Advanced Sciences and Technologies for Security Applications

This chapter outlines the benefits of Design Thinking as a creative framework for innovation that can be applied to projects and organisations across government, business and the public sector. It includes a short history of the Design Thinking approach to set context and define the concept. However, much of the ensuing discussion and evaluation of ideas and methods is based on recent publications, papers and journal articles to give a current view of academic and practitioner activities. At the heart of the approach is a people-centred focus, and the chapter discusses the role of Inclusive Design and design ethnography in underpinning Design Thinking. It outlines five principles: Involve People, Translate Design Thinking into Design Doing, Create Value and Capture Value, Follow the Arc of Design Thinking and Navigate Complexity. It aims to give an overarching view of Design Thinking, demonstrating the value that it can bring to diverse areas of research and application. Challenges and observations for progressing the approach are also noted.

[1]  Elba E. Serrano,et al.  Neuroethics Guiding Principles for the NIH BRAIN Initiative , 2018, The Journal of Neuroscience.

[2]  Nora D. Volkow,et al.  Neuroethics for the National Institutes of Health BRAIN Initiative , 2018, The Journal of Neuroscience.

[3]  Edward Perello,et al.  Editing Biosecurity: Needs and Strategies for Governing Genome Editing , 2018 .

[4]  Uma Chunduri,et al.  Preferred Path Routing - A Next-Generation Routing Framework beyond Segment Routing , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[5]  Division on Earth Governance of Dual Use Research in the Life Sciences , 2018 .

[6]  M. Dando,et al.  Preventing chemical weapons as sciences converge , 2018, Science.

[7]  T. Kuroki New Classification of Research Misconduct from the Viewpoint of Truth, Trust, and Risk , 2018, Accountability in research.

[8]  Quanyan Zhu,et al.  Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.

[9]  M. Dando,et al.  Ethics, neuroscience, and public policy , 2018, The Routledge Handbook of Ethics and Public Policy.

[10]  Xiang Liao,et al.  The paraventricular thalamus is a critical thalamic area for wakefulness , 2018, Science.

[11]  D. Caetano-Anollés,et al.  Agricultural research, or a new bioweapon system? , 2018, Science.

[12]  Anna Devor,et al.  Neuroethics Questions to Guide Ethical Research in the International Brain Initiatives , 2018, Neuron.

[13]  M. Platt,et al.  Opportunities and challenges for intranasal oxytocin treatment studies in nonhuman primates , 2018, American journal of primatology.

[14]  Rong-wei Zhang,et al.  The Locus Coeruleus Modulates Intravenous General Anesthesia of Zebrafish via a Cooperative Mechanism. , 2018, Cell reports.

[15]  W. Joiner The Neurobiological Basis of Sleep and Sleep Disorders. , 2018, Physiology.

[16]  Stefan Rass,et al.  Security from the Adversary's Inertia-Controlling Convergence Speed When Playing Mixed Strategy Equilibria , 2018, Games.

[17]  Stefan Rass,et al.  Trust and Distrust: On Sense and Nonsense in Big Data , 2018, Privacy and Identity Management.

[18]  M. Lipsitch,et al.  Opinion: Risk to study nonparticipants: A procedural approach , 2018, Proceedings of the National Academy of Sciences.

[19]  Masaki Isoda,et al.  Development of social systems neuroscience using macaques , 2018, Proceedings of the Japan Academy. Series B, Physical and biological sciences.

[20]  Dimitri Perrin,et al.  Muscarinic Acetylcholine Receptors Chrm1 and Chrm3 Are Essential for REM Sleep. , 2018, Cell reports.

[21]  Saheli Datta Burton,et al.  Understanding Interstate Competitiveness and International Security in European Dual-Use Research , 2018, Living Machines.

[22]  Sandra König,et al.  Assessing the Impact of Malware Attacks in Utility Networks , 2018 .

[23]  Stefan Rass,et al.  Game Theory for Security and Risk Management: From Theory to Practice , 2018 .

[24]  Quanyan Zhu,et al.  A hybrid stochastic game for secure control of cyber-physical systems , 2018, Autom..

[25]  K. J. Parker,et al.  Adaptive developmental plasticity in rhesus macaques: the serotonin transporter gene interacts with maternal care to affect juvenile social behaviour , 2018, Proceedings of the Royal Society B: Biological Sciences.

[26]  L. Young,et al.  Bridging the gap between rodents and humans: The role of non‐human primates in oxytocin research , 2018, American journal of primatology.

[27]  Ming Song,et al.  Brain Network Studies in Chronic Disorders of Consciousness: Advances and Perspectives , 2018, Neuroscience Bulletin.

[28]  Stefan Rass,et al.  Risk Assessment Uncertainties in Cybersecurity Investments , 2018, Games.

[29]  L. de Lecea,et al.  Hypocretin as a Hub for Arousal and Motivation , 2018, Front. Neurol..

[30]  S. Salloch The dual use of research ethics committees: why professional self-governance falls short in preserving biosecurity , 2018, BMC Medical Ethics.

[31]  P. Bregestovski,et al.  Light‐induced regulation of ligand‐gated channel activity , 2018, British journal of pharmacology.

[32]  Hideyuki Okano,et al.  Investigation of brain science and neurological/psychiatric disorders using genetically modified non-human primates , 2018, Current Opinion in Neurobiology.

[33]  Diana A. Liao,et al.  Constraints and flexibility during vocal development: insights from marmoset monkeys , 2018, Current Opinion in Behavioral Sciences.

[34]  D. Normile China's ambitious brain science project inches forward. , 2018, Science.

[35]  Quanyan Zhu,et al.  A Multi-Layer Feedback System Approach to Resilient Connectivity of Remotely Deployed Mobile Internet of Things , 2018, IEEE Transactions on Cognitive Communications and Networking.

[36]  A. Whiten,et al.  The pervasive role of social learning in primate lifetime development , 2018, Behavioral Ecology and Sociobiology.

[37]  Noritaka Ichinohe,et al.  Inequity aversion is observed in common marmosets but not in marmoset models of autism induced by prenatal exposure to valproic acid , 2018, Behavioural Brain Research.

[38]  Stefan Rass,et al.  Password Security as a Game of Entropies , 2018, Entropy.

[39]  M. Gaillard Looking for Neuroethics in Japan , 2018 .

[40]  G. Palchik,et al.  Monkey Business? Development, Influence, and Ethics of Potentially Dual-Use Brain Science on the World Stage , 2018 .

[41]  Quanyan Zhu,et al.  On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats , 2018, IEEE Access.

[42]  Walid Saad,et al.  Stochastic Games for Power Grid Protection Against Coordinated Cyber-Physical Attacks , 2018, IEEE Transactions on Smart Grid.

