IDEAS home Printed from https://ideas.repec.org/e/c/pha154.html
   My authors  Follow this author

Kjell Hausken

Citations

Many of the citations below have been collected in an experimental project, CitEc, where a more detailed citation analysis can be found. These are citations from works listed in RePEc that could be analyzed mechanically. So far, only a minority of all works could be analyzed. See under "Corrections" how you can help improve the citation analysis.

Blog mentions

As found by EconAcademics.org, the blog aggregator for Economics research:
  1. Kjell Hausken & Mthuli Ncube, 2013. "Quantitative Easing and Its Impact in the US, Japan, the UK and Europe," SpringerBriefs in Economics, Springer, edition 127, number 978-1-4614-9646-5, October.

    Mentioned in:

    1. Keynes and the dearth of growth
      by Bruno Duarte in EUnomics on 2019-03-25 06:52:50

Working papers

  1. Bhimani, Alnoor & Hausken, Kjell & Arif, Sameen, 2022. "Do national development factors affect cryptocurrency adoption?," LSE Research Online Documents on Economics 115237, London School of Economics and Political Science, LSE Library.

    Cited by:

    1. Youssef El-Khatib & Abdulnasser Hatemi-J, 2023. "On a regime switching illiquid high volatile prediction model for cryptocurrencies," Journal of Economic Studies, Emerald Group Publishing Limited, vol. 51(2), pages 485-498, July.
    2. Loh, Xiu-Ming & Lee, Voon-Hsien & Leong, Lai-Ying & Aw, Eugene Cheng-Xi & Cham, Tat-Huei & Tang, Yun-Chia & Hew, Jun-Jie, 2023. "Understanding consumers’ resistance to pay with cryptocurrency in the sharing economy: A hybrid SEM-fsQCA approach," Journal of Business Research, Elsevier, vol. 159(C).
    3. Arpaci, Ibrahim, 2023. "Predictors of financial sustainability for cryptocurrencies: An empirical study using a hybrid SEM-ANN approach," Technological Forecasting and Social Change, Elsevier, vol. 196(C).
    4. Gambarelli, Luca & Marchi, Gianluca & Muzzioli, Silvia, 2023. "Hedging effectiveness of cryptocurrencies in the European stock market," Journal of International Financial Markets, Institutions and Money, Elsevier, vol. 84(C).
    5. Srivastava, Richa & Singh, Deepak Kumar & Rana, Nripendra P., 2024. "Analysis of barriers to investment and mining in cryptocurrency for traditional and tech-savvy investors: A fuzzy approach," Technology in Society, Elsevier, vol. 77(C).

  2. Hausken, Kjell, 2016. "Additive Multi-Effort Contests," UiS Working Papers in Economics and Finance 2016/2, University of Stavanger.

    Cited by:

    1. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    2. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    3. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).

  3. Hausken, Kjell, 2016. "The Ranking of Researchers by Publications and Citations," UiS Working Papers in Economics and Finance 2016/11, University of Stavanger.

    Cited by:

    1. Nadia Simoes & Nuno Crespo, 2020. "A flexible approach for measuring author-level publishing performance," Scientometrics, Springer;Akadémiai Kiadó, vol. 122(1), pages 331-355, January.
    2. Marlo M. Vernon & C. Makenzie Danley & Frances M. Yang, 2021. "Developing a measure of innovation from research in higher education data," Scientometrics, Springer;Akadémiai Kiadó, vol. 126(5), pages 3919-3928, May.
    3. Mark Levene & Martyn Harris & Trevor Fenner, 2020. "A two-dimensional bibliometric index reflecting both quality and quantity," Scientometrics, Springer;Akadémiai Kiadó, vol. 123(3), pages 1235-1246, June.

  4. Welburn, Jonathan William & Hausken, Kjell, 2015. "A Game-Theoretic Model with Empirics of Economic Crises," UiS Working Papers in Economics and Finance 2015/7, University of Stavanger.

