Search Results

There are 15602 results for: content related to: A defender-attacker optimization of Port Radar surveillance

  1. Could firewall rules be public – a game theoretical perspective

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 197–210, Qi Liao, Zhen Li and Aaron Striegel

    Article first published online : 24 JAN 2011, DOI: 10.1002/sec.307

  2. Deception tactics for network interdiction: A multiobjective approach

    Networks

    Volume 60, Issue 1, August 2012, Pages: 45–58, Javier Salmerón

    Article first published online : 19 SEP 2011, DOI: 10.1002/net.20458

  3. Quantifying Adversary Capabilities to Inform Defensive Resource Allocation

    Risk Analysis

    Chen Wang and Vicki M. Bier

    Article first published online : 1 MAY 2015, DOI: 10.1111/risa.12399

  4. Denial-of-Service Attacks on VoIP and IMS Services

    SIP Security

    Dorgham Sisalem, John Floroiu, Jiri Kuthan, Ulrich Abend, Henning Schulzrinne, Pages: 225–290, 2009

    Published Online : 11 MAY 2009, DOI: 10.1002/9780470516997.ch8

  5. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 930–943, Mohammad E. Nikoofal and Jun Zhuang

    Article first published online : 2 NOV 2011, DOI: 10.1111/j.1539-6924.2011.01702.x

  6. Automated Testing of Physical Security: Red Teaming Through Machine Learning

    Computational Intelligence

    Volume 31, Issue 3, August 2015, Pages: 465–497, Chris Thornton, Ori Cohen, Jörg Denzinger and Jeffrey E. Boyd

    Article first published online : 27 FEB 2014, DOI: 10.1111/coin.12034

  7. Necessity in Self-Defense and War

    Philosophy & Public Affairs

    Volume 40, Issue 1, Winter 2012, Pages: 3–44, SETH LAZAR

    Article first published online : 27 JUL 2012, DOI: 10.1111/j.1088-4963.2012.01214.x

  8. A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management

    Risk Analysis

    Volume 31, Issue 9, September 2011, Pages: 1488–1510, Jason Merrick and Gregory S. Parnell

    Article first published online : 18 MAR 2011, DOI: 10.1111/j.1539-6924.2011.01590.x

  9. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    Risk Analysis

    Nageswara S. V. Rao, Stephen W. Poole, Chris Y. T. Ma, Fei He, Jun Zhuang and David K. Y. Yau

    Article first published online : 6 APR 2015, DOI: 10.1111/risa.12362

  10. A fictitious play-based response strategy for multistage intrusion defense systems

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 473–491, Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif and Salim Hariri

    Article first published online : 28 FEB 2013, DOI: 10.1002/sec.730

  11. Proportionality, Liability, and Defensive Harm

    Philosophy & Public Affairs

    Volume 43, Issue 2, Spring 2015, Pages: 144–173, JONATHAN QUONG

    Article first published online : 25 OCT 2015, DOI: 10.1111/papa.12056

  12. Adversarial Risk Analysis for Counterterrorism Modeling

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 894–915, Jesus Rios and David Rios Insua

    Article first published online : 8 DEC 2011, DOI: 10.1111/j.1539-6924.2011.01713.x

  13. Weakest-link attacker-defender games with multiple attack technologies

    Naval Research Logistics (NRL)

    Volume 59, Issue 6, September 2012, Pages: 457–469, Daniel G. Arce, Dan Kovenock and Brian Roberson

    Article first published online : 30 JUL 2012, DOI: 10.1002/nav.21500

  14. Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome

    Risk Analysis

    Volume 32, Issue 2, February 2012, Pages: 304–318, Gregory Levitin and Kjell Hausken

    Article first published online : 30 JUL 2011, DOI: 10.1111/j.1539-6924.2011.01657.x

  15. Allocating capacity in parallel queues to improve their resilience to deliberate attack

    Naval Research Logistics (NRL)

    Volume 58, Issue 8, December 2011, Pages: 731–742, W. Matthew Carlyle, Shane G. Henderson and Roberto Szechtman

    Article first published online : 29 SEP 2011, DOI: 10.1002/nav.20478

  16. Frenzied attacks. A micro-sociological analysis of the emotional dynamics of extreme youth violence

    The British Journal of Sociology

    Volume 65, Issue 3, September 2014, Pages: 411–433, Don Weenink

    Article first published online : 23 SEP 2014, DOI: 10.1111/1468-4446.12088

    Corrected by:

    Corrigendum: Corrigendum

    Vol. 65, Issue 4, ii, Article first published online: 17 DEC 2014

  17. A stochastic learning automata-based solution for intrusion detection in vehicular ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 666–677, Sudip Misra, P. Venkata Krishna and Kiran Isaac Abraham

    Article first published online : 9 JUN 2010, DOI: 10.1002/sec.200

  18. Rebuilding the Foundations of Offense-Defense Theory

    Journal of Politics

    Volume 63, Issue 3, August 2001, Pages: 741–774, Stephen Biddle

    Article first published online : 23 JAN 2003, DOI: 10.1111/0022-3816.00086

  19. An efficient random key distribution scheme for large-scale distributed sensor networks

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 162–180, Ashok Kumar Das

    Article first published online : 30 JUN 2009, DOI: 10.1002/sec.123

  20. TOGBAD—an approach to detect routing attacks in tactical environments

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 793–806, Elmar Gerhards-Padilla, Nils Aschenbruck and Peter Martini

    Article first published online : 13 JAN 2010, DOI: 10.1002/sec.185