[43]  C. Saper,et al.  A hypothalamic circuit for the circadian control of aggression , 2018, Nature Neuroscience.

[44]  C. Yokoyama,et al.  Individual identity and affective valence in marmoset calls: in vivo brain imaging with vocal sound playback , 2018, Animal Cognition.

[45]  Nikolas Rose,et al.  The integrated ethics and society programme of the Human Brain Project: reflecting on an ongoing experience , 2018 .

[46]  Quanyan Zhu,et al.  A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[47]  B. Stahl,et al.  Accompanying technology development in the Human Brain Project: From foresight to ethics management , 2018, Futures.

[48]  Genserik Reniers,et al.  Applying a Bayesian Stackelberg game for securing a chemical plant , 2018 .

[49]  Quanyan Zhu,et al.  On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT) , 2018, IEEE Transactions on Wireless Communications.

[50]  C. Lovejoy,et al.  A neurochemical hypothesis for the origin of hominids , 2018, Proceedings of the National Academy of Sciences.

[51]  Jill Barr-Walker,et al.  Fentanyl, fentanyl analogs and novel synthetic opioids: A comprehensive review , 2017, Neuropharmacology.

[52]  Nikolas Rose,et al.  The Limits of Dual Use , 2018 .

[53]  Stefan Schauer,et al.  A Risk Management Approach for Highly Interconnected Networks , 2018 .

[54]  O. Burmeister,et al.  “Who Was That Masked Man?”: System Penetrations—Friend or Foe? , 2018 .

[55]  M. Dando,et al.  Dual-Use Nano-Neurotechnology: An assessment of the implications of trends in science and technology. , 2018, Politics and the life sciences : the journal of the Association for Politics and the Life Sciences.

[56]  Andrea Gawrylewski,et al.  Think Tank: Forty Neuroscientists Explore the Biological Roots of Human Experience. , 2018 .

[57]  Radha Poovendran,et al.  Decision and Game Theory for Security , 2018, Lecture Notes in Computer Science.

[58]  Jeremiah K Morrow,et al.  New perspectives on the neurophysiology of primate amygdala emerging from the study of naturalistic social behaviors. , 2018, Wiley interdisciplinary reviews. Cognitive science.

[59]  Annegret L. Falkner,et al.  Ventromedial Hypothalamus and the Generation of Aggression , 2017, Front. Syst. Neurosci..

[60]  Young T. Hong,et al.  Converging Prefronto-Insula-Amygdala Pathways in Negative Emotion Regulation in Marmoset Monkeys , 2017, Biological Psychiatry.

[61]  J. Giordano,et al.  Gene editing using CRISPR/Cas9: implications for dual-use and biosecurity , 2017, Protein & Cell.

[62]  Diane DiEuliis,et al.  Biosecurity Implications for the Synthesis of Horsepox, an Orthopoxvirus. , 2017, Health security.

[63]  Quanyan Zhu,et al.  A game-theoretic defense against data poisoning attacks in distributed support vector machines , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[64]  Kathleen Steinhöfel,et al.  Converging and emerging threats to health security , 2017, Environment Systems and Decisions.

[65]  Adam N. Phillips,et al.  The Neural Basis of Changing Social Norms through Persuasion , 2017, Scientific Reports.

[66]  Stefan Rass On Game-Theoretic Risk Management (Part Three) - Modeling and Applications , 2017 .

[67]  M. Bruchas,et al.  Polymorphic computation in locus coeruleus networks , 2017, Nature Neuroscience.

[68]  Stefan Rass,et al.  On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies , 2017, GameSec.

[69]  Quanyan Zhu,et al.  A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.

[70]  Branislav Bosanský,et al.  Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security , 2017, GameSec.

[71]  Quanyan Zhu,et al.  Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles , 2017, GameSec.

[72]  Rosario Gennaro,et al.  Efficient Rational Proofs for Space Bounded Computations , 2017, GameSec.

[73]  David Baker,et al.  Controlling the bioactivity of a peptide hormone in vivo by reversible self-assembly , 2017, Nature Communications.

[74]  Juan Huang,et al.  Sleep homeostasis regulated by 5HT2b receptor in a small subset of neurons in the dorsal fan-shaped body of drosophila , 2017, eLife.

[75]  Olivier Darbin,et al.  Editorial: Pathophysiology of the Basal Ganglia and Movement Disorders: Gaining New Insights from Modeling and Experimentation, to Influence the Clinic , 2017, Front. Hum. Neurosci..

[76]  Edgar A Ycu,et al.  Modular organization of the brainstem noradrenaline system coordinates opposing learning states , 2017, Nature Neuroscience.

[77]  Kenji Matsumoto,et al.  An eye tracking system for monitoring face scanning patterns reveals the enhancing effect of oxytocin on eye contact in common marmosets , 2017, Psychoneuroendocrinology.

[78]  Steve W C Chang An Emerging Field of Primate Social Neurophysiology: Current Developments , 2017, eNeuro.

[79]  L. Leenen,et al.  Accuracy of prehospital triage protocols in selecting severely injured patients: A systematic review , 2017, The journal of trauma and acute care surgery.

[80]  Quanyan Zhu,et al.  Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games , 2017, IEEE Transactions on Information Forensics and Security.

[81]  Quanyan Zhu,et al.  A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery: 125 , 2017, PERV.

[82]  Cori Vilella,et al.  Enjoying cooperative games: The R package GameTheory , 2017, Appl. Math. Comput..

[83]  G. Stuber,et al.  Locus coeruleus to basolateral amygdala noradrenergic projections promote anxiety-like behavior , 2017, eLife.

[84]  Asif A. Ghazanfar,et al.  Vocal Learning via Social Reinforcement by Infant Marmoset Monkeys , 2017, Current Biology.

[85]  Moody T. Chu,et al.  Markov chains with memory, tensor formulation, and the dynamics of power iteration , 2017, Appl. Math. Comput..

[86]  Quanyan Zhu,et al.  A mean-field stackelberg game approach for obfuscation adoption in empirical risk minimization , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[87]  Marcello Massimini,et al.  Shaping the Default Activity Pattern of the Cortical Network , 2017, Neuron.

[88]  Hui Yang,et al.  One-step generation of complete gene knockout mice and monkeys by CRISPR/Cas9-mediated gene editing with multiple sgRNAs , 2017, Cell Research.

[89]  Clifford B Saper,et al.  Wake–sleep circuitry: an overview , 2017, Current Opinion in Neurobiology.

[90]  Y. Dan,et al.  Editorial overview: Neurobiology of sleep 2017 , 2017, Current Opinion in Neurobiology.

[91]  Steve Alpern,et al.  Periodic Patrols on the Line and Other Networks , 2017 .

[92]  Daisuke Ono,et al.  Hypothalamic regulation of the sleep/wake cycle , 2017, Neuroscience Research.

