomized protocols , 2011, Proceedings of the International Conference on Security and Cryptography.
[267] Milind Tambe,et al. GUARDS - Innovative Application of Game Theory for National Airport Security , 2011, IJCAI.
[268] Pengcheng Zhang,et al. A generalized modeling framework to analyze interdependencies among infrastructure systems , 2011 .
[269] Andreas Wagener,et al. Increases in skewness and three-moment preferences , 2011, Math. Soc. Sci..
[270] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[271] Hemantha S. B. Herath,et al. Copula Based Actuarial Model for Pricing Cyber-Insurance Policies , 2011 .
[272] Michele-Lee Moore,et al. Research, part of a Special Feature on Resilience Through Multi-scalar Collaboration Surmountable Chasms: Networks and Social Innovation for Resilient Systems , 2011 .
[273] Stefan Eriksson,et al. A Precautionary Principle for Dual Use Research in the Life Sciences , 2011, Bioethics.
[274] David J. Anderson,et al. Functional identification of an aggression locus in the mouse hypothalamus , 2010, Nature.
[275] C. Seelig. The New Way of Working , 2011 .
[276] S. Sagan. The limitation of Safety-Organizations, accidents and nuclear weapons , 2011 .
[277] C. Causer. The Art of War , 2011, IEEE Potentials.
[278] Peter Schartner,et al. A Unified Framework for the Analysis of Availability, Reliability and Security, With Applications to Quantum Networks , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[279] Peter Schartner,et al. Quantum key distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option , 2010, 2010 International Computer Symposium (ICS2010).
[280] Michael Barber,et al. Deliverology 101: A Field Guide For Educational Leaders , 2010 .
[281] Madhav V. Marathe,et al. Cascading failures in multiple infrastructures: From transportation to communication network , 2010, 2010 5th International Conference on Critical Infrastructure (CRIS).
[282] Steve Alpern,et al. On Ruckle's Conjecture on Accumulation Games , 2010, SIAM J. Control. Optim..
[283] Peter Schartner,et al. Multipath Authentication without shared Secrets and with Applications in Quantum Networks , 2010, Security and Management.
[284] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[285] Quanyan Zhu,et al. Distributed correlated Q-learning for dynamic transmission control of sensor networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[286] P. Dade. A Dictionary of Psychology (3rd ed.) , 2010 .
[287] Reverse common ratio effect , 2010 .
[288] T. Preuss. Reinventing Primate Neuroscience for the Twenty-First Century , 2010 .
[289] M. Cartmill. Primate Classification and Diversity , 2010 .
[290] Sherif Ali Mohtady Mohamed,et al. Input-output impact risk propagation in critical infrastructure interdependency , 2010 .
[291] Michael Hamel-Green,et al. Organization for the Prohibition of Chemical Weapons , 2010 .
[292] Mouez Fodha,et al. Documents de Travail du Centre d ’ Economie de la Sorbonne The end of the Bertrand Paradox ? , 2010 .
[293] K. Srinathan,et al. Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality , 2010, Int. J. Appl. Cryptogr..
[294] H. Gintis. The Bounds of Reason: Game Theory and the Unification of the Behavioral Sciences , 2014 .
[295] Santanu Chaudhury,et al. Optimal sensor placement for surveillance of large spaces , 2009, 2009 Third ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC).
[296] Lance Fortnow,et al. The status of the P versus NP problem , 2009, CACM.
[297] Benoit Debaque,et al. Optimal video camera network deployment to support security monitoring , 2009, 2009 12th International Conference on Information Fusion.
[298] Toshiji Kawagoe,et al. Equilibrium refinement vs. level-k analysis: An experimental study of cheap-talk games with private information , 2009, Games Econ. Behav..
[299] R. Passingham. How good is the macaque monkey model of the human brain? , 2009, Current Opinion in Neurobiology.
[300] M. Eric Johnson,et al. Managing Information Risk and the Economics of Security , 2008, Managing Information Risk and the Economics of Security.
[301] C. Darwin,et al. The Expression of the Emotions in Man and Animals , 1956 .
[302] Stefan Rass. On Information-Theoretic Security - Contemporary Problems and Solutions , 2009 .
[303] George Friedman,et al. The Next 100 Years A Forecast for the 21st Century , 2009 .
[304] A. Falk,et al. Individual Risk Attitudes: Measurement, Determinants and Behavioral Consequences , 2009 .
