Strategic Defense and Attack of Complex Networks
暂无分享,去创建一个
[1] David W. Coit,et al. Multi-objective optimization using genetic algorithms: A tutorial , 2006, Reliab. Eng. Syst. Saf..
[2] K. Hausken. Production and Conflict Models Versus Rent-Seeking Models , 2005 .
[3] K. Hausken. Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[4] U. Brandes. A faster algorithm for betweenness centrality , 2001 .
[5] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[6] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[7] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[8] J. Nash,et al. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[9] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[10] S. Skaperdas. Contest success functions , 1996 .
[11] G. Tullock. Efficient Rent Seeking , 2001 .
[12] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[13] George E. Apostolakis,et al. Identification of critical locations across multiple infrastructures for terrorist actions , 2007, Reliab. Eng. Syst. Saf..
[14] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[15] C. Shapiro,et al. Network Externalities, Competition, and Compatibility , 1985 .
[16] K. Hausken. Income, interdependence, and substitution effects affecting incentives for security investment , 2006 .
[17] H. Kunreuther,et al. Interdependent Security , 2003 .
[18] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[19] J. Hirshleifer. Anarchy and its Breakdown , 1995, Journal of Political Economy.
[20] Manfred Kochen,et al. Small World , 2002 .
[21] Gregory Levitin,et al. Optimizing survivability of vulnerable series-parallel multi-state systems , 2003, Reliab. Eng. Syst. Saf..
[22] Ying-Cheng Lai,et al. Attack vulnerability of scale-free networks due to cascading breakdown. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[23] Jacques Periaux,et al. Combining game theory and genetic algorithms with application to DDM-nozzle optimization problems , 2001 .
[24] Robert E. Marks,et al. Playing Games with Genetic Algorithms , 2002 .
[25] G. Woo. Quantitative Terrorism Risk Assessment , 2002 .
[26] Gregory Levitin. Genetic algorithms in reliability engineering , 2006, Reliab. Eng. Syst. Saf..
[27] Kjell Hausken. Strategic defense and attack for series and parallel reliability systems , 2008, Eur. J. Oper. Res..
[28] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[29] C. E. Lemke,et al. Equilibrium Points of Bimatrix Games , 1964 .
[30] L. Darrell Whitley,et al. The GENITOR Algorithm and Selection Pressure: Why Rank-Based Allocation of Reproductive Trials is Best , 1989, ICGA.
[31] J M Carlson,et al. Highly optimized tolerance: a mechanism for power laws in designed systems. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[32] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[33] G. Tullock. THE WELFARE COSTS OF TARIFFS, MONOPOLIES, AND THEFT , 1967 .
[34] Vicki M. Bier,et al. Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..
[35] B. Stengel,et al. COMPUTING EQUILIBRIA FOR TWO-PERSON GAMES , 1996 .
[36] J. Harsanyi. Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .
[37] H. Simon,et al. A Behavioral Model of Rational Choice , 1955 .
[38] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[39] S. Low,et al. The "robust yet fragile" nature of the Internet. , 2005, Proceedings of the National Academy of Sciences of the United States of America.
[40] Gregory Levitin,et al. Computational Intelligence in Reliability Engineering: Evolutionary Techniques in Reliability Analysis and Optimization , 2006, Studies in Computational Intelligence.
[41] Gregory Levitin. Optimal Defense Strategy Against Intentional Attacks , 2007, IEEE Transactions on Reliability.
[42] I. M. Destler,et al. Protecting the American Homeland , 2003 .
[43] Vicki M. Bier,et al. Optimal Allocation of Resources for Defense of Simple Series and Parallel Systems from Determined Adversaries , 2003 .
[44] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[45] Gregory Levitin,et al. Optimal multilevel protection in series-parallel systems , 2003, Reliab. Eng. Syst. Saf..
[46] Shishir Nagaraja,et al. The Topology of Covert Conflict , 2005, WEIS.