[93]  Y. Hayashi,et al.  Sleep in vertebrate and invertebrate animals, and insights into the function and evolution of sleep , 2017, Neuroscience Research.

[94]  Michihiro Mieda The roles of orexins in sleep/wake regulation , 2017, Neuroscience Research.

[95]  A. Espay,et al.  Parkinson Disease: An Evolutionary Perspective , 2017, Front. Neurol..

[96]  Quanyan Zhu,et al.  Optimizing mission critical data dissemination in massive IoT networks , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[97]  Quanyan Zhu,et al.  A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks , 2017, SCAV@CPSWeek.

[98]  J. Peever,et al.  GABA Cells in the Central Nucleus of the Amygdala Promote Cataplexy , 2017, The Journal of Neuroscience.

[99]  B. Lowell,et al.  GABAergic Neurons of the Central Amygdala Promote Cataplexy , 2017, The Journal of Neuroscience.

[100]  Quanyan Zhu,et al.  Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory , 2017, IEEE Access.

[101]  Sébastien Tremblay,et al.  Social Decision-Making and the Brain: A Comparative Perspective , 2017, Trends in Cognitive Sciences.

[102]  The Lancet Neurology The Human Brain Project: adjusting the flagship's course , 2017, The Lancet Neurology.

[103]  Qian Tao,et al.  A retinoraphe projection regulates serotonergic activity and looming-evoked defensive behaviour , 2017, Nature Communications.

[104]  M. Platt,et al.  Can self-awareness be taught? Monkeys pass the mirror test—again , 2017, Proceedings of the National Academy of Sciences.

[105]  Christian List,et al.  Probabilistic opinion pooling generalized. Part one: general agendas , 2017, Soc. Choice Welf..

[106]  Jisheng Han,et al.  Genes Related to Oxytocin and Arginine-Vasopressin Pathways: Associations with Autism Spectrum Disorders , 2017, Neuroscience Bulletin.

[107]  Chi K. Tse,et al.  Modeling the Dynamics of Cascading Failures in Power Systems , 2017, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[108]  Z. Qiu,et al.  Non-human Primate Models for Brain Disorders – Towards Genetic Manipulations via Innovative Technology , 2017, Neuroscience Bulletin.

[109]  Quanyan Zhu,et al.  A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017, IEEE Journal on Selected Areas in Communications.

[110]  Ling Wang,et al.  Mu-ming Poo: China Brain Project and the future of Chinese neuroscience , 2017 .

[111]  M. Poo,et al.  Spontaneous expression of mirror self-recognition in monkeys after learning precise visual-proprioceptive association for mirror images , 2017, Proceedings of the National Academy of Sciences.

[112]  Walid Saad,et al.  Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game , 2017, 2017 IEEE International Conference on Communications (ICC).

[113]  M. A. MacIver,et al.  Neuroscience Needs Behavior: Correcting a Reductionist Bias , 2017, Neuron.

[114]  S. Kern,et al.  Characterization and pathogenesis of aerosolized eastern equine encephalitis in the common marmoset (Callithrix jacchus) , 2017, Virology Journal.

[115]  M. Bruchas,et al.  Optogenetic approaches for dissecting neuromodulation and GPCR signaling in neural circuits. , 2017, Current opinion in pharmacology.

[116]  Stefan Rass,et al.  Defending Against Advanced Persistent Threats Using Game-Theory , 2017, PloS one.

[117]  Mohammad Ashiqur Rahman,et al.  Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense , 2015, SafeConfig@CCS.

[118]  Kai Sun,et al.  Estimating the Propagation of Interdependent Cascading Outages With Multi-Type Branching Processes , 2014, IEEE Transactions on Power Systems.

[119]  S. Rass,et al.  Visual Risk Specification and Aggregation , 2017 .

[120]  I. Linkov,et al.  An Introduction to Resilience for Critical Infrastructures , 2017 .

[121]  H. Okano,et al.  Neuroscience Research Using Non-human Primate Models and Genome Editing , 2017 .

[122]  Neringa Mickevičiūtė,et al.  Lessons from the past for weapons of the future , 2017 .

[123]  T. Murphy FENTANYL : THE NEXT WAVE OF THE OPIOID CRISIS ” SUBCOMMITTEE ON OVERSIGHT AND INVESTIGATIONS COMMITTEE ON ENERGY AND COMMERCE UNITED STATES HOUSE OF REPRESENTATIVES The Honorable , 2017 .

[124]  Norepinephrine Transporter in Major Depressive Disorder: A PET Study. , 2017, The American journal of psychiatry.

[125]  Stefan Rass,et al.  Decisions with Uncertain Consequences—A Total Ordering on Loss-Distributions , 2016, PloS one.

[126]  Naeem Siddiqi,et al.  Intelligent Credit Scoring: Building and Implementing Better Credit Risk Scorecards , 2016 .

[127]  Genserik Reniers,et al.  A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks. , 2016, Risk analysis : an official publication of the Society for Risk Analysis.

[128]  Alois Knoll,et al.  The Human Brain Project: Creating a European Research Infrastructure to Decode the Human Brain , 2016, Neuron.

[129]  Quanyan Zhu,et al.  GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats , 2016, GameSec.

[130]  Anjon Basak,et al.  Combining Graph Contraction and Strategy Generation for Green Security Games , 2016, GameSec.

[131]  Nancy Y. Ip,et al.  China Brain Project: Basic Neuroscience, Brain Diseases, and Brain-Inspired Computing , 2016, Neuron.

[132]  Y. Yamaguchi,et al.  Brain/MINDS: A Japanese National Brain Project for Marmoset Neuroscience , 2016, Neuron.

[133]  C. Grady,et al.  Neuroethics in the Age of Brain Projects , 2016, Neuron.

[134]  Steve Alpern,et al.  Patrolling a Pipeline , 2016, GameSec.

[135]  Diana M. Bowman,et al.  Neurotechnology and Society: Strengthening Responsible Innovation in Brain Science , 2016, Neuron.

[136]  Vivien Marx,et al.  Neurobiology: learning from marmosets , 2016, Nature Methods.

[137]  Peter Schartner,et al.  On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack , 2016, IEEE Access.

[138]  S. Grillner,et al.  The Basal Ganglia Over 500 Million Years , 2016, Current Biology.

[139]  John Yen,et al.  Towards probabilistic identification of zero-day attack paths , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[140]  N. Mundy,et al.  Brain evolution and development: adaptation, allometry and constraint , 2016, Proceedings of the Royal Society B: Biological Sciences.

[141]  Steve Alpern,et al.  Patrolling a Border , 2016, Oper. Res..

[142]  Christof Koch,et al.  Worldwide initiatives to advance brain research , 2016, Nature Neuroscience.

