Acemoglu, D. ; Malekian, A. ; Ozdaglar, A. Network security and contagion. 2016 Journal of Economic Theory. 166 536-585
- Ackerman, G.A. ; Zhuang, J. ; Weerasuriya, S. Cross-Milieu terrorist collaboration: Using game theory to assess the risk of a novel threat: Cross-Milieu terrorist collaboration. 2017 Risk Analysis. 37 342-371
Paper not yet in RePEc: Add citation now
- Alpcan, T. ; Basar, T. An intrusion detection game with limited observations. 2006 En : 12th Int. Symp. on Dynamic Games and Applications. :
Paper not yet in RePEc: Add citation now
Ancker, C.J. A proposed foundation for a theory of combat. 1995 Naval Research Logistics. 43 311-343
- Arce, D.G. ; Sandler, T. Counterterrorism: A game-theoretic analysis. 2005 Journal of Conflict Resolution. 49 183-200
Paper not yet in RePEc: Add citation now
- Atamtürk, A. ; Deck, C. ; Jeon, H. Successive quadratic upper-bounding for discrete mean-risk minimization and network interdiction. 2019 INFORMS Journal of Computing. 32 346-355
Paper not yet in RePEc: Add citation now
Azaiez, M.N. ; Bier, V.M. Optimal resource allocation for security in reliability systems. 2007 European Journal of Operational Research. 181 773-786
- Azaiez, M.N. ; Bier, V.M. Perfect aggregation for a class of general reliability models with Bayesian updating. 1995 Applied Mathematics and Computation. 73 281-302
Paper not yet in RePEc: Add citation now
Baliga, S. ; De Mesquita, E.B. ; Wolitzky, A. Deterrence with imperfect attribution. 2020 The American Political Science Review. 114 1155-1178
- Bandyopadhyay, T. ; Jacob, V. ; Raghunathan, S. Information security in networked supply chains: Impact of network vulnerability and supply chain integration on incentives to invest. 2010 Information Technology and Management. 11 7-23
Paper not yet in RePEc: Add citation now
- Banks, D. ; Gallego, V. ; Naveiro, R. ; Ríos Insua, D Adversarial risk analysis: An overview. 2022 Wiley Interdisciplinary Reviews. Computational Statistics. 14 e1530-
Paper not yet in RePEc: Add citation now
Ben Yaghlane, A. ; Azaiez, M.N. System survivability to continuous attacks: A game theoretic setting for constant attack rate processes. 2019 The Journal of the Operational Research Society. 70 1308-1320
Ben Yaghlane, A. ; Azaiez, M.N. Systems under attack-survivability rather than reliability: Concept, results, and applications. 2017 European Journal of Operational Research. 258 1156-1164
Ben Yaghlane, A. ; Azaiez, M.N. ; Mrad, M. System survivability in the context of interdiction networks. 2019 Reliability Engineering & System Safety. 185 362-371
Bier, V. ; Gutfraind, A. Risk analysis beyond vulnerability and resilience - Characterizing the defensibility of critical systems. 2019 European Journal of Operational Research. 276 626-636
Bier, V.M. ; Hausken, K. Defending and attacking a network of two arcs subject to traffic congestion. 2013 Reliability Engineering & System Safety. 112 214-224
Bier, V.M. ; Hausken, K. Endogenizing the sticks and carrots: Modeling possible perverse effects of counterterrorism measures. 2011 Annals of Operations Research. 186 39-59
Bier, V.M. ; Lin, S.W. On the treatment of uncertainty and variability in making decisions about risk. 2013 Risk Analysis. 33 1899-1907
- Bier, V.M. ; Nagaraj, A. ; Abhichandani, V. Protection of simple series and parallel systems with components of different values. 2005 Reliability Engineering & System Safety. 87 315-323
Paper not yet in RePEc: Add citation now
Bier, V.M. ; Oliveros, S. ; Samuelson, L. Choosing what to protect: Strategic defensive allocation against an unknown attacker. 2007 Journal of Public Economic Theory. 9 563-587
- Bier, V.M. ; Tas, S. Addressing vulnerability to cascading failure against intelligent adversaries in power networks. 2014 Energy Systems. 7 193-213
Paper not yet in RePEc: Add citation now
- Britannica. (2022). Operations research. https://www.britannica.com/topic/operations-research/History.
