Adversarial risk analysis under partial information
暂无分享,去创建一个
[1] Jesus Rios,et al. Adversarial Risk Analysis for Counterterrorism Modeling , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[2] David Ríos Insua,et al. Adversarial Risk Analysis: The Somali Pirates Case , 2012, Decis. Anal..
[3] Ahti Salo,et al. Robust portfolio modeling with incomplete cost information and project interdependencies , 2008, Eur. J. Oper. Res..
[4] Ahti Salo,et al. Scenario-based portfolio selection of investment projects with incomplete probability and utility information , 2012, Eur. J. Oper. Res..
[5] David Banks,et al. Adversarial Risk Analysis , 2015, IWSPA@CODASPY.
[6] Chongmin Kim. Stochastic Dominance, Pareto Optimality, and Equilibrium Asset Pricing , 1994 .
[7] Peter C. Fishburn,et al. Non-cooperative stochastic dominance games , 1978 .
[8] Jr. Louis Anthony Cox,et al. Game Theory and Risk Analysis , 2009 .
[9] Jie Xu,et al. Modeling costly learning and counter-learning in a defender-attacker game with private defender information , 2016, Ann. Oper. Res..
[10] Tilman Börgers,et al. Weak Dominance and Approximate Common Knowledge , 1994 .
[11] Raimo P. Hämäläinen,et al. Behavioural issues in environmental modelling - The missing perspective , 2015, Environmental Modelling & Software.
[12] Andrés Perea,et al. Stochastic dominance equilibria in two-person noncooperative games , 2006, Int. J. Game Theory.
[13] Ahti Salo,et al. Adversarial Risk Analysis for Enhancing Combat Simulation Models , 2015 .
[14] Ralph L Keeney,et al. A Value Model for Evaluating Homeland Security Decisions , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[15] Josef Hadar,et al. Rules for Ordering Uncertain Prospects , 1969 .
[16] Ross D. Shachter,et al. Dynamic programming and influence diagrams , 1990, IEEE Trans. Syst. Man Cybern..
[17] Seth D. Guikema,et al. Robust Adversarial Risk Analysis: A Level-k Approach , 2012, Decis. Anal..
[18] Peter C. Fishburn,et al. Stochastic Dominance and Moments of Distributions , 1980, Math. Oper. Res..
[19] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[20] Casey Rothschild,et al. Adversarial risk analysis with incomplete information: a level-k approach. , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[21] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[22] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[23] Ross D. Shachter. Evaluating Influence Diagrams , 1986, Oper. Res..
[24] H. Levy. Stochastic dominance and expected utility: survey and analysis , 1992 .
[25] Javier Cano,et al. Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach , 2019, Eur. J. Oper. Res..
[26] David Banks,et al. Network routing for insurgency: An adversarial risk analysis framework , 2011 .
[27] Ahti Salo,et al. Cost-efficiency analysis of weapon system portfolios , 2012, Eur. J. Oper. Res..
[28] V. Bawa. OPTIMAL, RULES FOR ORDERING UNCERTAIN PROSPECTS+ , 1975 .
[29] Dimitrios Antos,et al. Representing Bayesian games without a common prior , 2010, AAMAS.
[30] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[31] Stefan Rass,et al. Defending Against Advanced Persistent Threats Using Game-Theory , 2017, PloS one.
[32] Jun Zhuang,et al. European Journal of Operational Research on the Value of Exposure and Secrecy of Defense System: First-mover Advantage vs. Robustness , 2022 .