    Cited by:

    1. Guizhou Wang & Kjell Hausken, 2021. "Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency," Games, MDPI, vol. 12(2), pages 1-24, April.
    2. Jonathan William Welburn & Kjell Hausken, 2017. "Game Theoretic Modeling of Economic Systems and the European Debt Crisis," Computational Economics, Springer;Society for Computational Economics, vol. 49(2), pages 177-226, February.
    3. Widodo, Erwin & Rochmadhan, Oryza Akbar & Lukmandono, & Januardi,, 2022. "Modeling Bayesian inspection game for non-performing loan problems," Operations Research Perspectives, Elsevier, vol. 9(C).

  5. Welburn, Jonathan & Hausken, Kjell, 2014. "A Game Theoretic Model of Economic Crises," UiS Working Papers in Economics and Finance 2014/23, University of Stavanger.

    Cited by:

    1. Hausken, Kjell & Welburn, Jonathan W., 2024. "Debt crises between a country and an international lender as a two-period game," International Review of Economics & Finance, Elsevier, vol. 92(C), pages 704-723.
    2. Jonathan W. Welburn, 2020. "Crises Beyond Belief: Findings on Contagion, the Role of Beliefs, and the Eurozone Debt Crisis from a Borrower–Lender Game," Computational Economics, Springer;Society for Computational Economics, vol. 56(2), pages 263-317, August.
    3. Guizhou Wang & Kjell Hausken, 2021. "Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency," Games, MDPI, vol. 12(2), pages 1-24, April.
    4. Welburn, Jonathan William & Hausken, Kjell, 2015. "A Game-Theoretic Model with Empirics of Economic Crises," UiS Working Papers in Economics and Finance 2015/7, University of Stavanger.
    5. Anubha Goel & Aparna Mehra, 2019. "Analyzing Contagion Effect in Markets During Financial Crisis Using Stochastic Autoregressive Canonical Vine Model," Computational Economics, Springer;Society for Computational Economics, vol. 53(3), pages 921-950, March.
    6. Jonathan William Welburn & Kjell Hausken, 2017. "Game Theoretic Modeling of Economic Systems and the European Debt Crisis," Computational Economics, Springer;Society for Computational Economics, vol. 49(2), pages 177-226, February.
    7. Widodo, Erwin & Rochmadhan, Oryza Akbar & Lukmandono, & Januardi,, 2022. "Modeling Bayesian inspection game for non-performing loan problems," Operations Research Perspectives, Elsevier, vol. 9(C).

  6. Mthuli Ncube & John Anyanwu & Kjell Hausken, 2014. "Working Paper 195 - Inequality, Economic Growth, and Poverty in the Middle East and North Africa (MENA)," Working Paper Series 999, African Development Bank.

    Cited by:

    1. Simplice Asongu & Uchenna Efobi & Ibukun Beecroft, 2015. "Inclusive Human Development in Pre-crisis Times of Globalization-driven Debts," African Development Review, African Development Bank, vol. 27(4), pages 428-442, December.
    2. Simplice A. Asongu & Jacinta C. Nwachukwu, 2016. "Mobile Phone Penetration, Mobile Banking and Inclusive Development in Africa," The African Finance Journal, Africagrowth Institute, vol. 18(1), pages 34-52.
    3. Simplice A. Asongu & Jacinta C. Nwachukwu, 2017. "Foreign Aid and Inclusive Development: Updated Evidence from Africa, 2005–2012," Social Science Quarterly, Southwestern Social Science Association, vol. 98(1), pages 282-298, March.
    4. Mark Edem Kunawotor & Charles Barnor & Raymond Dziwornu, 2021. "The Income Redistributive Effects of Taxes in Africa," Economics Bulletin, AccessEcon, vol. 41(3), pages 1579-1591.
    5. Joseph I. Uduji & Elda N. Okolo-Obasi & Simplice A. Asongu, 2019. "Growth Enhancement Support Scheme (GESS) and Farmers’ Fertilizer Use in Rural Nigeria," Working Papers 19/055, European Xtramile Centre of African Studies (EXCAS).
    6. Simplice A. Asongu & Nicholas M. Odhiambo, 2018. "ICT, Financial Access and Gender Inclusion in the Formal Economic Sector: Evidence from Africa," Research Africa Network Working Papers 18/058, Research Africa Network (RAN).
    7. Oasis Kodila-Tedika & Simplice A. Asongu & Julio Mukendi Kayembe, 2014. "Middle class in Africa: Determinants and Consequences," Research Africa Network Working Papers 14/026, Research Africa Network (RAN).
    8. Simplice A. Asongu & Nicholas M. Odhiambo, 2018. "How Enhancing Information and Communication Technology has affected Inequality in Africa for Sustainable Development: An Empirical Investigation," AFEA Working Papers 18/045, African Finance and Economic Association (AFEA).
    9. Simplice A. Asongu & Jacinta C. Nwachukwu, 2017. "Quality of Growth Empirics: Comparative Gaps, Benchmarking and Policy Syndromes," Research Africa Network Working Papers 17/034, Research Africa Network (RAN).
    10. Simplice Asongu & Rexon Nting, 2020. "The comparative economics of financial access in gender economic inclusion," African Journal of Economic and Management Studies, Emerald Group Publishing Limited, vol. 12(2), pages 193-207, December.
    11. Kouadio, Hugues Kouassi & Gakpa, Lewis-Landry, 2022. "Do economic growth and institutional quality reduce poverty and inequality in West Africa?," Journal of Policy Modeling, Elsevier, vol. 44(1), pages 41-63.
    12. Obadiah Jonathan Gimba & Mehdi Seraj & Huseyin Ozdeser, 2021. "What drives income inequality in sub‐Saharan Africa and its sub‐regions? An examination of long‐run and short‐run effects," African Development Review, African Development Bank, vol. 33(4), pages 729-741, December.
    13. Joseph I. Uduji & Elda N. Okolo-Obasi & Simplice A. Asongu, 2019. "Growth Enhancement Support Scheme (GESS) and Farmers’ Fertilizer Use in Rural Nigeria," Working Papers of the African Governance and Development Institute. 19/055, African Governance and Development Institute..
    14. Simplice A. Asongu & Stella-Maris I. Orim & Rexon T. Nting, 2019. "Inequality, Information Technology and Inclusive Education in Sub-Saharan Africa," Working Papers of the African Governance and Development Institute. 19/035, African Governance and Development Institute..
    15. Asongu, Simplice & Nwachukwu, Jacinta, 2016. "Globalization and Inclusive Human Development in Africa," MPRA Paper 78140, University Library of Munich, Germany.
    16. Asongu, Simplice & Odhiambo, Nicholas, 2019. "Foreign Aid Complementarities and Inclusive Human Development in Africa," MPRA Paper 101086, University Library of Munich, Germany.
    17. Simplice Asongu, 2014. "A brief clarification to the questionable economics of foreign aid for inclusive human development," Working Papers of the African Governance and Development Institute. 14/028, African Governance and Development Institute..
    18. Simplice A. Asongu & Joseph Nnanna & Paul N. Acha-Anyi, 2019. "Inequality and gender economic inclusion: the moderating role of financial access in Sub-Saharan Africa," Working Papers 19/099, European Xtramile Centre of African Studies (EXCAS).
    19. Kwami Ossadzifo Wonyra & Tomgouani Lanie & Yacobou Sanoussi, 2021. "Effets Potentiels de Court‐terme de la Pandémie de la COVID‐19 sur la Pauvreté dans les Pays de l'Union Economique et Monétaire Ouest Africaine (UEMOA)," African Development Review, African Development Bank, vol. 33(S1), pages 60-74, April.
    20. Simplice A. Asongu & Nicholas M. Odhiambo, 2020. "Insurance and Inequality in Sub-Saharan Africa: Policy Thresholds," Working Papers of the African Governance and Development Institute. 20/005, African Governance and Development Institute..
    21. Aynalem Shita & Nand Kumar & Seema Singh, 2021. "Technology, poverty and income distribution nexus: The case of fertilizer adoption in Ethiopia," African Development Review, African Development Bank, vol. 33(4), pages 742-755, December.
    22. Simplice A. Asongu & Ivo J. Leke, 2017. "External Flows and Inclusive Human Development in Sub-Saharan Africa," Research Africa Network Working Papers 17/058, Research Africa Network (RAN).
    23. Abdellatif Chatri & Otman Chahbi & Mustapha Snihji, 2021. "The multilevel analysis of students’ achievement: Evidence from Morocco," African Development Review, African Development Bank, vol. 33(1), pages 117-129, March.
    24. Burhan Can Karahasan & Fırat Bilgel, 2021. "The Topography and Sources of Multidimensional Poverty in Turkey," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 154(2), pages 413-445, April.
    25. Chong Hui Ling & Khalid Ahmed & Rusnah Muhamad & Muhammad Shahbaz & Nanthakumar Loganathan, 2017. "Testing the Social Cost of Rapid Economic Development in Malaysia: The Effect of Trade on Life Expectancy," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 130(3), pages 1005-1023, February.
    26. Asongu, Simplice & Nwachukwu, Jacinta, 2016. "The Comparative Inclusive Human Development of Globalisation in Africa," MPRA Paper 76122, University Library of Munich, Germany, revised Sep 2016.
    27. Simplice A. Asongu & Joseph I. Uduji & Elda N. Okolo-Obasi, 2019. "Thresholds of External Flows for Inclusive Human Development in Sub-Saharan Africa," Research Africa Network Working Papers 19/045, Research Africa Network (RAN).
    28. Reham Rizk & Ronia Hawash, 2020. "Education Gap and Youth: A Growing Challenge in the MENA Region," LIS Working papers 790, LIS Cross-National Data Center in Luxembourg.
    29. Simplice A. Asongu & Joseph Nnanna, 2020. "Inclusive Human Development in Sub-Saharan Africa," Working Papers of the African Governance and Development Institute. 20/014, African Governance and Development Institute..
    30. Luciana Koprencka & Valbona Gjini & Redian Hysi, 2018. "Real Estate Market in Tirana," European Journal of Marketing and Economics Articles, Revistia Research and Publishing, vol. 1, ejme_v1_i.
    31. Simplice A. Asongu & Joseph Nnanna & Paul N. Acha-Anyi, 2020. "Inclusive Education for Inclusive Economic Participation: the Financial Access Channel," Working Papers 20/019, European Xtramile Centre of African Studies (EXCAS).
    32. Mahmoud Salameh Qandeel, 2024. "Implications of public policies performance on social inequality worldwide," SN Business & Economics, Springer, vol. 4(9), pages 1-33, September.
    33. Kjell Hausken & Mthuli Ncube, 2018. "Service Delivery versus Moonlighting: Using Data from Kenya, Uganda, Tanzania and Senegal," African Development Review, African Development Bank, vol. 30(2), pages 219-232, June.
    34. Simplice A. Asongu & Oasis Kodila-Tedika, 2014. "Institutions and Poverty: A Critical Comment Based on Evolving Currents and Debates," Research Africa Network Working Papers 14/031, Research Africa Network (RAN).
    35. Carr, Olivia G. & Jilani-Hyler, Nadia & Murray, Gregg R., 2022. "Identifying factors related to school closures due to COVID-19 in the Middle East and North Africa region," International Journal of Educational Development, Elsevier, vol. 90(C).
    36. Simplice A. Asongu & Nicholas M. Odhiambo, 2022. "Enhancing ICT for Female Economic Participation in Sub-Saharan Africa," Working Papers of the African Governance and Development Institute. 22/002, African Governance and Development Institute..
    37. Romuald Foueka, 2020. "Analyse du différentiel de performances scolaires dans les pays PASEC sur la base de la régression quantile contrefactuelle," African Development Review, African Development Bank, vol. 32(4), pages 605-618, December.
