Search Results

There are 13525 results for: content related to: A Unified Theory and Test of Extended Immediate Deterrence

  1. Adversarial Risk Analysis for Counterterrorism Modeling

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 894–915, Jesus Rios and David Rios Insua

    Version of Record online : 8 DEC 2011, DOI: 10.1111/j.1539-6924.2011.01713.x

  2. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 930–943, Mohammad E. Nikoofal and Jun Zhuang

    Version of Record online : 2 NOV 2011, DOI: 10.1111/j.1539-6924.2011.01702.x

  3. A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management

    Risk Analysis

    Volume 31, Issue 9, September 2011, Pages: 1488–1510, Jason Merrick and Gregory S. Parnell

    Version of Record online : 18 MAR 2011, DOI: 10.1111/j.1539-6924.2011.01590.x

  4. A fictitious play-based response strategy for multistage intrusion defense systems

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 473–491, Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif and Salim Hariri

    Version of Record online : 28 FEB 2013, DOI: 10.1002/sec.730

  5. Quantifying Adversary Capabilities to Inform Defensive Resource Allocation

    Risk Analysis

    Volume 36, Issue 4, April 2016, Pages: 756–775, Chen Wang and Vicki M. Bier

    Version of Record online : 1 MAY 2015, DOI: 10.1111/risa.12399

  6. Modeling Resources Allocation in Attacker-Defender Games with “Warm Up” CSF

    Risk Analysis

    Volume 36, Issue 4, April 2016, Pages: 776–791, Peiqiu Guan and Jun Zhuang

    Version of Record online : 29 DEC 2015, DOI: 10.1111/risa.12502

  7. Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker

    Journal of Public Economic Theory

    Volume 9, Issue 4, August 2007, Pages: 563–587, VICKI BIER, SANTIAGO OLIVEROS and LARRY SAMUELSON

    Version of Record online : 31 JUL 2007, DOI: 10.1111/j.1467-9779.2007.00320.x

  8. Network routing for insurgency: An adversarial risk analysis framework

    Naval Research Logistics (NRL)

    Volume 58, Issue 6, September 2011, Pages: 595–607, Shouqiang Wang and David Banks

    Version of Record online : 11 JUL 2011, DOI: 10.1002/nav.20469

  9. A game theoretic investigation of deception in network security

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1162–1172, Thomas E. Carroll and Daniel Grosu

    Version of Record online : 3 DEC 2010, DOI: 10.1002/sec.242

  10. Choosing What to Protect

    Risk Analysis

    Volume 27, Issue 3, June 2007, Pages: 607–620, Vicki M. Bier

    Version of Record online : 18 JUL 2007, DOI: 10.1111/j.1539-6924.2007.00906.x

  11. Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts

    Risk Analysis

    Vineet M. Payyappalli, Jun Zhuang and Victor Richmond R. Jose

    Version of Record online : 17 MAR 2017, DOI: 10.1111/risa.12768

  12. Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory

    Risk Analysis

    Volume 36, Issue 4, April 2016, Pages: 681–693, Jason R. W. Merrick and Philip Leclerc

    Version of Record online : 14 JUL 2014, DOI: 10.1111/risa.12254

  13. Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model

    Risk Analysis

    Volume 30, Issue 1, January 2010, Pages: 32–48, Gregory S. Parnell, Christopher M. Smith and Frederick I. Moxley

    Version of Record online : 11 DEC 2009, DOI: 10.1111/j.1539-6924.2009.01319.x

  14. Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity

    Risk Analysis

    Volume 28, Issue 5, October 2008, Pages: 1477–1486, Kjell Hausken and Gregory Levitin

    Version of Record online : 9 JUL 2008, DOI: 10.1111/j.1539-6924.2008.01090.x

  15. Alignment Patterns, Crisis Bargaining, and Extended Deterrence: A Game-Theoretic Analysis

    International Studies Quarterly

    Volume 47, Issue 4, December 2003, Pages: 587–615, Frank C. Zagare and D. Marc Kilgour

    Version of Record online : 7 NOV 2003, DOI: 10.1046/j.0020-8833.2003.00280.x

  16. Deception tactics for network interdiction: A multiobjective approach

    Networks

    Volume 60, Issue 1, August 2012, Pages: 45–58, Javier Salmerón

    Version of Record online : 19 SEP 2011, DOI: 10.1002/net.20458

  17. How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts

    Risk Analysis

    Volume 31, Issue 2, February 2011, Pages: 196–204, Gerald G. Brown and Louis Anthony (Tony) Cox, Jr.

    Version of Record online : 15 SEP 2010, DOI: 10.1111/j.1539-6924.2010.01492.x

  18. Bargaining and Fighting: The Impact of Regime Type on War Onset, Duration, and Outcomes

    American Journal of Political Science

    Volume 48, Issue 2, April 2004, Pages: 296–313, Darren Filson and Suzanne Werner

    Version of Record online : 3 MAR 2004, DOI: 10.1111/j.0092-5853.2004.00071.x

  19. Weakest-link attacker-defender games with multiple attack technologies

    Naval Research Logistics (NRL)

    Volume 59, Issue 6, September 2012, Pages: 457–469, Daniel G. Arce, Dan Kovenock and Brian Roberson

    Version of Record online : 30 JUL 2012, DOI: 10.1002/nav.21500

  20. Resource Distribution in Multiple Attacks Against a Single Target

    Risk Analysis

    Volume 30, Issue 8, August 2010, Pages: 1231–1239, Gregory Levitin and Kjell Hausken

    Version of Record online : 20 APR 2010, DOI: 10.1111/j.1539-6924.2010.01410.x