[305] Cheng Zhang,et al. A Network Security Risk Assessment Framework Based on Game Theory , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[306] Maxim Finkelstein,et al. Failure Rate Modelling for Reliability and Risk , 2008 .
[307] Stefan Eriksson,et al. Taking Due Care: Moral Obligations in Dual Use Research , 2008, Bioethics.
[308] R. Poovendran,et al. Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[309] V. Crawford,et al. The Power of Focal Points Is Limited: Even Minute Payoff Asymmetry May Yield Large Coordination Failures , 2008 .
[310] Sarit Kraus,et al. ARMOR Security for Los Angeles International Airport , 2008, AAAI.
[311] Nicholas Bambos,et al. Security Decision-Making among Interdependent Organizations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[312] Marc Lelarge,et al. A local mean field analysis of security investments in networks , 2008, NetEcon '08.
[313] M. Dando,et al. Life scientists and the need for a culture of responsibility: after education … what? , 2008 .
[314] Guanrong Chen,et al. Universal robustness characteristic of weighted networks against cascading failure. , 2008, Physical review. E, Statistical, nonlinear, and soft matter physics.
[315] Yongge Wang,et al. Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.
[316] Richard E. Passingham,et al. What is special about the human brain , 2008 .
[317] Nikolaos Papanikolopoulos,et al. Optimal Camera Placement for Automated Surveillance Tasks , 2007, J. Intell. Robotic Syst..
[318] V. Crawford,et al. Level-k Auctions: Can a Non-Equilibrium Model of Strategic Thinking Explain the Winner's Curse and Overbidding in Private-Value Auctions? , 2007 .
[319] Executive Council , 2007 .
[320] Eitan Altman,et al. A Jamming Game in Wireless Networks with Transmission Cost , 2007, NET-COOP.
[321] Andrew Stirling,et al. Risk, precaution and science: towards a more constructive policy debate , 2007, EMBO reports.
[322] Matthias Fitzi,et al. Towards Optimal and Efficient Perfectly Secure Message Transmission , 2007, TCC.
[323] Etienne Mullet,et al. Risk Perception and Personality Facets , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[324] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[325] N. Koblitz. The Uneasy Relationship Between Mathematics and Cryptography , 2007 .
[326] BEIJING ON BIOHAZARDS: Chinese Experts on Bioweapons Nonproliferation Issues , 2007 .
[327] Vicki M. Bier,et al. Advances in Decision Analysis: Probabilistic Risk Analysis for Engineered Systems , 2007 .
[328] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[329] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[330] R. Lienhart,et al. On the optimal placement of multiple visual sensors , 2006, VSSN '06.
[331] Yacov Y. Haimes,et al. Managing the risk of terrorism to interdependent infrastructure systems through the dynamic inoperability input–output model , 2006, Syst. Eng..
[332] Jonathan Katz,et al. Rational Secret Sharing, Revisited , 2006, SCN.
[333] K. Jellinger,et al. Minds Behind the Brain. A History of the Pioneers and their Discoveries , 2006 .
[334] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[335] Mark Fabro,et al. Control Systems Cyber Security: Defense-in-Depth Strategies , 2006 .
[336] Alexander Kelle,et al. Controlling Biochemical Weapons: Adapting Multilateral Arms Control for the 21st Century , 2006 .
[337] Andrew McLennan,et al. Gambit: Software Tools for Game Theory , 2006 .
[338] Philipp Khaitovich,et al. Human brain evolution. , 2006, Progress in brain research.
[339] Howard Kunreuther,et al. You Can Only Die Once: Interdependent Security in an Uncertain World , 2005 .
[340] Ying Zhu,et al. Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[341] William L. Simon,et al. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , 2005 .
[342] Judea Pearl,et al. Influence Diagrams - Historical and Personal Perspectives , 2005, Decis. Anal..
[343] J. Wotton. Behavioral Neurobiology. An integrative approach. , 2005, Journal of Undergraduate Neuroscience Education.
[344] Chip Elliott,et al. Current status of the DARPA Quantum Network , 2005 .
[345] E. Soane,et al. Personality and domain‐specific risk taking , 2005 .
[346] Ulrich Berger,et al. Fictitious play in 2×n games , 2005, J. Econ. Theory.