[143]  Masahiko Watanabe,et al.  Crucial Roles of the Endocannabinoid 2-Arachidonoylglycerol in the Suppression of Epileptic Seizures. , 2016, Cell reports.

[144]  A. Inutsuka,et al.  The integrative role of orexin/hypocretin neurons in nociceptive perception and analgesic regulation , 2016, Scientific Reports.

[145]  Quanyan Zhu,et al.  Cross-layer secure cyber-physical control system design for networked 3D printers , 2016, 2016 American Control Conference (ACC).

[146]  Quanyan Zhu,et al.  Interdependent network formation games with an application to critical infrastructures , 2016, 2016 American Control Conference (ACC).

[147]  N. Stott Chemical control: Regulation of incapacitating chemical agent weapons, riot control agents and their means of delivery , 2016 .

[148]  Babak Sarani,et al.  The profile of wounding in civilian public mass shooting fatalities , 2016, The journal of trauma and acute care surgery.

[149]  Yun Liu,et al.  Agent-based computational modelling of social risk responses , 2016, Eur. J. Oper. Res..

[150]  Li Jiang,et al.  Cholinergic Signaling Controls Conditioned Fear Behaviors and Enhances Plasticity of Cortical-Amygdala Circuits , 2016, Neuron.

[151]  S. Maier,et al.  Morphine paradoxically prolongs neuropathic pain in rats by amplifying spinal NLRP3 inflammasome activation , 2016, Proceedings of the National Academy of Sciences.

[152]  Tony Q. S. Quek,et al.  A game theoretic model for enabling honeypots in IoT networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[153]  Paul D. Whissell,et al.  The Use of DREADDs to Deconstruct Behavior , 2016, Front. Genet..

[154]  K. Ressler,et al.  Mouse models of fear-related disorders: Cell-type-specific manipulations in amygdala , 2016, Neuroscience.

[155]  Clarence Filsfils,et al.  Source Packet Routing in Networking (SPRING) Problem Statement and Requirements , 2016, RFC.

[156]  V. Pitschmann,et al.  Military Importance of Natural Toxins and Their Analogs , 2016, Molecules.

[157]  F. D. Waal Are We Smart Enough to Know How Smart Animals Are , 2016 .

[158]  David A. Leopold,et al.  Marmosets: A Neuroscientific Model of Human Social Behavior , 2016, Neuron.

[159]  Genserik Reniers,et al.  On the assessment of uncertainty in risk diagrams , 2016 .

[160]  B. Roth,et al.  New Technologies for Elucidating Opioid Receptor Function. , 2016, Trends in pharmacological sciences.

[161]  Majeed M. Hayat,et al.  Cascading Failures in Interdependent Infrastructures: An Interdependent Markov-Chain Approach , 2016, IEEE Transactions on Smart Grid.

[162]  A. Berkowitz Governing Behavior: How Nerve Cell Dictatorships and Democracies Control Everything We Do , 2016 .

[163]  C. Patrick,et al.  Reshaping clinical science: Introduction to the Special Issue on Psychophysiology and the NIMH Research Domain Criteria (RDoC) initiative. , 2016, Psychophysiology.

[164]  Feng Zhang,et al.  Applications of CRISPR–Cas systems in neuroscience , 2015, Nature Reviews Neuroscience.

[165]  S. Elliott,et al.  25C-NBOMe as a New Hallucinogen , 2016 .

[166]  A. Masys Disrupting Terrorist and Criminal Networks: Crime Script Analysis Through DODAF Applications , 2016 .

[167]  Award for Distinguished Scientific Contributions: Terrie E. Moffitt and Avshalom Caspi. , 2016, The American psychologist.

[168]  Petra Himmel,et al.  Psychopharmacology Drugs The Brain And Behavior , 2016 .

[169]  John M. Pearson,et al.  Neural mechanisms of social decision-making in the primate amygdala , 2015, Proceedings of the National Academy of Sciences.

[170]  M. Cho,et al.  Engineering Values Into Genetic Engineering: A Proposed Analytic Framework for Scientific Social Responsibility , 2015, The American journal of bioethics : AJOB.

[171]  R. J. Cadigan,et al.  Scientific Social Responsibility: Lessons From the Corporate Social Responsibility Movement , 2015, The American journal of bioethics : AJOB.

[172]  M. Dando,et al.  Preventing Biological Threats: What You Can Do. , 2015 .

[173]  Quanyan Zhu,et al.  Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks , 2015, GameSec.

[174]  S. Grillner,et al.  The basal ganglia downstream control of brainstem motor centres—an evolutionarily conserved strategy , 2015, Current Opinion in Neurobiology.

[175]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[176]  Rui Zhang,et al.  Secure and resilient distributed machine learning under adversarial environments , 2015, 2015 18th International Conference on Information Fusion (Fusion).

[177]  David Banks,et al.  Adversarial Risk Analysis , 2015, IWSPA@CODASPY.

[178]  Kenneth Rose,et al.  Optimal Zero-Delay Jamming Over an Additive Noise Channel , 2015, IEEE Transactions on Information Theory.

[179]  Bryan L Roth,et al.  Structure and function of serotonin G protein-coupled receptors. , 2015, Pharmacology & therapeutics.

[180]  Hideyuki Okano,et al.  Brain/MINDS: brain-mapping project in Japan , 2015, Philosophical Transactions of the Royal Society B: Biological Sciences.

[181]  David A. Leopold,et al.  Brains, Genes, and Primates , 2015, Neuron.

[182]  S. Gilbert,et al.  The significance and scope of evolutionary developmental biology: a vision for the 21st century , 2015, Evolution & development.

[183]  E. Marder,et al.  Robust circuit rhythms in small circuits arise from variable circuit components and mechanisms , 2015, Current Opinion in Neurobiology.

[184]  Ralph Adolphs,et al.  The unsolved problems of neuroscience , 2015, Trends in Cognitive Sciences.

[185]  Quanyan Zhu,et al.  Deception by Design: Evidence-Based Signaling Games for Network Defense , 2015, WEIS.

[186]  I. Ojanperä,et al.  Fatal poisoning in drug addicts in the Nordic countries in 2012. , 2015, Forensic science international.

[187]  Emery N. Brown,et al.  The BRAIN Initiative: developing technology to catalyse neuroscience discovery , 2015, Philosophical Transactions of the Royal Society B: Biological Sciences.

[188]  James R. Clapper Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community, Senate Armed Services Committee, James R. Clapper, Director of National Intelligence, February 26, 2015 , 2015 .

[189]  Quanyan Zhu,et al.  A cyber-physical game framework for secure and resilient multi-agent autonomous systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[190]  Doug Rossinow Six. 1983: The World at the Brink , 2015 .

[191]  C. Macintyre,et al.  Re-thinking the ethics of dual-use research of concern on transmissible pathogens , 2015, Environment Systems and Decisions.

