Revenge or continued attack and defense in defender-attacker conflicts
暂无分享,去创建一个
[1] S. Skaperdas. Contest success functions , 1996 .
[2] Kjell Hausken,et al. Whether to attack a terrorist's resource stock today or tomorrow , 2008, Games Econ. Behav..
[3] Mario Gollwitzer,et al. What gives victims satisfaction when they seek revenge , 2011 .
[4] Subhayu Bandyopadhyay,et al. The Interplay between Preemptive and Defensive Counterterrorism Measures: A Two‐Stage Game , 2008 .
[5] Kjell Hausken,et al. Defending against multiple different attackers , 2011, Eur. J. Oper. Res..
[6] H. Pringle. Crow Creek's Revenge , 1998, Science.
[7] Roger Hartley,et al. Asymmetric contests with general technologies , 2005 .
[8] Todd Sandler,et al. Terrorists versus the Government , 2006 .
[9] Gregory Levitin,et al. Defence resource distribution between protection and decoys for constant resource stockpiling pace , 2013, J. Oper. Res. Soc..
[10] Ronald A. Howard,et al. Analysis of National Strategies to Counter a Country's Nuclear Weapons Program , 2011, Decis. Anal..
[11] Kjell Hausken,et al. Governments' and Terrorists' Defense and Attack in a T-Period Game , 2011, Decis. Anal..
[12] J. Atsu Amegashie,et al. The Paradox of Revenge in Conflicts , 2008 .
[13] William E. Stein,et al. Asymmetric Rent-Seeking with More than Two Contestants , 2002 .
[14] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[15] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[16] Kjell Hausken,et al. Strategic defense and attack of series systems when agents move sequentially , 2011 .
[17] Marie-Elisabeth Paté-Cornell. Games, Risks, and Analytics: Several Illustrative Cases Involving National Security and Management Situations , 2012, Decis. Anal..
[18] N. Long. The theory of contests: A unified model and review of the literature , 2013 .
[19] Mario Gollwitzer,et al. What makes revenge sweet: Seeing the offender suffer or delivering a message? , 2009 .
[20] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[21] L. Skitka,et al. Motivated and displaced revenge: Remembering 9/11 suppresses opposition to military intervention in Syria (for some). , 2015 .
[22] Kjell Hausken,et al. Defense and attack for interdependent systems , 2017, Eur. J. Oper. Res..
[23] N. Chagnon,et al. Life Histories, Blood Revenge, and Warfare in a Tribal Population , 1988, Science.
[24] Jun Zhuang,et al. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[25] T. Sandler,et al. A Theoretical Analysis of Transnational Terrorism , 1983, American Political Science Review.
[26] M. Ross,et al. The Benefits, Costs, and Paradox of Revenge , 2010 .
[27] National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision , 2012 .
[28] Kjell Hausken. Strategic defense and attack for series and parallel reliability systems , 2008, Eur. J. Oper. Res..
[29] D. D. de Quervain,et al. The Neural Basis of Altruistic Punishment , 2004, Science.
[30] P. Liberman. Retributive Support for International Punishment and Torture , 2013 .
[31] J. Derksen,et al. Revenge: An Analysis of Its Psychological Underpinnings. , 2015, International journal of offender therapy and comparative criminology.
[32] B. Bushman,et al. Vicarious Revenge and the Death of Osama bin Laden , 2014, Personality & social psychology bulletin.
[33] G. Tullock. Efficient Rent Seeking , 2001 .
[34] G. Carruthers. Making sense of spousal revenge filicide , 2016 .
[35] N. Frijda. The laws of emotion. , 1988, The American psychologist.
[36] Dmitry Ryvkin. Heterogeneity of Players and Aggregate Effort in Contests , 2013 .
[37] H. Aliyev,et al. Blood Revenge and Violent Mobilization: Evidence from the Chechen Wars , 2015, International Security.
[38] Xiaojun Shan,et al. Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..
[39] Brian Knutson,et al. Sweet Revenge? , 2004, Science.