[347] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[348] S. Carroll. Endless forms most beautiful : the new science of evo devo and the making of the animal kingdom , 2005 .
[349] Alexander Zelikovsky,et al. Multiobjective Games and Determining Pareto-Nash Equilibria , 2005 .
[350] Daniel S. Lieb,et al. Partition Dependence in Decision Analysis, Resource Allocation, and Consumer Choice , 2005 .
[351] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[352] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[353] Stergios B. Fotopoulos,et al. Introduction to Modern Nonparametric Statistics , 2004, Technometrics.
[354] W. House,et al. The National Security Strategy of the United States of America , 2004 .
[355] S. Dhami. ECONOMICS OF INFORMATION , 2004 .
[356] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[357] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[358] Miguel A. Costa-Gomes,et al. Cognition and Behavior in Two-Person Guessing Games: An Experimental Study , 2003 .
[359] Peter Christoffersen,et al. Série Scientifique Scientific Series 2003 s-05 Backtesting Value-at-Risk : A Duration-Based Approach , 2003 .
[360] James B Petro,et al. Biotechnology: impact on biological warfare and biodefense. , 2003, Biosecurity and bioterrorism : biodefense strategy, practice, and science.
[361] Graham J Hole,et al. How to Design and Report Experiments , 2002 .
[362] E. Weber,et al. A Domain-Specific Risk-Attitude Scale: Measuring Risk Perceptions and Risk Behaviors , 2002 .
[363] Aleta Ricciardi. Proceedings of the twenty-first annual symposium on Principles of distributed computing , 2002, PODC 2002.
[364] K. Srinathan,et al. On perfectly secure communication over arbitrary networks , 2002, PODC '02.
[365] Partha Dasgupta,et al. Topology of the conceptual network of language. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[366] William H. Ruckle,et al. Continuous accumulation games on discrete locations , 2002 .
[367] G. Pearson. Return to Geneva: The United Kingdom Green Paper , 2002 .
[368] J. Lakoski,et al. Preface to the Report: The Advantages and Limitations of Calmatives for Use as a Non-Lethal Technique , 2002 .
[369] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[370] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[371] Pietro Michiardi,et al. Game theoretic analysis of security in mobile ad hoc networks , 2002 .
[372] E. Vuori,et al. Fatal poisoning in drug addicts in the Nordic countries. , 2001, Forensic science international.
[373] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[374] Alan R. Washburn. A New Kind of Fictitious Play , 2001 .
[375] S. Parker,et al. Evolution: The Whole Story , 2001 .
[376] M. J. N. North. SMART II+ : the spot market agent research tool version 2.0 plus natural gas. , 2000 .
[377] Eric D. Eidson,et al. Aspen-EE: An Agent-Based Model of Infrastructure Interdependency , 2000 .
[378] M. Lepper,et al. The Construction of Preference: When Choice Is Demotivating: Can One Desire Too Much of a Good Thing? , 2006 .
[379] Peter P. Wakker,et al. On the Intuition of Rank-Dependent Utility , 2000 .
[380] E. Damme,et al. Non-Cooperative Games , 2000 .
[381] C. Starmer. Developments in Non-expected Utility Theory: The Hunt for a Descriptive Theory of Choice under Risk , 2000 .
[382] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[383] Aner Sela. Fictitious play in ‘one-against-all’ multi-player games , 1999 .
[384] Bart Preneel,et al. Software Performance of Universal Hash Functions , 1999, EUROCRYPT.
[385] Richard Gonzalez,et al. On the Shape of the Probability Weighting Function , 1999, Cognitive Psychology.
[386] Tal Rabin,et al. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.
[387] D. Prelec. The Probability Weighting Function , 1998 .
[388] Frank Kelly,et al. Rate control for communication networks: shadow prices, proportional fairness and stability , 1998, J. Oper. Res. Soc..
[389] Oded Goldreich,et al. On the possibility of basing Cryptography on the assumption that P ≠ NP , 1998, IACR Cryptol. ePrint Arch..
[390] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[391] A. Singh. Exponential Distribution: Theory, Methods and Applications , 1996 .
[392] Stuart Croft. Strategies of Arms Control: A History and Typology , 1996 .
[393] L. Shapley,et al. Fictitious Play Property for Games with Identical Interests , 1996 .
[394] T. Helleseth,et al. Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings , 1996, CRYPTO.
