Government Intervention To Combat The Dynamics Of Terrorist Organizations | 0 | 0.34 | 2021 |
Governments Playing Games And Combating The Dynamics Of A Terrorist Organization | 0 | 0.34 | 2021 |
Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits | 0 | 0.34 | 2021 |
The Precautionary Principle As Multi-Period Games Where Players Have Different Thresholds For Acceptable Uncertainty | 0 | 0.34 | 2021 |
Cyber resilience in firms, organizations and societies | 1 | 0.35 | 2020 |
A Two-Period Game Theoretic Model Of Zero-Day Attacks With Stockpiling | 0 | 0.34 | 2020 |
Game Theoretic Analysis of Insurgent Attacks, Government Protection, and International Intervention. | 0 | 0.34 | 2020 |
Governmental combat of the dynamics of multiple competing terrorist organizations | 0 | 0.34 | 2019 |
Principal–Agent Theory, Game Theory, and the Precautionary Principle | 0 | 0.34 | 2019 |
Defence and attack of complex interdependent systems. | 3 | 0.39 | 2019 |
Defense Strategies for Asymmetric Networked Systems with Discrete Components. | 2 | 0.42 | 2018 |
Proactivity And Retroactivity Of Firms And Information Sharing Of Hackers | 0 | 0.34 | 2018 |
Security Investment, Hacking, and Information Sharing between Firms and between Hackers. | 1 | 0.36 | 2017 |
Special versus general protection and attack of parallel and series components. | 0 | 0.34 | 2017 |
Defense and attack for interdependent systems. | 10 | 0.58 | 2017 |
On defense strategies for system of systems using aggregated correlations. | 0 | 0.34 | 2017 |
Information Sharing Among Cyber Hackers In Successive Attacks | 2 | 0.37 | 2017 |
How Elections Are Impacted By Production, Economic Growth And Conflict | 0 | 0.34 | 2016 |
The strategic interaction between a company and the government surrounding disasters | 3 | 0.42 | 2016 |
A game theoretic model of economic crises. | 0 | 0.34 | 2015 |
Returns to information security investment: Endogenizing the expected loss | 5 | 0.38 | 2014 |
Optimal defense with variable number of overarching and individual protections. | 8 | 0.48 | 2014 |
Defending majority voting systems against a strategic attacker. | 7 | 0.51 | 2013 |
Is it wise to leave some false targets unprotected? | 6 | 0.46 | 2013 |
Individual vs. overarching protection for minimizing the expected damage caused by an attack. | 4 | 0.42 | 2013 |
Defence resource distribution between protection and decoys for constant resource stockpiling pace. | 3 | 0.39 | 2013 |
Combined Series and Parallel Systems subject to Individual versus Overarching Defense and Attack. | 3 | 0.39 | 2013 |
The impact of disaster on the strategic interaction between company and government. | 7 | 0.63 | 2013 |
Parallel systems under two sequential attacks with contest intensity variation. | 0 | 0.34 | 2013 |
Defending and attacking a network of two arcs subject to traffic congestion. | 9 | 0.52 | 2013 |
Parallel systems under two sequential attacks with imperfect detection of the first attack outcome. | 1 | 0.35 | 2012 |
On The Impossibility Of Deterrence In Sequential Colonel Blotto Games | 0 | 0.34 | 2012 |
Data survivability vs. security in information systems. | 9 | 0.54 | 2012 |
The timing and deterrence of terrorist attacks due to exogenous dynamics. | 19 | 1.05 | 2012 |
Individual <Emphasis Type="Italic">versus</Emphasis> overarching protection against strategic attacks | 8 | 0.55 | 2012 |
Terrorism Risks, Civil Liberties, And Privacy Concerns | 0 | 0.34 | 2012 |
Active Vs. Passive Defense Against A Strategic Attacker | 2 | 0.45 | 2011 |
Governments' and Terrorists' Defense and Attack in a T-Period Game | 29 | 1.51 | 2011 |
Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures | 4 | 0.55 | 2011 |
Is it wise to protect false targets? | 2 | 0.39 | 2011 |
Preventive strike vs. false targets and protection in defense strategy | 2 | 0.39 | 2011 |
Protecting complex infrastructures against multiple strategic attackers | 24 | 0.93 | 2011 |
Defending against multiple different attackers | 22 | 1.07 | 2011 |
Shield versus sword resource distribution in K-round duels. | 4 | 0.44 | 2011 |
Game Theoretic Analysis Of Two-Period-Dependent Degraded Multistate Reliability Systems | 0 | 0.34 | 2011 |
Active and Passive Defense against Multiple Attack Facilities. | 3 | 0.43 | 2011 |
Defence and attack of systems with variable attacker system structure detection probability | 4 | 0.56 | 2010 |
Separation in homogeneous systems with independent identical elements | 9 | 0.60 | 2010 |
Defense and attack of complex and dependent systems | 22 | 0.89 | 2010 |
Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems | 3 | 0.40 | 2010 |