Paper not yet in RePEc: Add citation now
- Carter, S. ; Cox, A. September 8). One 9/11 tally: $3.3 trillion. 2011 The New York Times:
Paper not yet in RePEc: Add citation now
- Caulkins, J.P. ; Grass, D. ; Feichtinger, G. ; Tragler, G. Optimizing counter-terror operations: Should one fight fire with "fire" or "water"?. 2008 Computers and Operations Research. 35 1874-1885
Paper not yet in RePEc: Add citation now
- Chen, X. ; Dong, Y. ; Hunt, K. ; Zhuang, J. Counterterrorism resource allocation during a pandemic: The effects of dynamic target valuations when facing a strategic terrorist. 2023 Risk Analysis. 43 1235-1253
Paper not yet in RePEc: Add citation now
- Chen, Z. ; Du, W.-B. ; Cao, X.-B. ; Zhou, X.-L. Cascading failure of interdependent networks with different coupling preference under targeted attack. 2015 Chaos, Solitons & Fractals. 80 7-12
Paper not yet in RePEc: Add citation now
Chopra, S.S. ; Khanna, V. Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience. 2015 Physica A: Statistical Mechanics and its Applications. 436 865-877
- Clarke, R.A. ; Knake, R.K. Cyber war. 2014 Tantor Media, Incorporated:
Paper not yet in RePEc: Add citation now
- Crosston, M.D. World gone cyber mad: How “mutually assured debilitation” is the best hope for cyber deterrence. 2011 Strategic Studies Quarterly. 5 100-116
Paper not yet in RePEc: Add citation now
- Dalio, R. Principles for dealing with the changing world order: why nations succeed or fail. 2021 Simon & Schuster:
Paper not yet in RePEc: Add citation now
- Dighe, N.S. ; Zhuang, J. ; Bier, V.M. Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. 2009 International Journal of Performability Engineering. 5 31-43
Paper not yet in RePEc: Add citation now
- Do, C.T. ; Tran, N.H. ; Hong, C. ; Kamhoua, C.A. ; Kwiat, K.A. ; Blasch, E. ; Ren, S. ; Pissinou, N. ; Iyengar, S.S. Game theory for cyber security and privacy. 2017 ACM Computing Surveys (CSUR). 50 30-
Paper not yet in RePEc: Add citation now
- Dong, Y. ; Chen, X. ; Hunt, K. ; Zhuang, J. Defensive resource allocation: The roles of forecast information and risk control. 2021 Risk Analysis. 41 1304-1322
Paper not yet in RePEc: Add citation now
- Ebeling, C. An introduction to reliability and maintainability engineering. 1997 McGraw-Hill:
Paper not yet in RePEc: Add citation now
- Edwards, B. ; Furnas, A. ; Forrest, S. ; Axelrod, R. Strategic aspects of cyberattack, attribution, and blame. 2017 Proceedings of the National Academy of Sciences. 114 2825-2830
Paper not yet in RePEc: Add citation now
- Enders, W. ; Sandler, T. What do we know about the substitution effect in transnational terrorism?. 2003 En : Silke, A. ; Ilardi, G. Researching terrorism: Trends, achievements, failures. Frank Cass:
Paper not yet in RePEc: Add citation now
Engel, J.H. A verification of Lanchester's Law. 1954 Operations Research. 2 163-171
- Feeney, J.M. ; Goldberg, R. ; Blumenthal, J.A. ; Wallack, M.K. September 11, 2001, revisited - A review of the data [review]. 2005 Archives of Surgery. 140 1068-1073
Paper not yet in RePEc: Add citation now
Feichtinger, G. ; Novak, A. Terror and counterterror operations: Differential game with cyclical Nash solution. 2008 Journal of Optimization Theory and Applications. 139 541-556
- Fiske, B.A. American naval policy. 1905 Proceedings of the US Naval Institute. 113 1-80
Paper not yet in RePEc: Add citation now
Gal-Or, E. ; Ghose, A. The economic incentives for sharing security information. 2005 Information Systems Research. 16 186-208
Garcia, R.J.B. ; von Winterfeldt, D. Defender-attacker decision tree analysis to combat terrorism. 2016 Risk Analysis. 36 2258-2271
Glaeser, E.L. The political economy of hatred. 2005 Quarterly Journal of Economics. 120 45-86
Gordon, L.A. ; Loeb, M.P. ; Lucyshyn, W. Sharing information on computer systems security: An economic analysis. 2003 Journal of Accounting and Public Policy. 22 461-485