[395] Steven J. Humphrey. Regret aversion or event-splitting effects? more evidence under risk and uncertainty , 1995 .
[396] Shlomo Zilberstein,et al. Models of Bounded Rationality , 1995 .
[397] C. Robert. The Bayesian choice , 1994 .
[398] A. Scialli. Risk assessment uncertainties. , 1993, Reproductive toxicology.
[399] Robert Sugden,et al. Testing for juxtaposition and event-splitting effects , 1993 .
[400] Noemi Zoroa Alonso,et al. Some games of search on a lattice , 1993 .
[401] Graham S. Pearson. Prospects for Chemical and Biological Arms Control: The Web of Deterrence , 1993 .
[402] Mark J. Nigrini. The detection of income tax evasion through an analysis of digital distributions , 1993 .
[403] A. Tversky,et al. Advances in prospect theory: Cumulative representation of uncertainty , 1992 .
[404] Faruk Gul. A Theory of Disappointment Aversion , 1991 .
[405] John Nachbar. “Evolutionary” selection dynamics in games: Convergence and limit properties , 1990 .
[406] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[407] P. Simmons,et al. Nerve Cells and Animal Behaviour , 1989 .
[408] J. O'Rourke. Art gallery theorems and algorithms , 1987 .
[409] M. Yaari. The Dual Theory of Choice under Risk , 1987 .
[410] A. Tversky,et al. Rational choice and the framing of decisions , 1990 .
[411] Unoda. Fifth review conference of the states parties to the convention on the prohibition of the development, production and stockpiling of bacteriological (biological) and toxin weapons and on their destruction , 1986 .
[412] Steve Alpern,et al. The search value of a network , 1985, Networks.
[413] Tamer Basar,et al. With the Capacity 0.461(bits) and the Optimal Opd Being 'q = , 1998 .
[414] J. Quiggin. A theory of anticipated utility , 1982 .
[415] R. Sugden,et al. Regret Theory: An alternative theory of rational choice under uncertainty Review of Economic Studies , 1982 .
[416] David E. Bell,et al. Regret in Decision Making under Uncertainty , 1982, Oper. Res..
[417] Bengt Holmstrom,et al. Moral Hazard in Teams , 1982 .
[418] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[419] A. Tversky,et al. The framing of decisions and the psychology of choice. , 1981, Science.
[420] D. McFarland. The Oxford companion to animal behavior , 1981 .
[421] Adi Shamir,et al. How to share a secret , 1979, CACM.
[422] Bengt Holmstrom,et al. Moral Hazard and Observability , 1979 .
[423] Steve Fisk,et al. A short proof of Chvátal's Watchman Theorem , 1978, J. Comb. Theory, Ser. B.
[424] John B. Kidd,et al. Decisions with Multiple Objectives—Preferences and Value Tradeoffs , 1977 .
[425] S. Peltzman. The Effects of Automobile Safety Regulation , 1975, Journal of Political Economy.
[426] V. Chvátal. A combinatorial theorem in plane geometry , 1975 .
[427] J. Harsanyi. Games with randomly disturbed payoffs: A new rationale for mixed-strategy equilibrium points , 1973 .
[428] Jack Edmonds,et al. Matching, Euler tours and the Chinese postman , 1973, Math. Program..
[429] K. Lorenz. Behind the Mirror: A Search for a Natural History of Human Knowledge , 1973 .
[430] A W Galston. SCIENCE AND SOCIAL RESPONSIBILITY: A CASE HISTORY , 1972, Annals of the New York Academy of Sciences.
[431] W. Leontief. Input-output economics , 1967 .
[432] R. Castelluccio. [Introduction to neuropsychopharmacology]. , 1961, El Dia medico.
[433] E. Glover. DICTIONARY OF PSYCHOLOGY , 1959 .
[434] Philip Wolfe,et al. 16. ON A GAME WITHOUT A VALUE , 1958 .
[435] M. Allais. Le comportement de l'homme rationnel devant le risque : critique des postulats et axiomes de l'ecole americaine , 1953 .
[436] I. Glicksberg. A FURTHER GENERALIZATION OF THE KAKUTANI FIXED POINT THEOREM, WITH APPLICATION TO NASH EQUILIBRIUM POINTS , 1952 .
[437] E. Rowland. Theory of Games and Economic Behavior , 1946, Nature.
[438] E. S. Pearson,et al. On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .