The impacts of adaptive attacking and defending strategies on mitigation of intentional threats
暂无分享,去创建一个
[1] T. G. Lewis,et al. A general defender-attacker risk model for networks , 2008 .
[2] Rae Zimmerman,et al. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[3] Gregory Levitin. Optimal Defense Strategy Against Intentional Attacks , 2007, IEEE Transactions on Reliability.
[4] Chiman Kwan,et al. An Adaptive Markov Game Model for Threat Intent Inference , 2007, 2007 IEEE Aerospace Conference.
[5] Uriel G. Rothblum,et al. Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..
[6] Robert Powell,et al. Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.
[7] S. Skaperdas. Contest success functions , 1996 .
[8] T. Lewis. Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation , 2006 .
[9] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[10] J. Neumann,et al. Theory of games and economic behavior , 1945, 100 Years of Math Milestones.
[11] Gregory Levitin,et al. Minmax defense strategy for complex multi-state systems , 2009, Reliab. Eng. Syst. Saf..
[12] Kjell Hausken. Strategic defense and attack for series and parallel reliability systems , 2008, Eur. J. Oper. Res..
[13] J. Hirshleifer. Conflict and rent-seeking success functions: Ratio vs. difference models of relative success , 1989 .
[14] Gregory Levitin,et al. False targets efficiency in defense strategy , 2009, Eur. J. Oper. Res..
[15] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[16] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[17] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[18] Pattie Maes,et al. Explore/Exploit Strategies in Autonomy , 1996 .
[19] L. Shapley,et al. Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.
[20] G. Woo. Quantitative Terrorism Risk Assessment , 2002 .
[21] Vicki M. Bier,et al. Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..