Guikema, S. ; Aven, T. Assessing risk from intelligent attacks: A perspective on approaches. 2010 Reliability Engineering and System Safety. 95 478-483
Gupta, S. ; Starr, M.K. ; Farahani, R.Z. ; Ghodsi, M.M. Prevention of terrorism-an assessment of prior pom work and future potentials. 2020 Production and Operations Management. 29 1789-1815
Gutin, E. ; Kuhn, D. ; Wiesemann, W. Interdiction games on Markovian Pert networks. 2015 Management Science. 61 999-1017
Haphuriwat, N. ; Bier, V.M. Trade-offs between target hardening and overarching protection. 2011 European Journal of Operational Research. 213 320-328
Haphuriwat, N. ; Bier, V.M. ; Willis, H.H. Deterring the smuggling of nuclear weapons in container freight through detection and retaliation. 2011 Decision Analysis. 8 88-102
Harsanyi, J.C. Games with incomplete information played by ‘Bayesian’ Players, I-III. 1967 Management Science. 14 159-183
Hausken, K. A cost-benefit analysis of terrorist attacks. 2018 Defence and Peace Economics. 29 111-129
- Hausken, K. A strategic analysis of information sharing among cyber attackers. 2015 Journal of Information Systems and Technology Management. 12 245-270
Paper not yet in RePEc: Add citation now
Hausken, K. Choosing what to protect when attacker resources and asset valuations are uncertain. 2014 Operations Research and Decisions. 24 23-44
Hausken, K. Combined series and parallel systems subject to individual versus overarching defense and attack. 2013 Asia-Pacific Journal of Operational Research. 30 -
- Hausken, K. Cyber resilience in firms, organizations and societies. 2020 Internet of Things. 11 -
Paper not yet in RePEc: Add citation now
- Hausken, K. Defence and attack of complex interdependent systems. 2018 Journal of the Operational Research Society. 1-13
Paper not yet in RePEc: Add citation now
Hausken, K. Defense and attack for interdependent systems. 2017 European Journal of Operational Research. 256 582-591
Hausken, K. Defense and attack of complex and dependent systems. 2010 Reliability Engineering & System Safety. 95 29-42
- Hausken, K. Defense and attack of two-component multi-state systems. 2011 International Journal of Performability Engineering. 7 205-216
Paper not yet in RePEc: Add citation now
Hausken, K. Ethics and efficiency in organizations. 1996 International Journal of Social Economics. 23 15-40
Hausken, K. Game theoretic analysis of two-period-dependent degraded multistate reliability systems. 2011 International Game Theory Review. 13 247-267
- Hausken, K. Governments playing games and combating the dynamics of a terrorist organization. 2020 International Game Theory Review. -
Paper not yet in RePEc: Add citation now
Hausken, K. Income, interdependence, and substitution effects affecting incentives for security investment. 2006 Journal of Accounting and Public Policy. 25 629-665
Hausken, K. Individual versus overarching protection and attack of assets. 2014 Central European Journal of Operations Research. 22 89-112
Hausken, K. Information sharing among cyber hackers in successive attacks. 2017 International Game Theory Review. 19 -
Hausken, K. Information sharing among firms and cyber attacks. 2007 Journal of Accounting and Public Policy. 26 639-688
Hausken, K. On the impossibility of deterrence in sequential Colonel Blotto games. 2012 International Game Theory Review. 14 1-13
Hausken, K. Proactivity and retroactivity of firms and information sharing of hackers. 2018 International Game Theory Review. 20 -
Hausken, K. Probabilistic risk analysis and game theory. 2002 Risk Analysis. 22 17-27
Hausken, K. Protecting complex infrastructures against multiple strategic attackers. 2011 International Journal of Systems Science. 42 11-29
Hausken, K. Security investment, hacking, and information sharing between firms and between hackers. 2017 Games. 8 -
Hausken, K. Special versus general protection and attack of parallel and series components. 2017 Reliability Engineering and System Safety. 165 239-256
Hausken, K. Special versus general protection and attack of two assets. 2019 Operations Research and Decisions. 29 53-93
Hausken, K. Strategic defense and attack for series and parallel reliability systems [article]. 2008 European Journal of Operational Research. 186 856-881
Hausken, K. Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints. 2023 SN Business & Economics. 3 192-
Hausken, K. Whether to attack a terrorist's resource stock today or tomorrow. 2008 Games and Economic Behavior. 64 548-564
Hausken, K. ; Bier, V.M. Defending against multiple different attackers [article]. 2011 European Journal of Operational Research. 211 370-384
Hausken, K. ; Bier, V.M. ; Zhuang, J Defending against terrorism, natural disaster, and all hazards. 2009 En : Bier, V.M. ; Azaiez, M.N. Game theoretic risk analysis of security threats (Vol. 128. Springer US:
Hausken, K. ; He, F. On the effectiveness of security countermeasures for critical infrastructures. 2016 Risk Analysis. -
Hausken, K. ; Levitin, G. Efficiency of even separation of parallel elements with variable contest intensity [article]. 2008 Risk Analysis. 28 1477-1486
Hausken, K. ; Levitin, G. Minmax defense strategy for complex multi-state systems. 2009 Reliability Engineering & System Safety. 94 577-587
- Hausken, K. ; Levitin, G. Review of systems defense and attack models. 2012 International Journal of Performability Engineering. 8 355-366
Paper not yet in RePEc: Add citation now
Hausken, K. ; Levitin, G. Shield versus sword resource distribution in K-round duels. 2011 Central European Journal of Operations Research. 19 589-603
Hausken, K. ; Moxnes, J.F. Approximations and empirics for stochastic war equations. 2005 Naval Research Logistics. 52 682-700
Hausken, K. ; Moxnes, J.F. Stochastic conditional and unconditional warfare [article]. 2002 European Journal of Operational Research. 140 61-87
Hausken, K. ; Welburn, J.W. Attack and defense strategies in cyber war involving production and stockpiling of zero-day cyber exploits. 2021 Information Systems Frontiers. 23 1609-1620
Hausken, K. ; Zhuang, J. Defending against a stockpiling terrorist. 2011 The Engineering Economist. 56 321-353
- Hausken, K. ; Zhuang, J. Defending against a terrorist who accumulates resources. 2011 Military Operations Research. 16 21-39
Paper not yet in RePEc: Add citation now
Hausken, K. ; Zhuang, J. Governments' and terrorists' defense and attack in a T-period game. 2011 Decision Analysis. 8 46-70
Hausken, K. ; Zhuang, J. The timing and deterrence of terrorist attacks due to exogenous dynamics [article]. 2012 Journal of the Operational Research Society. 63 726-735
He, F. ; Zhuang, J. Modelling 'contracts' between a terrorist group and a government in a sequential game [article]. 2012 Journal of the Operational Research Society. 63 790-809
- He, M. ; Devine, L. ; Zhuang, J. Perspectives on cybersecurity information sharing among multiple stakeholders using a decision theoretic approach. 2018 Risk Analysis. 38 215-225
Paper not yet in RePEc: Add citation now
Hirshleifer, J. From weakest-link to best-shot: The voluntary provision of public goods. 1983 Public Choice. 41 371-386
- Hunt, K. ; Zhuang, J. A review of attacker-defender games: Current state and paths forward. 2023 European Journal of Operational Research. -
Paper not yet in RePEc: Add citation now
Jalilpoor, K. ; Oshnoei, A. ; Mohammadi-Ivatloo, B. ; Anvari-Moghaddam, A. Network hardening and optimal placement of microgrids to improve transmission system resilience: A two-stage linear program. 2022 Reliability Engineering & System Safety. 224 -
- Jasper, S. Deterring malicious behavior in cyberspace. 2015 Strategic Studies Quarterly. 9 60-85
Paper not yet in RePEc: Add citation now
- Jensen, E.T. Cyber deterrence. 2012 Emory Int'l L. Rev.. 26 773-
Paper not yet in RePEc: Add citation now
Johansson, J. ; Hassel, H. An approach for modelling interdependent infrastructures in the context of vulnerability analysis. 2010 Reliability Engineering & System Safety. 95 1335-1344
Kalloniatis, A.C. ; Hoek, K. ; Zuparic, M. ; Brede, M. Optimising structure in a networked Lanchester model for fires and Manoeuvre in warfare. 2021 The Journal of the Operational Research Society. 72 1863-1878
Kohli, I.S. ; Haslam, M.C. An Analysis of the replicator dynamics for an asymmetric Hawk-Dove game. 2017 International Journal of Differential Equations. -
- Konak, A. ; Kulturel-Konak, S. ; Snyder, L.V. A game-theoretic genetic algorithm for the reliable server assignment problem under attacks. 2015 Computers & Industrial Engineering. 85 73-85
Paper not yet in RePEc: Add citation now
Kosanoglu, F. ; Bier, V.M. Target-oriented utility for interdiction of transportation networks. 2020 Reliability Engineering & System Safety. 197 -
Kovenock, D. ; Roberson, B. The optimal defense of networks of targets. 2018 Economic Inquiry. 56 2195-2211
Kress, M. Lanchester models for irregular warfare. 2020 Mathematics. 8 737-
Kress, M. ; Caulkins, J.P. ; Feichtinger, G. ; Grass, D. ; Seidl, A. Lanchester model for three-way combat. 2018 European Journal of Operational Research. 264 46-54
Kunreuther, H. ; Heal, G. Interdependent security. 2003 Journal of Risk and Uncertainty. 26 231-249
- Lanchester, F.W. Aircraft in warfare: The dawn of the fourth arm. 1916 Tiptree Constable and Co. Ltd.: London
Paper not yet in RePEc: Add citation now
- Leffingwell, J.W.R. The laws of combat? Lanchester reexamined. 1987 International Security. 12 89-134
Paper not yet in RePEc: Add citation now
Levitin, G Optimizing defense strategies for complex multi-state systems. 2009 En : Bier, V.M ; Azaiez, M.N Game theoretic risk analysis of security threats. Springer:
- Levitin, G. Optimal defense strategy against intentional attacks. 2007 IEEE Transactions on Reliability. 56 148-157
Paper not yet in RePEc: Add citation now
Levitin, G. ; Hausken, K. Defense resource distribution between protection and redundancy for constant resource stockpiling pace. 2011 Risk Analysis. 31 1632-1645
Levitin, G. ; Hausken, K. False targets efficiency in defense strategy. 2009 European Journal of Operational Research. 194 155-162
Levitin, G. ; Hausken, K. Individual versus overarching protection against strategic attacks. 2012 Journal of the Operational Research Society. 63 969-981
- Levitin, G. ; Hausken, K. K-round duel with uneven resource distribution. 2012 International Journal of Performability Engineering. 8 19-34
Paper not yet in RePEc: Add citation now
Levitin, G. ; Hausken, K. Preventive strike vs. false targets and protection in defense strategy. 2011 Reliability Engineering & System Safety. 96 912-924
- Levitin, G. ; Hausken, K. Preventive strike vs. false targets in defense strategy. 2012 International Journal of Performability Engineering. 8 341-354
Paper not yet in RePEc: Add citation now
- Levitin, G. ; Hausken, K. Preventive strike vs. protection in defense strategy. 2010 Military Operations Research. 15 5-15
Paper not yet in RePEc: Add citation now
Levitin, G. ; Hausken, K. Protection vs. redundancy in homogeneous parallel systems. 2008 Reliability Engineering & System Safety. 93 1444-1451
Levitin, G. ; Hausken, K. Separation in homogeneous systems with independent identical elements. 2010 European Journal of Operational Research. 203 625-634
Levitin, G. ; Hausken, K. ; Ben Haim, H. Active and passive defense against multiple attack facilities. 2011 Asia-Pacific Journal of Operational Research. 28 431-444
Levitin, G. ; Hausken, K. ; Dai, Y. Individual vs. overarching protection for minimizing the expected damage caused by an attack. 2013 Reliability Engineering & System Safety. 119 117-125
Levitin, G. ; Hausken, K. ; Dai, Y. Optimal defense with variable number of overarching and individual protections. 2014 Reliability Engineering & System Safety. 123 81-90
Levitin, G. ; Hausken, K. ; Taboada, H.A. ; Coit, D.W. Data survivability vs. security in information systems. 2012 Reliability Engineering & System Safety. 100 19-27
- Li, R.-q. ; Sun, S.-w. ; Ma, Y.-l. ; Wang, L. ; Xia, C.-y Effect of clustering on attack vulnerability of interdependent scale-free networks. 2015 Chaos Solitons & Fractals. 80 109-116
Paper not yet in RePEc: Add citation now
- Li, Y. ; Xu, L. Cybersecurity investments in a two-Echelon supply chain with third-party risk propagation. 2020 International Journal of Production Research. 1-23
Paper not yet in RePEc: Add citation now
- Libicki, M.C. Cyberdeterrence and cyberwar. 2009 Rand Corporation:
Paper not yet in RePEc: Add citation now
- Lisnianski, A. ; Levitin, G. Multi-state system reliability: Assessment, optimization and applications (Vol. vol. 6). 2003 World Scientific:
Paper not yet in RePEc: Add citation now
Liu, P.L. ; Sun, H.K. ; You, Y.T. Some comments on Mackay's Lanchester mixed forces model. 2012 The Journal of the Operational Research Society. 63 -
- Lotka, A.J. Elements of mathematical biology. 1924 Dover Books:
Paper not yet in RePEc: Add citation now
MacKay, N.J. Lanchester models for mixed forces with semi-dynamical target allocation. 2009 The Journal of the Operational Research Society. 60 1421-1427
MacKay, N.J. Response to 'some comments on Mackay's Lanchester mixed forces model. 2012 The Journal of the Operational Research Society. 63 -
- McCloskey, J.F. United-States operations-research in World-War-II. 1987 Operations Research. 35 910-925
Paper not yet in RePEc: Add citation now
- Morse, P.M. ; Kimball, G.E. Methods of operations research. 1951 MIT Press:
Paper not yet in RePEc: Add citation now
- Mrad, M. ; Suryahatmaja, U.S. ; Ben Yaghlane, A. ; Azaiez, M.N. Attack strategies on networks with a budget constraint. 2021 IEEE Access. 9 100530-100547
Paper not yet in RePEc: Add citation now
- Mrad, M. ; Suryahatmaja, U.S. ; Yaghlane, A.B. ; Azaiez, M.N. Optimal K cut-sets in attack/defense strategies on networks. 2020 IEEE Access. 8 -
Paper not yet in RePEc: Add citation now
- Nagurney, A. ; Nagurney, L.S. ; Shukla, S A supply chain game theory framework for cybersecurity investments under network vulnerability. 2015 En : Daras, N.J ; Rassias, M.T Computation, cryptography, and network security. Springer International Publishing:
Paper not yet in RePEc: Add citation now
Nagurney, A. ; Shukla, S. Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability. 2017 European Journal of Operational Research. 260 588-600
- Nezamoddini, N. ; Mousavian, S. ; Erol-Kantarci, M. A risk optimization model for enhanced power grid resilience against physical attacks. 2017 Electric Power Systems Research. 143 329-338
Paper not yet in RePEc: Add citation now
Nikoofal, M.E. ; Zhuang, J. On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness. 2015 European Journal of Operational Research. 246 320-330
Nye, J.S. Nuclear lessons for cyber security?. 2011 Strategic Studies Quarterly. 5 18-38
Ouyang, M. Review on modeling and simulation of interdependent critical infrastructure systems. 2014 Reliability Engineering & System Safety. 121 43-60
Pala, A. ; Zhuang, J. Information sharing in cybersecurity: A review. 2019 Decision Analysis. 16 172-196
- Parkhideh, S. ; Gafarian, A.V. General solution to many-on-many heterogeneous stochastic combat. 1996 Naval Research Logistics. 43 937-953
Paper not yet in RePEc: Add citation now
- Peng, R. ; Guo, L. ; Levitin, G. ; Mo, H. ; Wang, W. Maintenance versus individual and overarching protections for parallel systems. 2014 Quality Technology and Quantitative Management. 11 353-362
Paper not yet in RePEc: Add citation now
Peng, R. ; Zhai, Q.Q. ; Levitin, G. Defending a single object against an attacker trying to detect a subset of false targets. 2016 Reliability Engineering and System Safety. 149 137-147
Powell, R. Sequential, Nonzero-Sum "Blotto": Allocating defensive resources prior to attack. 2009 Games and Economic Behavior. 67 611-615
- Ramirez-Marquez, J.E. ; Coit, D.W. A Monte-Carlo simulation approach for approximating multi-state two-terminal reliability. 2005 Reliability Engineering & System Safety. 87 253-264
Paper not yet in RePEc: Add citation now
Rios Insua, D. ; Rios, J. ; Banks, D. Adversarial risk analysis. 2009 Journal of the American Statistical Association. 104 841-854
Rios Insua, D. ; Rios, J. ; Banks, D. Modeling opponents in adversarial risk analysis. 2016 Risk Analysis. 36 742-755
Roponen, J. ; Ríos Insua, D. ; Salo, A. Adversarial risk analysis under partial information. 2020 European Journal of Operational Research. 287 306-316
Rothschild, C. ; McLay, L. ; Guikema, S. Adversarial risk analysis with incomplete information: A level-K approach. 2012 Risk Analysis. 32 1219-1231
- Roy, S. ; Ellis, C. ; Shiva, S. ; Dasgupta, D. ; Shandilya, V. ; Wu, Q. A survey of game theory as applied to network security. 2010 En : System Sciences (HICSS), 2010 43rd Hawaii International Conference on. :
Paper not yet in RePEc: Add citation now
- Sandler, T. ; Arce, D.G. Terrorism & game theory. 2003 Simulation & Gaming. 34 319-337
Paper not yet in RePEc: Add citation now
Sandler, T. ; Arce, D.G. ; Enders, W. An evaluation of Interpol's cooperative-based counterterrorism linkages [article]. 2011 Journal of Law & Economics. 54 79-110
- Sandler, T. ; Arce, D.G. ; Enders, W. Transnational terrorism. 2009 En : Lomborg, B. Global crises, global solutions. :
Paper not yet in RePEc: Add citation now
- Sandler, T. ; Siqueira, K. Games and terrorism: Recent developments. 2009 Simulation & Gaming. 40 164-192
Paper not yet in RePEc: Add citation now
Shan, X. ; Zhuang, J. Cost of equity in homeland security resource allocation in the face of a strategic attacker. 2013 Risk Analysis. 33 1083-1099
Shan, X. ; Zhuang, J. Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–Attacker game. 2013 European Journal of Operational Research. 228 262-272
Shan, X. ; Zhuang, J. Modeling credible retaliation threats in deterring the smuggling of nuclear weapons using partial inspection-a three-stage game [article]. 2014 Decision Analysis. 11 43-62
Shan, X. ; Zhuang, J. Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game. 2018 Reliability Engineering and System Safety. 179 12-26
Shan, X. ; Zhuang, J. Subsidizing to disrupt a terrorism supply chain—A four-player game. 2014 Journal of the Operational Research Society. 65 1108-1119
Shan, X.G. ; Zhuang, J. A game-theoretic approach to modeling attacks and defenses of smart grids at three levels. 2020 Reliability Engineering & System Safety. 195 -
Simon, H.A. A behavioral model of rational choice. 1955 The Quarterly Journal of Economics. 69 99-118
- Simon, H.A. The sciences of the artificial. 1969 MIT Press:
Paper not yet in RePEc: Add citation now
Simon, J. ; Omar, A. Cybersecurity investments in the supply chain: Coordination and a strategic attacker. 2020 European Journal of Operational Research. 282 161-171
Smith, J.C. ; Song, Y. A survey of network interdiction models and algorithms. 2020 European Journal of Operational Research. 283 797-811
- Stockfish, J. Models, data, and war: A critique of the study of conventional forces, R-1526-Pr. 1975 The rand corporation: Santa Monica, California
Paper not yet in RePEc: Add citation now
- Taylor, J.G. Lanchester models of warfare, vols. 1 and 2. operations research society of America, military applications section. 1983 :
Paper not yet in RePEc: Add citation now
- Universal Teacher Brief history of operations research. 2022 :
Paper not yet in RePEc: Add citation now
- Ventisel, Y.S. Introduction to operations research. 1964 Soviet Radio Publishing House: Moscow
Paper not yet in RePEc: Add citation now
- Von Neumann, J. Theory of games and economic behavior. 1944 Princeton University Press:
Paper not yet in RePEc: Add citation now
- Von Neumann, J. Zur Theorie Der Gesellschaftsspiele. 1928 Mathematische Annalen. 100 295-320
Paper not yet in RePEc: Add citation now
Wang, C. ; Bier, V.M. Quantifying adversary capabilities to inform defensive resource allocation. 2016 Risk Analysis. 36 756-775
Wang, C. ; Bier, V.M. Target-hardening decisions based on uncertain multiattribute terrorist utility. 2011 Decision Analysis. 8 286-302
Wang, G. ; Welburn, J.W. ; Hausken, K. A two-period game theoretic model of zero-day attacks with stockpiling. 2020 Games. 11 64-
Wang, J. ; Wu, Y. ; Li, Y. Attack robustness of cascading load model in interdependent networks. 2015 International Journal of Modern Physics C. 26 -
- Wang, L. ; Ren, S. ; Yue, K. ; Kwiat, K. Optimal resource allocation for protecting system availability against random cyber attacks (Vol. 1). 2011 :
Paper not yet in RePEc: Add citation now
Wang, S. ; Hong, L. ; Chen, X. Vulnerability analysis of interdependent infrastructure systems: A methodological framework. 2012 Physica A: Statistical Mechanics and its Applications. 391 3323-3335
- Wang, S. ; Hong, L. ; Ouyang, M. ; Zhang, J. ; Chen, X. Vulnerability analysis of interdependent infrastructure systems under edge attack strategies. 2013 Safety Science. 51 328-337
Paper not yet in RePEc: Add citation now
Wei, N. ; Walteros, J.L. Integer programming methods for solving binary interdiction games. 2022 European Journal of Operational Research. 302 456-469
Wei, N. ; Walteros, J.L. ; Pajouh, F.M. Integer programming formulations for minimum spanning tree interdiction. 2021 IINFORMS Journal on Computing. 33 1461-1480
Weiss, H.K. Combat models and historical data: The U.S. civil war. 1966 Operations Research. 14 759-790
Welburn, J. ; Grana, J. ; Schwindt, K. Cyber deterrence with imperfect attribution and unverifiable signaling. 2023 European Journal of Operational Research. 306 1399-1416
- Wrigge, S. ; Fransén, A. ; Wigg, L. The Lanchester theory of combat and some related subjects. A bibliography 1900-1993. 1995 National Defence Research Establishment: Stockholm, Sweden
Paper not yet in RePEc: Add citation now
Wu, B. ; Tang, A. ; Wu, J. Modeling cascading failures in interdependent infrastructures under terrorist attacks. 2016 Reliability Engineering & System Safety. 147 1-8
- Xu, Z. ; Zhuang, J. A study on a sequential one-defender-N-attacker game. 2019 Risk Analysis. 39 1414-1432
Paper not yet in RePEc: Add citation now
Zhang, J. ; Wang, Y. ; Zhuang, J. Modeling multi-target defender-attacker games with quantal response attack strategies. 2021 Reliability Engineering & System Safety. 205 -
- Zhang, P. ; Cheng, B. ; Zhao, Z. ; Li, D. ; Lu, G. ; Wang, Y. ; Xiao, J. The robustness of interdependent transportation networks under targeted attack. 2013 EPL. 103-
Paper not yet in RePEc: Add citation now
- Zhuang, J. Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-player game with errors. 2010 The Engineering Economist. 55 131-149
Paper not yet in RePEc: Add citation now
Zhuang, J. ; Bier, V.M. Balancing terrorism and natural disasters: Defensive strategy with endogenous attacker effort. 2007 Operations Research. 55 976-991
- Zhuang, J. ; Bier, V.M. Reasons for secrecy and deception in homeland-security resource allocation. 2010 Risk Analysis. 30 1737-1743
Paper not yet in RePEc: Add citation now
Zhuang, J. ; Bier, V.M. Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation. 2011 Defence and Peace Economics. 22 43-61
Zhuang, J. ; Bier, V.M. ; Alagoz, O. Modeling secrecy and deception in a multiple-period attacker-defender signaling game. 2010 European Journal of Operational Research. 203 409-418
- Zhuang, J. ; Bier, V.M. ; Gupta, A. Subsidies in interdependent security with heterogeneous discount rates. 2007 Engineering Economist. 52 1-19
Paper not yet in RePEc: Add citation now
- Zio, E. ; Podofillini, L. Monte Carlo simulation analysis of the effects of different system performance levels on the importance of multi-state components. 2003 Reliability Engineering & System Safety. 82 63-73
Paper not yet in RePEc: Add citation now