Related references
Note: Only part of the references are listed.Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game
Xiaojun Shan et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)
Stochastic shortest path network interdiction with a case study of Arizona-Mexico border
Jing Zhang et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)
Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach
Meilin He et al.
RISK ANALYSIS (2018)
Incorporating risk preferences in stochastic noncooperative games
Victor Richmond R. Jose et al.
IISE TRANSACTIONS (2018)
The role of risk preferences in a multi-target defender-attacker resource allocation game
Jing Zhang et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)
A cost-benefit analysis of terrorist attacks
Kjell Hausken
DEFENCE AND PEACE ECONOMICS (2018)
Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat
Gary A. Ackerman et al.
RISK ANALYSIS (2017)
Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts
Vineet M. Payyappalli et al.
RISK ANALYSIS (2017)
Information Sharing Among Cyber Hackers in Successive Attacks
Kjell Hausken
INTERNATIONAL GAME THEORY REVIEW (2017)
On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness
Mohammad E. Nikoofal et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2015)
Government protection against terrorism and crime
Kjell Hausken et al.
GLOBAL CRIME (2015)
Terrorism and counterterrorism: an overview
Todd Sandler
OXFORD ECONOMIC PAPERS-NEW SERIES (2015)
Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker
Xiaojun Shan et al.
RISK ANALYSIS (2013)
The timing and deterrence of terrorist attacks due to exogenous dynamics
K. Hausken et al.
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2012)
Defending against multiple different attackers
Kjell Hausken et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2011)
Protecting complex infrastructures against multiple strategic attackers
Kjell Hausken
INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE (2011)
Governments' and Terrorists' Defense and Attack in a T-Period Game
Kjell Hausken et al.
DECISION ANALYSIS (2011)
Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility
Chen Wang et al.
DECISION ANALYSIS (2011)
What Do Transnational Terrorists Target? Has It Changed? Are We Safer?
Patrick T. Brandt et al.
JOURNAL OF CONFLICT RESOLUTION (2010)
Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers
Marco Cremonini et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2009)
Optimal resource allocation for defense of targets based on differing measures of attractiveness
Vicki M. Bier et al.
RISK ANALYSIS (2008)
Balancing terrorism and natural disasters - Defensive strategy with endogenous attacker effort
Jun Zhuang et al.
OPERATIONS RESEARCH (2007)