[192]  Kelsey E. Medeiros,et al.  Researcher Perceptions of Ethical Guidelines and Codes of Conduct , 2015, Accountability in research.

[193]  A. Philip Dawid,et al.  On individual risk , 2014, Synthese.

[194]  Kai Sun,et al.  An Interaction Model for Simulation and Mitigation of Cascading Failures , 2014, IEEE Transactions on Power Systems.

[195]  R. Skotnes RISK PERCEPTION REGARDING THE SAFETY AND SECURITY OF ICT SYSTEMS IN ELECTRIC POWER SUPPLY NETWORK COMPANIES , 2015 .

[196]  T. Stanley The fentanyl story. , 2014, The journal of pain : official journal of the American Pain Society.

[197]  Stefan Rass,et al.  Numerical Computation of Multi-goal Security Strategies , 2014, GameSec.

[198]  Quanyan Zhu,et al.  A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design , 2014, GameSec.

[199]  P. Bateson,et al.  Lab animals: Can GM marmoset use be justified? , 2014, Nature.

[200]  Stefan Rass,et al.  Secure Communication over Software-Defined Networks , 2015, Mob. Networks Appl..

[201]  Thomas Douglas The dual-use problem, scientific isolationism and the division of moral labour , 2014, Monash bioethics review.

[202]  David Cyranoski,et al.  Marmosets are stars of Japan’s ambitious brain project , 2014, Nature.

[203]  A. Ghazanfar,et al.  The neurobiology of primate vocal communication , 2014, Current Opinion in Neurobiology.

[204]  Matlab Matlab (the language of technical computing): using matlab graphics ver.5 , 2014 .

[205]  Ping Chen,et al.  A Study on Advanced Persistent Threats , 2014, Communications and Multimedia Security.

[206]  Yves Frégnac,et al.  Neuroscience: Where is the brain in the Human Brain Project? , 2014, Nature.

[207]  Roberto De Prisco,et al.  Forward Secure Non-Interactive Key Exchange , 2014, SCN.

[208]  Steve Alpern,et al.  Accumulation games on graphs , 2014, Networks.

[209]  Konstantinos Psounis,et al.  Will cyber-insurance improve network security? A market analysis , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[210]  Sungwook Kim,et al.  Game Theory Applications in Network Design , 2014 .

[211]  David J. Anderson,et al.  A Framework for Studying Emotions across Species , 2014, Cell.

[212]  G. Schneider Brain Structure and Its Origins: in Development and in Evolution of Behavior and the Mind , 2014 .

[213]  Jamal Raiyn,et al.  A survey of Cyber Attack Detection Strategies , 2014 .

[214]  Brenton Kenkel,et al.  Estimating Extensive Form Games in R , 2014 .

[215]  Nasir Ghani,et al.  Stochastic Analysis of Cascading-Failure Dynamics in Power Grids , 2014, IEEE Transactions on Power Systems.

[216]  M. Dando Neuroscience and the Future of Chemical-Biological Weapons , 2014 .

[217]  Asuman E. Ozdaglar,et al.  Network Security and Contagion , 2013, PERV.

[218]  C. Weber Determinants of Risk Tolerance , 2014 .

[219]  Rémi Boivin,et al.  Macrosocial Network Analysis: The Case of Transnational Drug Trafficking , 2014 .

[220]  R Core Team,et al.  R: A language and environment for statistical computing. , 2014 .

[221]  Min Ouyang,et al.  Review on modeling and simulation of interdependent critical infrastructure systems , 2014, Reliab. Eng. Syst. Saf..

[222]  Stefan Rass Complexity of Network Design for Private Communication and the P-vs-NP Question , 2014 .

[223]  S. Rajsbaum Foundations of Cryptography , 2014 .

[224]  Yoshio Okamoto,et al.  General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction , 2016, IACR Cryptol. ePrint Arch..

[225]  ปิยดา สมบัติวัฒนา Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .

[226]  Daniel Slamanig,et al.  Cryptography for Security and Privacy in Cloud Computing , 2013 .

[227]  Ueli Maurer,et al.  Rational Protocol Design: Cryptography against Incentive-Driven Adversaries , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.

[228]  Quanyan Zhu,et al.  Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).

[229]  Michael L. Platt,et al.  Neuroethology of primate social behavior , 2013, Proceedings of the National Academy of Sciences.

[230]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[231]  L. Degenhardt,et al.  Trends in fentanyl prescriptions and fentanyl-related mortality in Australia. , 2013, Drug and alcohol review.

[232]  Kamal Jamshidi,et al.  GTXOP: A Game Theoretic Approach for QoS Provisioning Using Transmission Opportunity Tuning , 2013, PloS one.

[233]  Stefan Rass,et al.  On Bayesian Trust and Risk Forecasting for Compound Systems , 2013, 2013 Seventh International Conference on IT Security Incident Management and IT Forensics.

[234]  Shengwei Mei,et al.  Towards Estimating the Statistics of Simulated Cascades of Outages With Branching Processes , 2013, IEEE Transactions on Power Systems.

[235]  Anthony Dudo,et al.  The “Science” of Science Communication , 2013 .

[236]  Quanyan Zhu,et al.  Deployment and exploitation of deceptive honeybots in social networks , 2012, 52nd IEEE Conference on Decision and Control.

[237]  Kate Larson,et al.  A Consensual Linear Opinion Pool , 2012, IJCAI.

[238]  Felix A. Fischer,et al.  On the Rate of Convergence of Fictitious Play , 2010, Theory of Computing Systems.

[239]  Anders Karlström,et al.  Scheduling choices under rank dependent utility maximization , 2014 .

[240]  Stefan Rass,et al.  On Game-Theoretic Network Security Provisioning , 2012, Journal of Network and Systems Management.

[241]  Quanyan Zhu,et al.  GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks , 2012, IEEE Journal on Selected Areas in Communications.

[242]  C. Timperley,et al.  Analysis of clothing and urine from Moscow theatre siege casualties reveals carfentanil and remifentanil use. , 2012, Journal of analytical toxicology.

[243]  Alexander Kelle,et al.  Preventing a Biochemical Arms Race , 2012 .

[244]  Ronald L. Rivest,et al.  FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.

[245]  Jeremy Busby,et al.  Social risk amplification as an attribution: the case of zoonotic disease outbreaks , 2012 .

[246]  E. D’Angelo The human brain project. , 2012, Functional neurology.

[247]  Sushil Jajodia,et al.  Moving Target Defense II: Application of Game Theory and Adversarial Modeling , 2012 .

[248]  J. Panksepp,et al.  The Archaeology of Mind: Neuroevolutionary Origins of Human Emotions , 2012 .

[249]  D. Spyker,et al.  Inhaled Fentanyl Aerosol in Healthy Volunteers: Pharmacokinetics and Pharmacodynamics , 2012, Anesthesia and analgesia.

[250]  S. Eriksson,et al.  Ethical Competence in Dual use Life Science Research , 2012 .

[251]  Casey Rothschild,et al.  Adversarial risk analysis with incomplete information: a level-k approach. , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[252]  Bo Zhang,et al.  Analysis of cascading failure in complex power networks under the load local preferential redistribution rule , 2012 .

[253]  L. Rüschendorf,et al.  Ordering of multivariate risk models with respect to extreme portfolio losses , 2012 .

[254]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[255]  Anna Scaglione,et al.  A Markov-Transition Model for Cascading Failures in Power Grids , 2012, 2012 45th Hawaii International Conference on System Sciences.

[256]  Alpen-Adria Turning Quantum Cryptography against itself: How to avoid indirect eavesdropping in quantum networks by passive and active adversaries , 2012 .

[257]  Stefano Panzieri,et al.  Modeling and simulation of critical infrastructures , 2012 .

[258]  A. Simpson,et al.  Development of an acute model of inhalational melioidosis in the common marmoset (Callithrix jacchus) , 2011, International journal of experimental pathology.

[259]  B. Thomas,et al.  Hijacking of Basic Research: The Case of Synthetic Cannabinoids. , 2011, Methods report.

[260]  Walid Saad,et al.  Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[261]  Lisa Rajbhandari,et al.  Mapping between Classical Risk Management and Game Theoretical Approaches , 2011, Communications and Multimedia Security.

[262]  Sushil Jajodia,et al.  Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.

[263]  J. Panksepp Cross-Species Affective Neuroscience Decoding of the Primal Affective Experiences of Humans and Related Animals , 2011, PloS one.

[264]  Steve Alpern,et al.  Patrolling Games , 2011, Oper. Res..

[265]  Anoop Singhal,et al.  Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs , 2011 .

[266]  Peter Schartner,et al.  Information-leakage in hybrid randomized protocols , 2011, Proceedings of the International Conference on Security and Cryptography.

[267]  Milind Tambe,et al.  GUARDS - Innovative Application of Game Theory for National Airport Security , 2011, IJCAI.

[268]  Pengcheng Zhang,et al.  A generalized modeling framework to analyze interdependencies among infrastructure systems , 2011 .

[269]  Andreas Wagener,et al.  Increases in skewness and three-moment preferences , 2011, Math. Soc. Sci..

[270]  M. Dufwenberg Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.

[271]  Hemantha S. B. Herath,et al.  Copula Based Actuarial Model for Pricing Cyber-Insurance Policies , 2011 .

[272]  Michele-Lee Moore,et al.  Research, part of a Special Feature on Resilience Through Multi-scalar Collaboration Surmountable Chasms: Networks and Social Innovation for Resilient Systems , 2011 .

[273]  Stefan Eriksson,et al.  A Precautionary Principle for Dual Use Research in the Life Sciences , 2011, Bioethics.

[274]  David J. Anderson,et al.  Functional identification of an aggression locus in the mouse hypothalamus , 2010, Nature.

[275]  C. Seelig The New Way of Working , 2011 .

[276]  S. Sagan The limitation of Safety-Organizations, accidents and nuclear weapons , 2011 .

[277]  C. Causer The Art of War , 2011, IEEE Potentials.

[278]  Peter Schartner,et al.  A Unified Framework for the Analysis of Availability, Reliability and Security, With Applications to Quantum Networks , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[279]  Peter Schartner,et al.  Quantum key distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option , 2010, 2010 International Computer Symposium (ICS2010).

[280]  Michael Barber,et al.  Deliverology 101: A Field Guide For Educational Leaders , 2010 .

[281]  Madhav V. Marathe,et al.  Cascading failures in multiple infrastructures: From transportation to communication network , 2010, 2010 5th International Conference on Critical Infrastructure (CRIS).

[282]  Steve Alpern,et al.  On Ruckle's Conjecture on Accumulation Games , 2010, SIAM J. Control. Optim..

[283]  Peter Schartner,et al.  Multipath Authentication without shared Secrets and with Applications in Quantum Networks , 2010, Security and Management.

[284]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[285]  Quanyan Zhu,et al.  Distributed correlated Q-learning for dynamic transmission control of sensor networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[286]  P. Dade A Dictionary of Psychology (3rd ed.) , 2010 .

[287]  Reverse common ratio effect , 2010 .

[288]  T. Preuss Reinventing Primate Neuroscience for the Twenty-First Century , 2010 .

[289]  M. Cartmill Primate Classification and Diversity , 2010 .

[290]  Sherif Ali Mohtady Mohamed,et al.  Input-output impact risk propagation in critical infrastructure interdependency , 2010 .

[291]  Michael Hamel-Green,et al.  Organization for the Prohibition of Chemical Weapons , 2010 .

[292]  Mouez Fodha,et al.  Documents de Travail du Centre d ’ Economie de la Sorbonne The end of the Bertrand Paradox ? , 2010 .

[293]  K. Srinathan,et al.  Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality , 2010, Int. J. Appl. Cryptogr..

[294]  H. Gintis The Bounds of Reason: Game Theory and the Unification of the Behavioral Sciences , 2014 .

[295]  Santanu Chaudhury,et al.  Optimal sensor placement for surveillance of large spaces , 2009, 2009 Third ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC).

[296]  Lance Fortnow,et al.  The status of the P versus NP problem , 2009, CACM.

[297]  Benoit Debaque,et al.  Optimal video camera network deployment to support security monitoring , 2009, 2009 12th International Conference on Information Fusion.

[298]  Toshiji Kawagoe,et al.  Equilibrium refinement vs. level-k analysis: An experimental study of cheap-talk games with private information , 2009, Games Econ. Behav..

[299]  R. Passingham How good is the macaque monkey model of the human brain? , 2009, Current Opinion in Neurobiology.

[300]  M. Eric Johnson,et al.  Managing Information Risk and the Economics of Security , 2008, Managing Information Risk and the Economics of Security.

[301]  C. Darwin,et al.  The Expression of the Emotions in Man and Animals , 1956 .

[302]  Stefan Rass On Information-Theoretic Security - Contemporary Problems and Solutions , 2009 .

[303]  George Friedman,et al.  The Next 100 Years A Forecast for the 21st Century , 2009 .

[304]  A. Falk,et al.  Individual Risk Attitudes: Measurement, Determinants and Behavioral Consequences , 2009 .

[305]  Cheng Zhang,et al.  A Network Security Risk Assessment Framework Based on Game Theory , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[306]  Maxim Finkelstein,et al.  Failure Rate Modelling for Reliability and Risk , 2008 .

[307]  Stefan Eriksson,et al.  Taking Due Care: Moral Obligations in Dual Use Research , 2008, Bioethics.

[308]  R. Poovendran,et al.  Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[309]  V. Crawford,et al.  The Power of Focal Points Is Limited: Even Minute Payoff Asymmetry May Yield Large Coordination Failures , 2008 .

[310]  Sarit Kraus,et al.  ARMOR Security for Los Angeles International Airport , 2008, AAAI.

[311]  Nicholas Bambos,et al.  Security Decision-Making among Interdependent Organizations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.

[312]  Marc Lelarge,et al.  A local mean field analysis of security investments in networks , 2008, NetEcon '08.

[313]  M. Dando,et al.  Life scientists and the need for a culture of responsibility: after education … what? , 2008 .

[314]  Guanrong Chen,et al.  Universal robustness characteristic of weighted networks against cascading failure. , 2008, Physical review. E, Statistical, nonlinear, and soft matter physics.

[315]  Yongge Wang,et al.  Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.

[316]  Richard E. Passingham,et al.  What is special about the human brain , 2008 .

[317]  Nikolaos Papanikolopoulos,et al.  Optimal Camera Placement for Automated Surveillance Tasks , 2007, J. Intell. Robotic Syst..

[318]  V. Crawford,et al.  Level-k Auctions: Can a Non-Equilibrium Model of Strategic Thinking Explain the Winner's Curse and Overbidding in Private-Value Auctions? , 2007 .

[319]  Executive Council , 2007 .

[320]  Eitan Altman,et al.  A Jamming Game in Wireless Networks with Transmission Cost , 2007, NET-COOP.

[321]  Andrew Stirling,et al.  Risk, precaution and science: towards a more constructive policy debate , 2007, EMBO reports.

[322]  Matthias Fitzi,et al.  Towards Optimal and Efficient Perfectly Secure Message Transmission , 2007, TCC.

[323]  Etienne Mullet,et al.  Risk Perception and Personality Facets , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[324]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[325]  N. Koblitz The Uneasy Relationship Between Mathematics and Cryptography , 2007 .

[326]  BEIJING ON BIOHAZARDS: Chinese Experts on Bioweapons Nonproliferation Issues , 2007 .

[327]  Vicki M. Bier,et al.  Advances in Decision Analysis: Probabilistic Risk Analysis for Engineered Systems , 2007 .

[328]  Sushil Jajodia,et al.  Topological analysis of network attack vulnerability , 2006, PST.

[329]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[330]  R. Lienhart,et al.  On the optimal placement of multiple visual sensors , 2006, VSSN '06.

[331]  Yacov Y. Haimes,et al.  Managing the risk of terrorism to interdependent infrastructure systems through the dynamic inoperability input–output model , 2006, Syst. Eng..

[332]  Jonathan Katz,et al.  Rational Secret Sharing, Revisited , 2006, SCN.

[333]  K. Jellinger,et al.  Minds Behind the Brain. A History of the Pioneers and their Discoveries , 2006 .

[334]  Dimitris Bertsimas,et al.  Robust game theory , 2006, Math. Program..

[335]  Mark Fabro,et al.  Control Systems Cyber Security: Defense-in-Depth Strategies , 2006 .

[336]  Alexander Kelle,et al.  Controlling Biochemical Weapons: Adapting Multilateral Arms Control for the 21st Century , 2006 .

[337]  Andrew McLennan,et al.  Gambit: Software Tools for Game Theory , 2006 .

[338]  Philipp Khaitovich,et al.  Human brain evolution. , 2006, Progress in brain research.

[339]  Howard Kunreuther,et al.  You Can Only Die Once: Interdependent Security in an Uncertain World , 2005 .

[340]  Ying Zhu,et al.  Graphical passwords: a survey , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[341]  William L. Simon,et al.  The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , 2005 .

[342]  Judea Pearl,et al.  Influence Diagrams - Historical and Personal Perspectives , 2005, Decis. Anal..

[343]  J. Wotton Behavioral Neurobiology. An integrative approach. , 2005, Journal of Undergraduate Neuroscience Education.

[344]  Chip Elliott,et al.  Current status of the DARPA Quantum Network , 2005 .

[345]  E. Soane,et al.  Personality and domain‐specific risk taking , 2005 .

[346]  Ulrich Berger,et al.  Fictitious play in 2×n games , 2005, J. Econ. Theory.

[347]  Martin Tompa,et al.  How to share a secret with cheaters , 1988, Journal of Cryptology.

[348]  S. Carroll Endless forms most beautiful : the new science of evo devo and the making of the animal kingdom , 2005 .

[349]  Alexander Zelikovsky,et al.  Multiobjective Games and Determining Pareto-Nash Equilibria , 2005 .

[350]  Daniel S. Lieb,et al.  Partition Dependence in Decision Analysis, Resource Allocation, and Consumer Choice , 2005 .

[351]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[352]  T. Basar,et al.  A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[353]  Stergios B. Fotopoulos,et al.  Introduction to Modern Nonparametric Statistics , 2004, Technometrics.

[354]  W. House,et al.  The National Security Strategy of the United States of America , 2004 .

[355]  S. Dhami ECONOMICS OF INFORMATION , 2004 .

[356]  Victor Shoup,et al.  Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..

[357]  Murali S. Kodialam,et al.  Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[358]  Miguel A. Costa-Gomes,et al.  Cognition and Behavior in Two-Person Guessing Games: An Experimental Study , 2003 .

[359]  Peter Christoffersen,et al.  Série Scientifique Scientific Series 2003 s-05 Backtesting Value-at-Risk : A Duration-Based Approach , 2003 .

[360]  James B Petro,et al.  Biotechnology: impact on biological warfare and biodefense. , 2003, Biosecurity and bioterrorism : biodefense strategy, practice, and science.

[361]  Graham J Hole,et al.  How to Design and Report Experiments , 2002 .

[362]  E. Weber,et al.  A Domain-Specific Risk-Attitude Scale: Measuring Risk Perceptions and Risk Behaviors , 2002 .

[363]  Aleta Ricciardi Proceedings of the twenty-first annual symposium on Principles of distributed computing , 2002, PODC 2002.

[364]  K. Srinathan,et al.  On perfectly secure communication over arbitrary networks , 2002, PODC '02.

[365]  Partha Dasgupta,et al.  Topology of the conceptual network of language. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[366]  William H. Ruckle,et al.  Continuous accumulation games on discrete locations , 2002 .

[367]  G. Pearson Return to Geneva: The United Kingdom Green Paper , 2002 .

[368]  J. Lakoski,et al.  Preface to the Report: The Advantages and Limitations of Calmatives for Use as a Non-Lethal Technique , 2002 .

[369]  Stefan Axelsson,et al.  Intrusion Detection Systems: A Survey and Taxonomy , 2002 .

