Name
Affiliation
Papers
KJELL HAUSKEN
Faculty of Social Sciences, University of Stavanger, Norway
68
Collaborators
Citations 
PageRank 
22
537
46.28
Referers 
Referees 
References 
488
276
471
Search Limit
100488
Title
Citations
PageRank
Year
Government Intervention To Combat The Dynamics Of Terrorist Organizations00.342021
Governments Playing Games And Combating The Dynamics Of A Terrorist Organization00.342021
Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits00.342021
The Precautionary Principle As Multi-Period Games Where Players Have Different Thresholds For Acceptable Uncertainty00.342021
Cyber resilience in firms, organizations and societies10.352020
A Two-Period Game Theoretic Model Of Zero-Day Attacks With Stockpiling00.342020
Game Theoretic Analysis of Insurgent Attacks, Government Protection, and International Intervention.00.342020
Governmental combat of the dynamics of multiple competing terrorist organizations00.342019
Principal–Agent Theory, Game Theory, and the Precautionary Principle00.342019
Defence and attack of complex interdependent systems.30.392019
Defense Strategies for Asymmetric Networked Systems with Discrete Components.20.422018
Proactivity And Retroactivity Of Firms And Information Sharing Of Hackers00.342018
Security Investment, Hacking, and Information Sharing between Firms and between Hackers.10.362017
Special versus general protection and attack of parallel and series components.00.342017
Defense and attack for interdependent systems.100.582017
On defense strategies for system of systems using aggregated correlations.00.342017
Information Sharing Among Cyber Hackers In Successive Attacks20.372017
How Elections Are Impacted By Production, Economic Growth And Conflict00.342016
The strategic interaction between a company and the government surrounding disasters30.422016
A game theoretic model of economic crises.00.342015
Returns to information security investment: Endogenizing the expected loss50.382014
Optimal defense with variable number of overarching and individual protections.80.482014
Defending majority voting systems against a strategic attacker.70.512013
Is it wise to leave some false targets unprotected?60.462013
Individual vs. overarching protection for minimizing the expected damage caused by an attack.40.422013
Defence resource distribution between protection and decoys for constant resource stockpiling pace.30.392013
Combined Series and Parallel Systems subject to Individual versus Overarching Defense and Attack.30.392013
The impact of disaster on the strategic interaction between company and government.70.632013
Parallel systems under two sequential attacks with contest intensity variation.00.342013
Defending and attacking a network of two arcs subject to traffic congestion.90.522013
Parallel systems under two sequential attacks with imperfect detection of the first attack outcome.10.352012
On The Impossibility Of Deterrence In Sequential Colonel Blotto Games00.342012
Data survivability vs. security in information systems.90.542012
The timing and deterrence of terrorist attacks due to exogenous dynamics.191.052012
Individual <Emphasis Type="Italic">versus</Emphasis> overarching protection against strategic attacks80.552012
Terrorism Risks, Civil Liberties, And Privacy Concerns00.342012
Active Vs. Passive Defense Against A Strategic Attacker20.452011
Governments' and Terrorists' Defense and Attack in a T-Period Game291.512011
Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures40.552011
Is it wise to protect false targets?20.392011
Preventive strike vs. false targets and protection in defense strategy20.392011
Protecting complex infrastructures against multiple strategic attackers240.932011
Defending against multiple different attackers221.072011
Shield versus sword resource distribution in K-round duels.40.442011
Game Theoretic Analysis Of Two-Period-Dependent Degraded Multistate Reliability Systems00.342011
Active and Passive Defense against Multiple Attack Facilities.30.432011
Defence and attack of systems with variable attacker system structure detection probability40.562010
Separation in homogeneous systems with independent identical elements90.602010
Defense and attack of complex and dependent systems220.892010
Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems30.402010
  • 1
  • 2