Strategic defense and attack for series and parallel reliability systems
暂无分享,去创建一个
[1] J. Neumann,et al. The Theory of Games and Economic Behaviour , 1944 .
[2] K. Hausken. Production and Conflict Models Versus Rent-Seeking Models , 2005 .
[3] Kjell Hausken,et al. THE STABILITY OF ANARCHY AND BREAKDOWN OF PRODUCTION , 2006 .
[4] Gregory Levitin,et al. Optimal separation of elements in vulnerable multi-state systems , 2001, Reliab. Eng. Syst. Saf..
[5] Roman M. Sheremeta,et al. An experimental investigation of Colonel Blotto games , 2009, SSRN Electronic Journal.
[6] Herbert A. Simon,et al. The Sciences of the Artificial , 1970 .
[7] Anindya Ghose,et al. The Economic Incentives for Sharing Security Information , 2004, Inf. Syst. Res..
[8] K. Menninger. On war. , 1973, Bulletin of the Menninger Clinic.
[9] T. Sandler,et al. What do we know about the substitution effect in transnational terrorism , 2003 .
[10] Gregory Levitin,et al. Protection vs. false targets in series systems , 2009, Reliab. Eng. Syst. Saf..
[11] J. Hirshleifer. Anarchy and its Breakdown , 1995, Journal of Political Economy.
[12] Vicki M. Bier,et al. Optimal Allocation of Resources for Defense of Simple Series and Parallel Systems from Determined Adversaries , 2003 .
[13] G. Woo. Quantitative Terrorism Risk Assessment , 2002 .
[14] Gregory Levitin,et al. Survivability maximization for vulnerable multi-state systems with bridge topology , 2000, Reliab. Eng. Syst. Saf..
[15] K. Hausken. Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[16] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[17] H. Kunreuther,et al. Interdependent Security , 2003 .
[18] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[19] Vicki M. Bier,et al. Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..
[20] Kjell Hausken. Defense and attack of complex and dependent systems , 2010, Reliab. Eng. Syst. Saf..
[21] Lawrence A. Gordon,et al. Sharing Information on Computer Systems Security: An Economic Analysis , 2003 .
[22] K. Hausken. Income, interdependence, and substitution effects affecting incentives for security investment , 2006 .
[23] Gregory Levitin,et al. Optimal multilevel protection in series-parallel systems , 2003, Reliab. Eng. Syst. Saf..
[24] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[25] S. Skaperdas. CONFLICT AND ATTITUDES TOWARD RISK , 1990 .
[26] Dan Kovenock,et al. Suicide Terrorism and the Weakest Link , 2009, SSRN Electronic Journal.
[27] Gregory Levitin. Maximizing survivability of acyclic transmission networks with multi-state retransmitters and vulnerable nodes , 2002, Reliab. Eng. Syst. Saf..
[28] Gregory Levitin,et al. Optimizing survivability of vulnerable series-parallel multi-state systems , 2003, Reliab. Eng. Syst. Saf..
[29] Vicki M. Bier,et al. Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .
[30] Gregory Levitin,et al. Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm , 2003, Reliab. Eng. Syst. Saf..
[31] Gregory Levitin. Optimal Defense Strategy Against Intentional Attacks , 2007, IEEE Transactions on Reliability.
[32] I. M. Destler,et al. Protecting the American Homeland , 2003 .
[33] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[34] Gregory Levitin,et al. False targets efficiency in defense strategy , 2009, Eur. J. Oper. Res..
[35] S. Skaperdas. Contest success functions , 1996 .
[36] Eric van Damme,et al. Non-Cooperative Games , 2000 .
[37] Gregory Levitin,et al. Efficiency of even separation of parallel elements with variable contest intensity. , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[38] Gregory Levitin,et al. Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes , 2003, Eur. J. Oper. Res..
[39] Vicki M. Bier,et al. Subsidies in Interdependent Security With Heterogeneous Discount Rates , 2007 .
[40] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[41] Kjell Hausken. Strategic defense and attack for reliability systems , 2008, Reliab. Eng. Syst. Saf..
[42] J. Hirshleifer. Conflict and rent-seeking success functions: Ratio vs. difference models of relative success , 1989 .
[43] V. Bier,et al. Perfect aggregation for a class of general reliability models with Bayesian updating , 1995 .