Pages that link to "Item:Q3392129"
From MaRDI portal
The following pages link to Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort (Q3392129):
Displayed 50 items.
- A leader-follower partially observed, multiobjective Markov game (Q256610) (← links)
- Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game (Q257269) (← links)
- The strategic interaction between a company and the government surrounding disasters (Q285988) (← links)
- Infrastructure security games (Q297288) (← links)
- Individual versus overarching protection and attack of assets (Q301156) (← links)
- Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill (Q314779) (← links)
- A medical resource allocation model for serving emergency victims with deteriorating health conditions (Q314781) (← links)
- Modeling and mitigating the effects of supply chain disruption in a defender-attacker game (Q314784) (← links)
- Modeling costly learning and counter-learning in a defender-attacker game with private defender information (Q314785) (← links)
- Historical evolution and benefit-cost explanation of periodical fluctuation in coal mine safety supervision: an evolutionary game analysis framework (Q319258) (← links)
- On the value of exposure and secrecy of defense system: first-mover advantage vs. robustness (Q319764) (← links)
- Optimal control of a terror queue (Q320666) (← links)
- Multithreat multisite protection: a security case study (Q322995) (← links)
- Protection issues for supply systems involving random attacks (Q336905) (← links)
- Balancing congestion and security in the presence of strategic applicants with private information (Q421494) (← links)
- Optimizing system resilience: a facility protection model with recovery time (Q439415) (← links)
- Shield versus sword resource distribution in \(K\)-round duels (Q441030) (← links)
- Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and \(N\) donors (Q478068) (← links)
- A Stackelberg game model for resource allocation in cargo container security (Q646673) (← links)
- Analysis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification (Q709153) (← links)
- Defending against multiple different attackers (Q713120) (← links)
- The role of customs in securing containerized global supply chains (Q724098) (← links)
- Critical infrastructure protection using secrecy -- a discrete simultaneous game (Q726251) (← links)
- Military system of systems architecting with individual system contracts (Q895780) (← links)
- Non-convexities and the gains from concealing defenses from committed terrorists (Q969478) (← links)
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game (Q1046116) (← links)
- A two-resource allocation algorithm with an application to large-scale zero-sum defensive games (Q1652078) (← links)
- Bargaining model of labor disputes considering social mediation and bounded rationality (Q1683147) (← links)
- Systems under attack-survivability rather than reliability: concept, results, and applications (Q1751760) (← links)
- An analytical approach to the protection planning of a rail intermodal terminal network (Q1752835) (← links)
- Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information (Q1754164) (← links)
- Revenge or continued attack and defense in defender-attacker conflicts (Q2024013) (← links)
- Interplay of rumor propagation and clarification on social media during crisis events -- a game-theoretic approach (Q2076850) (← links)
- Augmented probability simulation methods for sequential games (Q2106757) (← links)
- Natural disasters and their impact on cooperation against a common enemy (Q2160534) (← links)
- Adversarial risk analysis under partial information (Q2189943) (← links)
- Cybersecurity investments in the supply chain: coordination and a strategic attacker (Q2282501) (← links)
- On the learning patterns and adaptive behavior of terrorist organizations (Q2282507) (← links)
- A survey of network interdiction models and algorithms (Q2294622) (← links)
- Terrorism deterrence in a two country framework: strategic interactions between R\&D, defense and pre-emption (Q2449366) (← links)
- Validating game-theoretic models of terrorism: insights from machine learning (Q2669076) (← links)
- A Tullock-contest-based approach for cyber security investments (Q2678588) (← links)
- A decomposable resource allocation model with generalized overarching protections (Q2678603) (← links)
- COMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACK (Q2836526) (← links)
- Allocating capacity in parallel queues to improve their resilience to deliberate attack (Q2892133) (← links)
- ACTIVE VS. PASSIVE DEFENSE AGAINST A STRATEGIC ATTACKER (Q2907960) (← links)
- Resource Allocation for Homeland Defense: Dealing with the Team Effect (Q2963446) (← links)
- ACTIVE AND PASSIVE DEFENSE AGAINST MULTIPLE ATTACK FACILITIES (Q3174010) (← links)
- Governments' and Terrorists' Defense and Attack in a <i>T</i>-Period Game (Q4691926) (← links)
- Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility (Q4691944) (← links)