[370]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[371]  Pietro Michiardi,et al.  Game theoretic analysis of security in mobile ad hoc networks , 2002 .

[372]  E. Vuori,et al.  Fatal poisoning in drug addicts in the Nordic countries. , 2001, Forensic science international.

[373]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 1, Basic Tools , 2001 .

[374]  Alan R. Washburn A New Kind of Fictitious Play , 2001 .

[375]  S. Parker,et al.  Evolution: The Whole Story , 2001 .

[376]  M. J. N. North SMART II+ : the spot market agent research tool version 2.0 plus natural gas. , 2000 .

[377]  Eric D. Eidson,et al.  Aspen-EE: An Agent-Based Model of Infrastructure Interdependency , 2000 .

[378]  M. Lepper,et al.  The Construction of Preference: When Choice Is Demotivating: Can One Desire Too Much of a Good Thing? , 2006 .

[379]  Peter P. Wakker,et al.  On the Intuition of Rank-Dependent Utility , 2000 .

[380]  E. Damme,et al.  Non-Cooperative Games , 2000 .

[381]  C. Starmer Developments in Non-expected Utility Theory: The Hunt for a Descriptive Theory of Choice under Risk , 2000 .

[382]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[383]  Aner Sela Fictitious play in ‘one-against-all’ multi-player games , 1999 .

[384]  Bart Preneel,et al.  Software Performance of Universal Hash Functions , 1999, EUROCRYPT.

[385]  Richard Gonzalez,et al.  On the Shape of the Probability Weighting Function , 1999, Cognitive Psychology.

[386]  Tal Rabin,et al.  Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.

[387]  D. Prelec The Probability Weighting Function , 1998 .

[388]  Frank Kelly,et al.  Rate control for communication networks: shadow prices, proportional fairness and stability , 1998, J. Oper. Res. Soc..

[389]  Oded Goldreich,et al.  On the possibility of basing Cryptography on the assumption that P ≠ NP , 1998, IACR Cryptol. ePrint Arch..

[390]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[391]  A. Singh Exponential Distribution: Theory, Methods and Applications , 1996 .

[392]  Stuart Croft Strategies of Arms Control: A History and Typology , 1996 .

[393]  L. Shapley,et al.  Fictitious Play Property for Games with Identical Interests , 1996 .

[394]  T. Helleseth,et al.  Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings , 1996, CRYPTO.

[395]  Steven J. Humphrey Regret aversion or event-splitting effects? more evidence under risk and uncertainty , 1995 .

[396]  Shlomo Zilberstein,et al.  Models of Bounded Rationality , 1995 .

[397]  C. Robert The Bayesian choice , 1994 .

[398]  A. Scialli Risk assessment uncertainties. , 1993, Reproductive toxicology.

[399]  Robert Sugden,et al.  Testing for juxtaposition and event-splitting effects , 1993 .

[400]  Noemi Zoroa Alonso,et al.  Some games of search on a lattice , 1993 .

[401]  Graham S. Pearson Prospects for Chemical and Biological Arms Control: The Web of Deterrence , 1993 .

[402]  Mark J. Nigrini The detection of income tax evasion through an analysis of digital distributions , 1993 .

[403]  A. Tversky,et al.  Advances in prospect theory: Cumulative representation of uncertainty , 1992 .

[404]  Faruk Gul A Theory of Disappointment Aversion , 1991 .

[405]  John Nachbar “Evolutionary” selection dynamics in games: Convergence and limit properties , 1990 .

[406]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[407]  P. Simmons,et al.  Nerve Cells and Animal Behaviour , 1989 .

[408]  J. O'Rourke Art gallery theorems and algorithms , 1987 .

[409]  M. Yaari The Dual Theory of Choice under Risk , 1987 .

[410]  A. Tversky,et al.  Rational choice and the framing of decisions , 1990 .

[411]  Unoda Fifth review conference of the states parties to the convention on the prohibition of the development, production and stockpiling of bacteriological (biological) and toxin weapons and on their destruction , 1986 .

[412]  Steve Alpern,et al.  The search value of a network , 1985, Networks.

[413]  Tamer Basar,et al.  With the Capacity 0.461(bits) and the Optimal Opd Being 'q = , 1998 .

[414]  J. Quiggin A theory of anticipated utility , 1982 .

[415]  R. Sugden,et al.  Regret Theory: An alternative theory of rational choice under uncertainty Review of Economic Studies , 1982 .

[416]  David E. Bell,et al.  Regret in Decision Making under Uncertainty , 1982, Oper. Res..

[417]  Bengt Holmstrom,et al.  Moral Hazard in Teams , 1982 .

[418]  R. J. McEliece,et al.  On sharing secrets and Reed-Solomon codes , 1981, CACM.

[419]  A. Tversky,et al.  The framing of decisions and the psychology of choice. , 1981, Science.

[420]  D. McFarland The Oxford companion to animal behavior , 1981 .

[421]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[422]  Bengt Holmstrom,et al.  Moral Hazard and Observability , 1979 .

[423]  Steve Fisk,et al.  A short proof of Chvátal's Watchman Theorem , 1978, J. Comb. Theory, Ser. B.

[424]  John B. Kidd,et al.  Decisions with Multiple Objectives—Preferences and Value Tradeoffs , 1977 .

[425]  S. Peltzman The Effects of Automobile Safety Regulation , 1975, Journal of Political Economy.

[426]  V. Chvátal A combinatorial theorem in plane geometry , 1975 .

[427]  J. Harsanyi Games with randomly disturbed payoffs: A new rationale for mixed-strategy equilibrium points , 1973 .

[428]  Jack Edmonds,et al.  Matching, Euler tours and the Chinese postman , 1973, Math. Program..

[429]  K. Lorenz Behind the Mirror: A Search for a Natural History of Human Knowledge , 1973 .

[430]  A W Galston SCIENCE AND SOCIAL RESPONSIBILITY: A CASE HISTORY , 1972, Annals of the New York Academy of Sciences.

[431]  W. Leontief Input-output economics , 1967 .

[432]  R. Castelluccio [Introduction to neuropsychopharmacology]. , 1961, El Dia medico.

[433]  E. Glover DICTIONARY OF PSYCHOLOGY , 1959 .

[434]  Philip Wolfe,et al.  16. ON A GAME WITHOUT A VALUE , 1958 .

[435]  M. Allais Le comportement de l'homme rationnel devant le risque : critique des postulats et axiomes de l'ecole americaine , 1953 .

[436]  I. Glicksberg A FURTHER GENERALIZATION OF THE KAKUTANI FIXED POINT THEOREM, WITH APPLICATION TO NASH EQUILIBRIUM POINTS , 1952 .

[437]  E. Rowland Theory of Games and Economic Behavior , 1946, Nature.

[438]  E. S. Pearson,et al.  On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .