create a website

Fifty Years of Operations Research in Defense. (2024). Hausken, Kjell.
In: European Journal of Operational Research.
RePEc:eee:ejores:v:318:y:2024:i:2:p:355-368.

Full description at Econpapers || Download paper

Cited: 3

Citations received by this document

Cites: 195

References cited by this document

Cocites: 41

Documents which have cited the same bibliography

Coauthors: 0

Authors who have wrote about the same topic

Citations

Citations received by this document

  1. Preemptive facility interdiction under damage uncertainty. (2025). Farahani, Reza Zanjirani ; Esmaeeli, Hossein ; Seifi, Abbas ; Noorizadegan, Mahdi.
    In: Transportation Research Part E: Logistics and Transportation Review.
    RePEc:eee:transe:v:197:y:2025:i:c:s136655452500122x.

    Full description at Econpapers || Download paper

  2. Attack-defense game modeling framework from a vulnerability perspective to protect critical infrastructure systems. (2025). Wu, Yanfang ; Guo, Peng ; Zio, Enrico ; Wang, Ying.
    In: Reliability Engineering and System Safety.
    RePEc:eee:reensy:v:256:y:2025:i:c:s0951832024008111.

    Full description at Econpapers || Download paper

  3. A Review of Attacker–Defender Games and Cyber Security. (2024). Hausken, Kjell ; Zhuang, Jun ; Welburn, Jonathan W.
    In: Games.
    RePEc:gam:jgames:v:15:y:2024:i:4:p:28-:d:1456012.

    Full description at Econpapers || Download paper

References

References cited by this document

  1. Acemoglu, D. ; Malekian, A. ; Ozdaglar, A. Network security and contagion. 2016 Journal of Economic Theory. 166 536-585

  2. Ackerman, G.A. ; Zhuang, J. ; Weerasuriya, S. Cross-Milieu terrorist collaboration: Using game theory to assess the risk of a novel threat: Cross-Milieu terrorist collaboration. 2017 Risk Analysis. 37 342-371
    Paper not yet in RePEc: Add citation now
  3. Alpcan, T. ; Basar, T. An intrusion detection game with limited observations. 2006 En : 12th Int. Symp. on Dynamic Games and Applications. :
    Paper not yet in RePEc: Add citation now
  4. Ancker, C.J. A proposed foundation for a theory of combat. 1995 Naval Research Logistics. 43 311-343

  5. Arce, D.G. ; Sandler, T. Counterterrorism: A game-theoretic analysis. 2005 Journal of Conflict Resolution. 49 183-200
    Paper not yet in RePEc: Add citation now
  6. Atamtürk, A. ; Deck, C. ; Jeon, H. Successive quadratic upper-bounding for discrete mean-risk minimization and network interdiction. 2019 INFORMS Journal of Computing. 32 346-355
    Paper not yet in RePEc: Add citation now
  7. Azaiez, M.N. ; Bier, V.M. Optimal resource allocation for security in reliability systems. 2007 European Journal of Operational Research. 181 773-786

  8. Azaiez, M.N. ; Bier, V.M. Perfect aggregation for a class of general reliability models with Bayesian updating. 1995 Applied Mathematics and Computation. 73 281-302
    Paper not yet in RePEc: Add citation now
  9. Baliga, S. ; De Mesquita, E.B. ; Wolitzky, A. Deterrence with imperfect attribution. 2020 The American Political Science Review. 114 1155-1178

  10. Bandyopadhyay, T. ; Jacob, V. ; Raghunathan, S. Information security in networked supply chains: Impact of network vulnerability and supply chain integration on incentives to invest. 2010 Information Technology and Management. 11 7-23
    Paper not yet in RePEc: Add citation now
  11. Banks, D. ; Gallego, V. ; Naveiro, R. ; Ríos Insua, D Adversarial risk analysis: An overview. 2022 Wiley Interdisciplinary Reviews. Computational Statistics. 14 e1530-
    Paper not yet in RePEc: Add citation now
  12. Ben Yaghlane, A. ; Azaiez, M.N. System survivability to continuous attacks: A game theoretic setting for constant attack rate processes. 2019 The Journal of the Operational Research Society. 70 1308-1320

  13. Ben Yaghlane, A. ; Azaiez, M.N. Systems under attack-survivability rather than reliability: Concept, results, and applications. 2017 European Journal of Operational Research. 258 1156-1164

  14. Ben Yaghlane, A. ; Azaiez, M.N. ; Mrad, M. System survivability in the context of interdiction networks. 2019 Reliability Engineering & System Safety. 185 362-371

  15. Bier, V. ; Gutfraind, A. Risk analysis beyond vulnerability and resilience - Characterizing the defensibility of critical systems. 2019 European Journal of Operational Research. 276 626-636

  16. Bier, V.M. ; Hausken, K. Defending and attacking a network of two arcs subject to traffic congestion. 2013 Reliability Engineering & System Safety. 112 214-224

  17. Bier, V.M. ; Hausken, K. Endogenizing the sticks and carrots: Modeling possible perverse effects of counterterrorism measures. 2011 Annals of Operations Research. 186 39-59

  18. Bier, V.M. ; Lin, S.W. On the treatment of uncertainty and variability in making decisions about risk. 2013 Risk Analysis. 33 1899-1907

  19. Bier, V.M. ; Nagaraj, A. ; Abhichandani, V. Protection of simple series and parallel systems with components of different values. 2005 Reliability Engineering & System Safety. 87 315-323
    Paper not yet in RePEc: Add citation now
  20. Bier, V.M. ; Oliveros, S. ; Samuelson, L. Choosing what to protect: Strategic defensive allocation against an unknown attacker. 2007 Journal of Public Economic Theory. 9 563-587

  21. Bier, V.M. ; Tas, S. Addressing vulnerability to cascading failure against intelligent adversaries in power networks. 2014 Energy Systems. 7 193-213
    Paper not yet in RePEc: Add citation now
  22. Britannica. (2022). Operations research. https://www.britannica.com/topic/operations-research/History.
    Paper not yet in RePEc: Add citation now
  23. Carter, S. ; Cox, A. September 8). One 9/11 tally: $3.3 trillion. 2011 The New York Times:
    Paper not yet in RePEc: Add citation now
  24. Caulkins, J.P. ; Grass, D. ; Feichtinger, G. ; Tragler, G. Optimizing counter-terror operations: Should one fight fire with "fire" or "water"?. 2008 Computers and Operations Research. 35 1874-1885
    Paper not yet in RePEc: Add citation now
  25. Chen, X. ; Dong, Y. ; Hunt, K. ; Zhuang, J. Counterterrorism resource allocation during a pandemic: The effects of dynamic target valuations when facing a strategic terrorist. 2023 Risk Analysis. 43 1235-1253
    Paper not yet in RePEc: Add citation now
  26. Chen, Z. ; Du, W.-B. ; Cao, X.-B. ; Zhou, X.-L. Cascading failure of interdependent networks with different coupling preference under targeted attack. 2015 Chaos, Solitons & Fractals. 80 7-12
    Paper not yet in RePEc: Add citation now
  27. Chopra, S.S. ; Khanna, V. Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience. 2015 Physica A: Statistical Mechanics and its Applications. 436 865-877

  28. Clarke, R.A. ; Knake, R.K. Cyber war. 2014 Tantor Media, Incorporated:
    Paper not yet in RePEc: Add citation now
  29. Crosston, M.D. World gone cyber mad: How “mutually assured debilitation” is the best hope for cyber deterrence. 2011 Strategic Studies Quarterly. 5 100-116
    Paper not yet in RePEc: Add citation now
  30. Dalio, R. Principles for dealing with the changing world order: why nations succeed or fail. 2021 Simon & Schuster:
    Paper not yet in RePEc: Add citation now
  31. Dighe, N.S. ; Zhuang, J. ; Bier, V.M. Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. 2009 International Journal of Performability Engineering. 5 31-43
    Paper not yet in RePEc: Add citation now
  32. Do, C.T. ; Tran, N.H. ; Hong, C. ; Kamhoua, C.A. ; Kwiat, K.A. ; Blasch, E. ; Ren, S. ; Pissinou, N. ; Iyengar, S.S. Game theory for cyber security and privacy. 2017 ACM Computing Surveys (CSUR). 50 30-
    Paper not yet in RePEc: Add citation now
  33. Dong, Y. ; Chen, X. ; Hunt, K. ; Zhuang, J. Defensive resource allocation: The roles of forecast information and risk control. 2021 Risk Analysis. 41 1304-1322
    Paper not yet in RePEc: Add citation now
  34. Ebeling, C. An introduction to reliability and maintainability engineering. 1997 McGraw-Hill:
    Paper not yet in RePEc: Add citation now
  35. Edwards, B. ; Furnas, A. ; Forrest, S. ; Axelrod, R. Strategic aspects of cyberattack, attribution, and blame. 2017 Proceedings of the National Academy of Sciences. 114 2825-2830
    Paper not yet in RePEc: Add citation now
  36. Enders, W. ; Sandler, T. What do we know about the substitution effect in transnational terrorism?. 2003 En : Silke, A. ; Ilardi, G. Researching terrorism: Trends, achievements, failures. Frank Cass:
    Paper not yet in RePEc: Add citation now
  37. Engel, J.H. A verification of Lanchester's Law. 1954 Operations Research. 2 163-171

  38. Feeney, J.M. ; Goldberg, R. ; Blumenthal, J.A. ; Wallack, M.K. September 11, 2001, revisited - A review of the data [review]. 2005 Archives of Surgery. 140 1068-1073
    Paper not yet in RePEc: Add citation now
  39. Feichtinger, G. ; Novak, A. Terror and counterterror operations: Differential game with cyclical Nash solution. 2008 Journal of Optimization Theory and Applications. 139 541-556

  40. Fiske, B.A. American naval policy. 1905 Proceedings of the US Naval Institute. 113 1-80
    Paper not yet in RePEc: Add citation now
  41. Gal-Or, E. ; Ghose, A. The economic incentives for sharing security information. 2005 Information Systems Research. 16 186-208

  42. Garcia, R.J.B. ; von Winterfeldt, D. Defender-attacker decision tree analysis to combat terrorism. 2016 Risk Analysis. 36 2258-2271

  43. Glaeser, E.L. The political economy of hatred. 2005 Quarterly Journal of Economics. 120 45-86

  44. Gordon, L.A. ; Loeb, M.P. ; Lucyshyn, W. Sharing information on computer systems security: An economic analysis. 2003 Journal of Accounting and Public Policy. 22 461-485

  45. Guikema, S. ; Aven, T. Assessing risk from intelligent attacks: A perspective on approaches. 2010 Reliability Engineering and System Safety. 95 478-483

  46. Gupta, S. ; Starr, M.K. ; Farahani, R.Z. ; Ghodsi, M.M. Prevention of terrorism-an assessment of prior pom work and future potentials. 2020 Production and Operations Management. 29 1789-1815

  47. Gutin, E. ; Kuhn, D. ; Wiesemann, W. Interdiction games on Markovian Pert networks. 2015 Management Science. 61 999-1017

  48. Haphuriwat, N. ; Bier, V.M. Trade-offs between target hardening and overarching protection. 2011 European Journal of Operational Research. 213 320-328

  49. Haphuriwat, N. ; Bier, V.M. ; Willis, H.H. Deterring the smuggling of nuclear weapons in container freight through detection and retaliation. 2011 Decision Analysis. 8 88-102

  50. Harsanyi, J.C. Games with incomplete information played by ‘Bayesian’ Players, I-III. 1967 Management Science. 14 159-183

  51. Hausken, K. A cost-benefit analysis of terrorist attacks. 2018 Defence and Peace Economics. 29 111-129

  52. Hausken, K. A strategic analysis of information sharing among cyber attackers. 2015 Journal of Information Systems and Technology Management. 12 245-270
    Paper not yet in RePEc: Add citation now
  53. Hausken, K. Choosing what to protect when attacker resources and asset valuations are uncertain. 2014 Operations Research and Decisions. 24 23-44

  54. Hausken, K. Combined series and parallel systems subject to individual versus overarching defense and attack. 2013 Asia-Pacific Journal of Operational Research. 30 -

  55. Hausken, K. Cyber resilience in firms, organizations and societies. 2020 Internet of Things. 11 -
    Paper not yet in RePEc: Add citation now
  56. Hausken, K. Defence and attack of complex interdependent systems. 2018 Journal of the Operational Research Society. 1-13
    Paper not yet in RePEc: Add citation now
  57. Hausken, K. Defense and attack for interdependent systems. 2017 European Journal of Operational Research. 256 582-591

  58. Hausken, K. Defense and attack of complex and dependent systems. 2010 Reliability Engineering & System Safety. 95 29-42

  59. Hausken, K. Defense and attack of two-component multi-state systems. 2011 International Journal of Performability Engineering. 7 205-216
    Paper not yet in RePEc: Add citation now
  60. Hausken, K. Ethics and efficiency in organizations. 1996 International Journal of Social Economics. 23 15-40

  61. Hausken, K. Game theoretic analysis of two-period-dependent degraded multistate reliability systems. 2011 International Game Theory Review. 13 247-267

  62. Hausken, K. Governments playing games and combating the dynamics of a terrorist organization. 2020 International Game Theory Review. -
    Paper not yet in RePEc: Add citation now
  63. Hausken, K. Income, interdependence, and substitution effects affecting incentives for security investment. 2006 Journal of Accounting and Public Policy. 25 629-665

  64. Hausken, K. Individual versus overarching protection and attack of assets. 2014 Central European Journal of Operations Research. 22 89-112

  65. Hausken, K. Information sharing among cyber hackers in successive attacks. 2017 International Game Theory Review. 19 -

  66. Hausken, K. Information sharing among firms and cyber attacks. 2007 Journal of Accounting and Public Policy. 26 639-688

  67. Hausken, K. On the impossibility of deterrence in sequential Colonel Blotto games. 2012 International Game Theory Review. 14 1-13

  68. Hausken, K. Proactivity and retroactivity of firms and information sharing of hackers. 2018 International Game Theory Review. 20 -

  69. Hausken, K. Probabilistic risk analysis and game theory. 2002 Risk Analysis. 22 17-27

  70. Hausken, K. Protecting complex infrastructures against multiple strategic attackers. 2011 International Journal of Systems Science. 42 11-29

  71. Hausken, K. Security investment, hacking, and information sharing between firms and between hackers. 2017 Games. 8 -

  72. Hausken, K. Special versus general protection and attack of parallel and series components. 2017 Reliability Engineering and System Safety. 165 239-256

  73. Hausken, K. Special versus general protection and attack of two assets. 2019 Operations Research and Decisions. 29 53-93

  74. Hausken, K. Strategic defense and attack for series and parallel reliability systems [article]. 2008 European Journal of Operational Research. 186 856-881

  75. Hausken, K. Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints. 2023 SN Business & Economics. 3 192-

  76. Hausken, K. Whether to attack a terrorist's resource stock today or tomorrow. 2008 Games and Economic Behavior. 64 548-564

  77. Hausken, K. ; Bier, V.M. Defending against multiple different attackers [article]. 2011 European Journal of Operational Research. 211 370-384

  78. Hausken, K. ; Bier, V.M. ; Zhuang, J Defending against terrorism, natural disaster, and all hazards. 2009 En : Bier, V.M. ; Azaiez, M.N. Game theoretic risk analysis of security threats (Vol. 128. Springer US:

  79. Hausken, K. ; He, F. On the effectiveness of security countermeasures for critical infrastructures. 2016 Risk Analysis. -

  80. Hausken, K. ; Levitin, G. Efficiency of even separation of parallel elements with variable contest intensity [article]. 2008 Risk Analysis. 28 1477-1486

  81. Hausken, K. ; Levitin, G. Minmax defense strategy for complex multi-state systems. 2009 Reliability Engineering & System Safety. 94 577-587

  82. Hausken, K. ; Levitin, G. Review of systems defense and attack models. 2012 International Journal of Performability Engineering. 8 355-366
    Paper not yet in RePEc: Add citation now
  83. Hausken, K. ; Levitin, G. Shield versus sword resource distribution in K-round duels. 2011 Central European Journal of Operations Research. 19 589-603

  84. Hausken, K. ; Moxnes, J.F. Approximations and empirics for stochastic war equations. 2005 Naval Research Logistics. 52 682-700

  85. Hausken, K. ; Moxnes, J.F. Stochastic conditional and unconditional warfare [article]. 2002 European Journal of Operational Research. 140 61-87

  86. Hausken, K. ; Welburn, J.W. Attack and defense strategies in cyber war involving production and stockpiling of zero-day cyber exploits. 2021 Information Systems Frontiers. 23 1609-1620

  87. Hausken, K. ; Zhuang, J. Defending against a stockpiling terrorist. 2011 The Engineering Economist. 56 321-353

  88. Hausken, K. ; Zhuang, J. Defending against a terrorist who accumulates resources. 2011 Military Operations Research. 16 21-39
    Paper not yet in RePEc: Add citation now
  89. Hausken, K. ; Zhuang, J. Governments' and terrorists' defense and attack in a T-period game. 2011 Decision Analysis. 8 46-70

  90. Hausken, K. ; Zhuang, J. The timing and deterrence of terrorist attacks due to exogenous dynamics [article]. 2012 Journal of the Operational Research Society. 63 726-735

  91. He, F. ; Zhuang, J. Modelling 'contracts' between a terrorist group and a government in a sequential game [article]. 2012 Journal of the Operational Research Society. 63 790-809

  92. He, M. ; Devine, L. ; Zhuang, J. Perspectives on cybersecurity information sharing among multiple stakeholders using a decision theoretic approach. 2018 Risk Analysis. 38 215-225
    Paper not yet in RePEc: Add citation now
  93. Hirshleifer, J. From weakest-link to best-shot: The voluntary provision of public goods. 1983 Public Choice. 41 371-386

  94. Hunt, K. ; Zhuang, J. A review of attacker-defender games: Current state and paths forward. 2023 European Journal of Operational Research. -
    Paper not yet in RePEc: Add citation now
  95. Jalilpoor, K. ; Oshnoei, A. ; Mohammadi-Ivatloo, B. ; Anvari-Moghaddam, A. Network hardening and optimal placement of microgrids to improve transmission system resilience: A two-stage linear program. 2022 Reliability Engineering & System Safety. 224 -

  96. Jasper, S. Deterring malicious behavior in cyberspace. 2015 Strategic Studies Quarterly. 9 60-85
    Paper not yet in RePEc: Add citation now
  97. Jensen, E.T. Cyber deterrence. 2012 Emory Int'l L. Rev.. 26 773-
    Paper not yet in RePEc: Add citation now
  98. Johansson, J. ; Hassel, H. An approach for modelling interdependent infrastructures in the context of vulnerability analysis. 2010 Reliability Engineering & System Safety. 95 1335-1344

  99. Kalloniatis, A.C. ; Hoek, K. ; Zuparic, M. ; Brede, M. Optimising structure in a networked Lanchester model for fires and Manoeuvre in warfare. 2021 The Journal of the Operational Research Society. 72 1863-1878

  100. Kohli, I.S. ; Haslam, M.C. An Analysis of the replicator dynamics for an asymmetric Hawk-Dove game. 2017 International Journal of Differential Equations. -

  101. Konak, A. ; Kulturel-Konak, S. ; Snyder, L.V. A game-theoretic genetic algorithm for the reliable server assignment problem under attacks. 2015 Computers & Industrial Engineering. 85 73-85
    Paper not yet in RePEc: Add citation now
  102. Kosanoglu, F. ; Bier, V.M. Target-oriented utility for interdiction of transportation networks. 2020 Reliability Engineering & System Safety. 197 -

  103. Kovenock, D. ; Roberson, B. The optimal defense of networks of targets. 2018 Economic Inquiry. 56 2195-2211

  104. Kress, M. Lanchester models for irregular warfare. 2020 Mathematics. 8 737-

  105. Kress, M. ; Caulkins, J.P. ; Feichtinger, G. ; Grass, D. ; Seidl, A. Lanchester model for three-way combat. 2018 European Journal of Operational Research. 264 46-54

  106. Kunreuther, H. ; Heal, G. Interdependent security. 2003 Journal of Risk and Uncertainty. 26 231-249

  107. Lanchester, F.W. Aircraft in warfare: The dawn of the fourth arm. 1916 Tiptree Constable and Co. Ltd.: London
    Paper not yet in RePEc: Add citation now
  108. Leffingwell, J.W.R. The laws of combat? Lanchester reexamined. 1987 International Security. 12 89-134
    Paper not yet in RePEc: Add citation now
  109. Levitin, G Optimizing defense strategies for complex multi-state systems. 2009 En : Bier, V.M ; Azaiez, M.N Game theoretic risk analysis of security threats. Springer:

  110. Levitin, G. Optimal defense strategy against intentional attacks. 2007 IEEE Transactions on Reliability. 56 148-157
    Paper not yet in RePEc: Add citation now
  111. Levitin, G. ; Hausken, K. Defense resource distribution between protection and redundancy for constant resource stockpiling pace. 2011 Risk Analysis. 31 1632-1645

  112. Levitin, G. ; Hausken, K. False targets efficiency in defense strategy. 2009 European Journal of Operational Research. 194 155-162

  113. Levitin, G. ; Hausken, K. Individual versus overarching protection against strategic attacks. 2012 Journal of the Operational Research Society. 63 969-981

  114. Levitin, G. ; Hausken, K. K-round duel with uneven resource distribution. 2012 International Journal of Performability Engineering. 8 19-34
    Paper not yet in RePEc: Add citation now
  115. Levitin, G. ; Hausken, K. Preventive strike vs. false targets and protection in defense strategy. 2011 Reliability Engineering & System Safety. 96 912-924

  116. Levitin, G. ; Hausken, K. Preventive strike vs. false targets in defense strategy. 2012 International Journal of Performability Engineering. 8 341-354
    Paper not yet in RePEc: Add citation now
  117. Levitin, G. ; Hausken, K. Preventive strike vs. protection in defense strategy. 2010 Military Operations Research. 15 5-15
    Paper not yet in RePEc: Add citation now
  118. Levitin, G. ; Hausken, K. Protection vs. redundancy in homogeneous parallel systems. 2008 Reliability Engineering & System Safety. 93 1444-1451

  119. Levitin, G. ; Hausken, K. Separation in homogeneous systems with independent identical elements. 2010 European Journal of Operational Research. 203 625-634

  120. Levitin, G. ; Hausken, K. ; Ben Haim, H. Active and passive defense against multiple attack facilities. 2011 Asia-Pacific Journal of Operational Research. 28 431-444

  121. Levitin, G. ; Hausken, K. ; Dai, Y. Individual vs. overarching protection for minimizing the expected damage caused by an attack. 2013 Reliability Engineering & System Safety. 119 117-125

  122. Levitin, G. ; Hausken, K. ; Dai, Y. Optimal defense with variable number of overarching and individual protections. 2014 Reliability Engineering & System Safety. 123 81-90

  123. Levitin, G. ; Hausken, K. ; Taboada, H.A. ; Coit, D.W. Data survivability vs. security in information systems. 2012 Reliability Engineering & System Safety. 100 19-27

  124. Li, R.-q. ; Sun, S.-w. ; Ma, Y.-l. ; Wang, L. ; Xia, C.-y Effect of clustering on attack vulnerability of interdependent scale-free networks. 2015 Chaos Solitons & Fractals. 80 109-116
    Paper not yet in RePEc: Add citation now
  125. Li, Y. ; Xu, L. Cybersecurity investments in a two-Echelon supply chain with third-party risk propagation. 2020 International Journal of Production Research. 1-23
    Paper not yet in RePEc: Add citation now
  126. Libicki, M.C. Cyberdeterrence and cyberwar. 2009 Rand Corporation:
    Paper not yet in RePEc: Add citation now
  127. Lisnianski, A. ; Levitin, G. Multi-state system reliability: Assessment, optimization and applications (Vol. vol. 6). 2003 World Scientific:
    Paper not yet in RePEc: Add citation now
  128. Liu, P.L. ; Sun, H.K. ; You, Y.T. Some comments on Mackay's Lanchester mixed forces model. 2012 The Journal of the Operational Research Society. 63 -

  129. Lotka, A.J. Elements of mathematical biology. 1924 Dover Books:
    Paper not yet in RePEc: Add citation now
  130. MacKay, N.J. Lanchester models for mixed forces with semi-dynamical target allocation. 2009 The Journal of the Operational Research Society. 60 1421-1427

  131. MacKay, N.J. Response to 'some comments on Mackay's Lanchester mixed forces model. 2012 The Journal of the Operational Research Society. 63 -

  132. McCloskey, J.F. United-States operations-research in World-War-II. 1987 Operations Research. 35 910-925
    Paper not yet in RePEc: Add citation now
  133. Morse, P.M. ; Kimball, G.E. Methods of operations research. 1951 MIT Press:
    Paper not yet in RePEc: Add citation now
  134. Mrad, M. ; Suryahatmaja, U.S. ; Ben Yaghlane, A. ; Azaiez, M.N. Attack strategies on networks with a budget constraint. 2021 IEEE Access. 9 100530-100547
    Paper not yet in RePEc: Add citation now
  135. Mrad, M. ; Suryahatmaja, U.S. ; Yaghlane, A.B. ; Azaiez, M.N. Optimal K cut-sets in attack/defense strategies on networks. 2020 IEEE Access. 8 -
    Paper not yet in RePEc: Add citation now
  136. Nagurney, A. ; Nagurney, L.S. ; Shukla, S A supply chain game theory framework for cybersecurity investments under network vulnerability. 2015 En : Daras, N.J ; Rassias, M.T Computation, cryptography, and network security. Springer International Publishing:
    Paper not yet in RePEc: Add citation now
  137. Nagurney, A. ; Shukla, S. Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability. 2017 European Journal of Operational Research. 260 588-600

  138. Nezamoddini, N. ; Mousavian, S. ; Erol-Kantarci, M. A risk optimization model for enhanced power grid resilience against physical attacks. 2017 Electric Power Systems Research. 143 329-338
    Paper not yet in RePEc: Add citation now
  139. Nikoofal, M.E. ; Zhuang, J. On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness. 2015 European Journal of Operational Research. 246 320-330

  140. Nye, J.S. Nuclear lessons for cyber security?. 2011 Strategic Studies Quarterly. 5 18-38

  141. Ouyang, M. Review on modeling and simulation of interdependent critical infrastructure systems. 2014 Reliability Engineering & System Safety. 121 43-60

  142. Pala, A. ; Zhuang, J. Information sharing in cybersecurity: A review. 2019 Decision Analysis. 16 172-196

  143. Parkhideh, S. ; Gafarian, A.V. General solution to many-on-many heterogeneous stochastic combat. 1996 Naval Research Logistics. 43 937-953
    Paper not yet in RePEc: Add citation now
  144. Peng, R. ; Guo, L. ; Levitin, G. ; Mo, H. ; Wang, W. Maintenance versus individual and overarching protections for parallel systems. 2014 Quality Technology and Quantitative Management. 11 353-362
    Paper not yet in RePEc: Add citation now
  145. Peng, R. ; Zhai, Q.Q. ; Levitin, G. Defending a single object against an attacker trying to detect a subset of false targets. 2016 Reliability Engineering and System Safety. 149 137-147

  146. Powell, R. Sequential, Nonzero-Sum "Blotto": Allocating defensive resources prior to attack. 2009 Games and Economic Behavior. 67 611-615

  147. Ramirez-Marquez, J.E. ; Coit, D.W. A Monte-Carlo simulation approach for approximating multi-state two-terminal reliability. 2005 Reliability Engineering & System Safety. 87 253-264
    Paper not yet in RePEc: Add citation now
  148. Rios Insua, D. ; Rios, J. ; Banks, D. Adversarial risk analysis. 2009 Journal of the American Statistical Association. 104 841-854

  149. Rios Insua, D. ; Rios, J. ; Banks, D. Modeling opponents in adversarial risk analysis. 2016 Risk Analysis. 36 742-755

  150. Roponen, J. ; Ríos Insua, D. ; Salo, A. Adversarial risk analysis under partial information. 2020 European Journal of Operational Research. 287 306-316

  151. Rothschild, C. ; McLay, L. ; Guikema, S. Adversarial risk analysis with incomplete information: A level-K approach. 2012 Risk Analysis. 32 1219-1231

  152. Roy, S. ; Ellis, C. ; Shiva, S. ; Dasgupta, D. ; Shandilya, V. ; Wu, Q. A survey of game theory as applied to network security. 2010 En : System Sciences (HICSS), 2010 43rd Hawaii International Conference on. :
    Paper not yet in RePEc: Add citation now
  153. Sandler, T. ; Arce, D.G. Terrorism & game theory. 2003 Simulation & Gaming. 34 319-337
    Paper not yet in RePEc: Add citation now
  154. Sandler, T. ; Arce, D.G. ; Enders, W. An evaluation of Interpol's cooperative-based counterterrorism linkages [article]. 2011 Journal of Law & Economics. 54 79-110

  155. Sandler, T. ; Arce, D.G. ; Enders, W. Transnational terrorism. 2009 En : Lomborg, B. Global crises, global solutions. :
    Paper not yet in RePEc: Add citation now
  156. Sandler, T. ; Siqueira, K. Games and terrorism: Recent developments. 2009 Simulation & Gaming. 40 164-192
    Paper not yet in RePEc: Add citation now
  157. Shan, X. ; Zhuang, J. Cost of equity in homeland security resource allocation in the face of a strategic attacker. 2013 Risk Analysis. 33 1083-1099

  158. Shan, X. ; Zhuang, J. Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–Attacker game. 2013 European Journal of Operational Research. 228 262-272

  159. Shan, X. ; Zhuang, J. Modeling credible retaliation threats in deterring the smuggling of nuclear weapons using partial inspection-a three-stage game [article]. 2014 Decision Analysis. 11 43-62

  160. Shan, X. ; Zhuang, J. Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game. 2018 Reliability Engineering and System Safety. 179 12-26

  161. Shan, X. ; Zhuang, J. Subsidizing to disrupt a terrorism supply chain—A four-player game. 2014 Journal of the Operational Research Society. 65 1108-1119

  162. Shan, X.G. ; Zhuang, J. A game-theoretic approach to modeling attacks and defenses of smart grids at three levels. 2020 Reliability Engineering & System Safety. 195 -

  163. Simon, H.A. A behavioral model of rational choice. 1955 The Quarterly Journal of Economics. 69 99-118

  164. Simon, H.A. The sciences of the artificial. 1969 MIT Press:
    Paper not yet in RePEc: Add citation now
  165. Simon, J. ; Omar, A. Cybersecurity investments in the supply chain: Coordination and a strategic attacker. 2020 European Journal of Operational Research. 282 161-171

  166. Smith, J.C. ; Song, Y. A survey of network interdiction models and algorithms. 2020 European Journal of Operational Research. 283 797-811

  167. Stockfish, J. Models, data, and war: A critique of the study of conventional forces, R-1526-Pr. 1975 The rand corporation: Santa Monica, California
    Paper not yet in RePEc: Add citation now
  168. Taylor, J.G. Lanchester models of warfare, vols. 1 and 2. operations research society of America, military applications section. 1983 :
    Paper not yet in RePEc: Add citation now
  169. Universal Teacher Brief history of operations research. 2022 :
    Paper not yet in RePEc: Add citation now
  170. Ventisel, Y.S. Introduction to operations research. 1964 Soviet Radio Publishing House: Moscow
    Paper not yet in RePEc: Add citation now
  171. Von Neumann, J. Theory of games and economic behavior. 1944 Princeton University Press:
    Paper not yet in RePEc: Add citation now
  172. Von Neumann, J. Zur Theorie Der Gesellschaftsspiele. 1928 Mathematische Annalen. 100 295-320
    Paper not yet in RePEc: Add citation now
  173. Wang, C. ; Bier, V.M. Quantifying adversary capabilities to inform defensive resource allocation. 2016 Risk Analysis. 36 756-775

  174. Wang, C. ; Bier, V.M. Target-hardening decisions based on uncertain multiattribute terrorist utility. 2011 Decision Analysis. 8 286-302

  175. Wang, G. ; Welburn, J.W. ; Hausken, K. A two-period game theoretic model of zero-day attacks with stockpiling. 2020 Games. 11 64-

  176. Wang, J. ; Wu, Y. ; Li, Y. Attack robustness of cascading load model in interdependent networks. 2015 International Journal of Modern Physics C. 26 -

  177. Wang, L. ; Ren, S. ; Yue, K. ; Kwiat, K. Optimal resource allocation for protecting system availability against random cyber attacks (Vol. 1). 2011 :
    Paper not yet in RePEc: Add citation now
  178. Wang, S. ; Hong, L. ; Chen, X. Vulnerability analysis of interdependent infrastructure systems: A methodological framework. 2012 Physica A: Statistical Mechanics and its Applications. 391 3323-3335

  179. Wang, S. ; Hong, L. ; Ouyang, M. ; Zhang, J. ; Chen, X. Vulnerability analysis of interdependent infrastructure systems under edge attack strategies. 2013 Safety Science. 51 328-337
    Paper not yet in RePEc: Add citation now
  180. Wei, N. ; Walteros, J.L. Integer programming methods for solving binary interdiction games. 2022 European Journal of Operational Research. 302 456-469

  181. Wei, N. ; Walteros, J.L. ; Pajouh, F.M. Integer programming formulations for minimum spanning tree interdiction. 2021 IINFORMS Journal on Computing. 33 1461-1480

  182. Weiss, H.K. Combat models and historical data: The U.S. civil war. 1966 Operations Research. 14 759-790

  183. Welburn, J. ; Grana, J. ; Schwindt, K. Cyber deterrence with imperfect attribution and unverifiable signaling. 2023 European Journal of Operational Research. 306 1399-1416

  184. Wrigge, S. ; Fransén, A. ; Wigg, L. The Lanchester theory of combat and some related subjects. A bibliography 1900-1993. 1995 National Defence Research Establishment: Stockholm, Sweden
    Paper not yet in RePEc: Add citation now
  185. Wu, B. ; Tang, A. ; Wu, J. Modeling cascading failures in interdependent infrastructures under terrorist attacks. 2016 Reliability Engineering & System Safety. 147 1-8

  186. Xu, Z. ; Zhuang, J. A study on a sequential one-defender-N-attacker game. 2019 Risk Analysis. 39 1414-1432
    Paper not yet in RePEc: Add citation now
  187. Zhang, J. ; Wang, Y. ; Zhuang, J. Modeling multi-target defender-attacker games with quantal response attack strategies. 2021 Reliability Engineering & System Safety. 205 -

  188. Zhang, P. ; Cheng, B. ; Zhao, Z. ; Li, D. ; Lu, G. ; Wang, Y. ; Xiao, J. The robustness of interdependent transportation networks under targeted attack. 2013 EPL. 103-
    Paper not yet in RePEc: Add citation now
  189. Zhuang, J. Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-player game with errors. 2010 The Engineering Economist. 55 131-149
    Paper not yet in RePEc: Add citation now
  190. Zhuang, J. ; Bier, V.M. Balancing terrorism and natural disasters: Defensive strategy with endogenous attacker effort. 2007 Operations Research. 55 976-991

  191. Zhuang, J. ; Bier, V.M. Reasons for secrecy and deception in homeland-security resource allocation. 2010 Risk Analysis. 30 1737-1743
    Paper not yet in RePEc: Add citation now
  192. Zhuang, J. ; Bier, V.M. Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation. 2011 Defence and Peace Economics. 22 43-61

  193. Zhuang, J. ; Bier, V.M. ; Alagoz, O. Modeling secrecy and deception in a multiple-period attacker-defender signaling game. 2010 European Journal of Operational Research. 203 409-418

  194. Zhuang, J. ; Bier, V.M. ; Gupta, A. Subsidies in interdependent security with heterogeneous discount rates. 2007 Engineering Economist. 52 1-19
    Paper not yet in RePEc: Add citation now
  195. Zio, E. ; Podofillini, L. Monte Carlo simulation analysis of the effects of different system performance levels on the importance of multi-state components. 2003 Reliability Engineering & System Safety. 82 63-73
    Paper not yet in RePEc: Add citation now

Cocites

Documents in RePEc which have cited the same bibliography

  1. The finance of cybersecurity: Quantitative modeling of investment decisions and net present value. (2025). Jazairy, Amer ; Glassburner, Aaron V ; Brho, Mazen.
    In: International Journal of Production Economics.
    RePEc:eee:proeco:v:279:y:2025:i:c:s0925527324003050.

    Full description at Econpapers || Download paper

  2. Influence and Counter-Influence in Networks. (2024). Bravard, Christophe ; Sarangi, Sudipta ; Durieu, Jacques ; Touati, Corinne.
    In: Post-Print.
    RePEc:hal:journl:hal-04733885.

    Full description at Econpapers || Download paper

  3. A Review of Attacker–Defender Games and Cyber Security. (2024). Hausken, Kjell ; Zhuang, Jun ; Welburn, Jonathan W.
    In: Games.
    RePEc:gam:jgames:v:15:y:2024:i:4:p:28-:d:1456012.

    Full description at Econpapers || Download paper

  4. Kantian imperatives in public goods networks. (2024). Mohanty, Sambit ; Mallikarjuna, K S ; Roy, Jaideep.
    In: Journal of Economic Behavior & Organization.
    RePEc:eee:jeborg:v:224:y:2024:i:c:p:194-214.

    Full description at Econpapers || Download paper

  5. Fifty Years of Operations Research in Defense. (2024). Hausken, Kjell.
    In: European Journal of Operational Research.
    RePEc:eee:ejores:v:318:y:2024:i:2:p:355-368.

    Full description at Econpapers || Download paper

  6. Optimal Age-based Policies for Pandemics: An Economic Analysis of Covid-19 and Beyond. (2024). Tertilt, Michele ; Santos, Cezar ; Kircher, Philipp ; Brotherhood, Luiz.
    In: LIDAM Discussion Papers CORE.
    RePEc:cor:louvco:2024012.

    Full description at Econpapers || Download paper

  7. Contagion risks and security investment in directed networks. (2023). Amini, Hamed.
    In: Mathematics and Financial Economics.
    RePEc:spr:mathfi:v:17:y:2023:i:2:d:10.1007_s11579-023-00336-w.

    Full description at Econpapers || Download paper

  8. Optimal Age-based Policies for Pandemics: An Economic Analysis of Covid-19 and Beyond. (2023). Kircher, Philipp ; Tertilt, Michele ; Brotherhood, Luiz ; Santos, Cezar.
    In: IDB Publications (Working Papers).
    RePEc:idb:brikps:13295.

    Full description at Econpapers || Download paper

  9. Virus dynamics with behavioral responses. (2023). Dasaratha, Krishna.
    In: Journal of Economic Theory.
    RePEc:eee:jetheo:v:214:y:2023:i:c:s0022053123001357.

    Full description at Econpapers || Download paper

  10. Global systemic risk dynamic network connectedness during the COVID-19: Evidence from nonlinear Granger causality. (2023). Sha, Yezhou ; Yin, Shiqi ; Zhang, Ping.
    In: Journal of International Financial Markets, Institutions and Money.
    RePEc:eee:intfin:v:85:y:2023:i:c:s1042443123000513.

    Full description at Econpapers || Download paper

  11. Cybercrime on the Ethereum Blockchain. (2023). Yuan, YE ; Nam, Rachel J ; Momtaz, Paul P ; Hornuf, Lars.
    In: CESifo Working Paper Series.
    RePEc:ces:ceswps:_10598.

    Full description at Econpapers || Download paper

  12. Cooperative security against interdependent risks. (2023). Sankaranarayanan, Sriram ; Gopalakrishnan, Sanjith.
    In: Production and Operations Management.
    RePEc:bla:popmgt:v:32:y:2023:i:11:p:3504-3520.

    Full description at Econpapers || Download paper

  13. Contingent Convertible Bonds in Financial Networks. (2023). Calice, Giovanni ; Tantari, Daniele ; Sala, Carlo.
    In: Papers.
    RePEc:arx:papers:2009.00062.

    Full description at Econpapers || Download paper

  14. Epidemic Spreading and Equilibrium Social Distancing in Heterogeneous Networks. (2022). Amini, Hamed ; Minca, Andreea.
    In: Dynamic Games and Applications.
    RePEc:spr:dyngam:v:12:y:2022:i:1:d:10.1007_s13235-021-00411-1.

    Full description at Econpapers || Download paper

  15. Network defense and behavioral biases: an experimental study. (2022). Cason, Timothy ; Sundaram, Shreyas ; Bagchi, Saurabh ; Abdallah, Mustafa ; Woods, Daniel.
    In: Experimental Economics.
    RePEc:kap:expeco:v:25:y:2022:i:1:d:10.1007_s10683-021-09714-x.

    Full description at Econpapers || Download paper

  16. Dangerous games: A literature review on cybersecurity investments. (2022). Fedele, Alessandro ; Roner, Cristian.
    In: Journal of Economic Surveys.
    RePEc:bla:jecsur:v:36:y:2022:i:1:p:157-187.

    Full description at Econpapers || Download paper

  17. Cyber Risk and Security Investment. (2022). Cimon, David ; Ahnert, Toni ; Riordan, Ryan ; Brolley, Michael.
    In: Staff Working Papers.
    RePEc:bca:bocawp:22-32.

    Full description at Econpapers || Download paper

  18. Aggregation in Networks. (2021). Allouch, Nizar.
    In: Studies in Economics.
    RePEc:ukc:ukcedp:2109.

    Full description at Econpapers || Download paper

  19. Network Defense and Behavior Biases: An Experimental Study. (2021). Cason, Timothy ; Sundaram, Shreyas ; Bagechi, Saurabh ; Abdallah, Mustafa ; Woods, Daniel.
    In: Purdue University Economics Working Papers.
    RePEc:pur:prukra:1328.

    Full description at Econpapers || Download paper

  20. Welfare targeting in networks. (2021). King, Maia ; Allouch, Nizar.
    In: Journal of Mathematical Economics.
    RePEc:eee:mateco:v:96:y:2021:i:c:s0304406821000586.

    Full description at Econpapers || Download paper

  21. Ransomware activity and blockchain congestion. (2021). Sokolov, Konstantin.
    In: Journal of Financial Economics.
    RePEc:eee:jfinec:v:141:y:2021:i:2:p:771-782.

    Full description at Econpapers || Download paper

  22. Social distance, speed of containment and crowding in/out in a network model of contagion. (2021). Ladley, Daniel ; Adriani, Fabrizio.
    In: Journal of Economic Behavior & Organization.
    RePEc:eee:jeborg:v:190:y:2021:i:c:p:597-625.

    Full description at Econpapers || Download paper

  23. Attacker–defender model against quantal response adversaries for cyber security in logistics management: An introductory study. (2021). , Michael ; Cheung, Kam-Fung.
    In: European Journal of Operational Research.
    RePEc:eee:ejores:v:291:y:2021:i:2:p:471-481.

    Full description at Econpapers || Download paper

  24. EXTERNALITIES AGGREGATION IN NETWORK GAMES. (2020). Pin, Paolo ; Feri, Francesco.
    In: International Economic Review.
    RePEc:wly:iecrev:v:61:y:2020:i:4:p:1635-1658.

    Full description at Econpapers || Download paper

  25. Welfare targeting in networks. (2020). King, Maia ; Allouch, Nizar.
    In: SocArXiv.
    RePEc:osf:socarx:74mur.

    Full description at Econpapers || Download paper

  26. Social distance, speed of containment, and crowding in/out in a network model of contagion. (2020). Adriani, Fabrizio.
    In: Discussion Papers.
    RePEc:not:notcdx:2020-10.

    Full description at Econpapers || Download paper

  27. Testing, Voluntary Social Distancing and the Spread of an Infection. (2020). Acemoglu, Daron ; Malekian, Azarakhsh ; Ozdaglar, Asuman ; Makhdoumi, Ali.
    In: NBER Working Papers.
    RePEc:nbr:nberwo:27483.

    Full description at Econpapers || Download paper

  28. Dangerous Games: A Literature Review on Cybersecurity Investments. (2020). Fedele, Alessandro ; Roner, Cristian.
    In: BEMPS - Bozen Economics & Management Paper Series.
    RePEc:bzn:wpaper:bemps75.

    Full description at Econpapers || Download paper

  29. Measuring the Input Rank in Global Supply Networks. (2020). Rungi, Armando ; Fattorini, Loredana ; Huremovic, Kenan.
    In: Papers.
    RePEc:arx:papers:2001.08003.

    Full description at Econpapers || Download paper

  30. Securing Infrastructure Facilities: When Does Proactive Defense Help?. (2019). Amin, Saurabh ; Wu, Manxi.
    In: Dynamic Games and Applications.
    RePEc:spr:dyngam:v:9:y:2019:i:4:d:10.1007_s13235-018-0280-8.

    Full description at Econpapers || Download paper

  31. Constrained public goods in networks. (2018). King, Maia ; Allouch, Nizar.
    In: Studies in Economics.
    RePEc:ukc:ukcedp:1806.

    Full description at Econpapers || Download paper

  32. The Onset, Spread, and Prevention of Mass Atrocities: Perspectives from Network Models. (2018). Brauer, Jurgen ; Anderton, Charles.
    In: HiCN Working Papers.
    RePEc:hic:wpaper:284.

    Full description at Econpapers || Download paper

  33. The Onset, Spread, and Prevention of Mass Atrocities:Perspectives from Network Models. (2018). Brauer, Jurgen ; Anderton, Charles.
    In: Working Papers.
    RePEc:hcx:wpaper:1810.

    Full description at Econpapers || Download paper

  34. Targeting the key player: An incentive-based approach. (2018). Deroïan, Frédéric ; Belhaj, Mohamed ; Deroian, Frederic.
    In: Journal of Mathematical Economics.
    RePEc:eee:mateco:v:79:y:2018:i:c:p:57-64.

    Full description at Econpapers || Download paper

  35. THE OPTIMAL DEFENSE OF NETWORKS OF TARGETS. (2018). Kovenock, Dan ; Roberson, Brian.
    In: Economic Inquiry.
    RePEc:bla:ecinqu:v:56:y:2018:i:4:p:2195-2211.

    Full description at Econpapers || Download paper

  36. Aggregation in Networks. (2017). Allouch, Nizar.
    In: Studies in Economics.
    RePEc:ukc:ukcedp:1718.

    Full description at Econpapers || Download paper

  37. Individual security, contagion, and network design. (2017). Goyal, Sanjeev ; Cerdeiro, Diego ; Dziubiski, Marcin.
    In: Journal of Economic Theory.
    RePEc:eee:jetheo:v:170:y:2017:i:c:p:182-226.

    Full description at Econpapers || Download paper

  38. The cost of segregation in (social) networks. (2017). Allouch, Nizar.
    In: Games and Economic Behavior.
    RePEc:eee:gamebe:v:106:y:2017:i:c:p:329-342.

    Full description at Econpapers || Download paper

  39. Privacy-constrained network formation. (2017). Acemoglu, Daron ; Malekian, Azarakhsh ; Ozdaglar, Asuman ; Makhdoumi, Ali.
    In: Games and Economic Behavior.
    RePEc:eee:gamebe:v:105:y:2017:i:c:p:255-275.

    Full description at Econpapers || Download paper

  40. Contagion exposure and protection technology. (2017). Cerdeiro, Diego.
    In: Games and Economic Behavior.
    RePEc:eee:gamebe:v:105:y:2017:i:c:p:230-254.

    Full description at Econpapers || Download paper

  41. The Optimal Defense of Networks of Targets. (2017). Kovenock, Dan ; Roberson, Brian.
    In: Working Papers.
    RePEc:chu:wpaper:17-18.

    Full description at Econpapers || Download paper

Coauthors

Authors registered in RePEc who have wrote about the same topic

Report date: 2025-09-29 07:41:41 || Missing content? Let us know

CitEc is a RePEc service, providing citation data for Economics since 2001. Last updated August, 3 2024. Contact: Jose Manuel Barrueco.