    38. Simplice A. Asongu & Ndemaze Asongu, 2018. "Comparative determinants of quality of growth in developing countries," International Journal of Happiness and Development, Inderscience Enterprises Ltd, vol. 4(1), pages 65-89.
    39. Arayssi, Mahmoud & Fakih, Ali, 2017. "Finance–growth nexus in a changing political region: How important was the Arab Spring?," Economic Analysis and Policy, Elsevier, vol. 55(C), pages 106-123.
    40. Asongu, Simplice, 2015. "Rational Asymmetric Development: Transfer Mispricing and Sub-Saharan Africa’s Extreme Poverty Tragedy," MPRA Paper 71175, University Library of Munich, Germany.
    41. BANDA, Iges & WILLIAMS-ADEYANJU, Zainab & SKRAME, Dea, 2022. "Poverty, Education And Economic Growth: A Case Study Of Western Balkan Countries," Journal of Financial and Monetary Economics, Centre of Financial and Monetary Research "Victor Slavescu", vol. 10(1), pages 30-43, October.
    42. Li, Yuchun & Durani, Farah & Syed, Qasim Raza & Abddel-Jalil Sallam, Osama Azmi, 2024. "Role of minerals rent, geopolitical risk, and economic policy uncertainty in achieving green growth: Evidence from novel wavelet quantile correlation approach," Resources Policy, Elsevier, vol. 93(C).
    43. Mark Edem Kunawotor & Godfred Alufar Bokpin & Charles Barnor, 2020. "Drivers of income inequality in Africa: Does institutional quality matter?," African Development Review, African Development Bank, vol. 32(4), pages 718-729, December.
    44. Davidmac O. Ekeocha & Chimere O. Iheonu, 2021. "Household‐level poverty, consumption poverty thresholds, income inequality and quality of lives in sub‐Saharan Africa," African Development Review, African Development Bank, vol. 33(2), pages 234-248, June.
    45. Asongu, Simplice & Nnanna, Joseph, 2018. "Foreign aid and sustainable inclusive human development in Africa," MPRA Paper 91988, University Library of Munich, Germany.
    46. Amal Jmaii & Damien Rousselière & Christophe Daniel, 2017. "Semi†parametric Regression†based Decomposition Methods: Evidence from Regional Inequality in Tunisia," African Development Review, African Development Bank, vol. 29(4), pages 660-673, December.
    47. Antonella Biscione & Dorothée Boccanfuso & Raul Caruso, 2020. "A Hypothesis on Poverty Change in Albania (2007-2016)," Cahiers de recherche 20-08, Departement d'économique de l'École de gestion à l'Université de Sherbrooke.
    48. Fambeu, Ariel Herbert & Yomi, Patricia Tchawa, 2023. "Is democracy pro poor in Sub-Saharan Africa?," Journal of Policy Modeling, Elsevier, vol. 45(1), pages 10-30.
    49. Hakki Hakan Yilmaz & Ali Sertaç Kanaci, 2021. "Redistribution, Growth and Productivity Relationship in Fiscal Policy in Core and Peripheral Countries," Hacienda Pública Española / Review of Public Economics, IEF, vol. 238(3), pages 61-79, September.
    50. Rasheed O. Alao & Andrew A. Alola, 2022. "The role of foreign aids and income inequality in poverty reduction: A sustainable development approach for Africa?," Journal of Social and Economic Development, Springer;Institute for Social and Economic Change, vol. 24(2), pages 456-469, December.
    51. Mohamed Ali Chroufa & Nouri Chtourou, 2022. "Inequality and Growth in Tunisia: New Evidence from Threshold Regression," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 163(2), pages 901-924, September.
    52. Seher Gülşah Topuz, 2022. "The Relationship Between Income Inequality and Economic Growth: Are Transmission Channels Effective?," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 162(3), pages 1177-1231, August.

  7. Hausken, Kjell & Ncube, Mthuli, 2013. "Quantitative easing, global economic crisis and market response," UiS Working Papers in Economics and Finance 2013/4, University of Stavanger.

    Cited by:

    1. Monica Hernandez, 2023. "An Unintended Consequence of Uncoordinated International Monetary Policy on Central America," International Journal of Political Economy, Taylor & Francis Journals, vol. 52(1), pages 88-103, January.

  8. Hausken, Kjell, 2012. "Strategic defense and attack for series and parallel reliability systems: reply to rejoinder," MPRA Paper 36410, University Library of Munich, Germany.

    Cited by:

    1. Kjell Hausken, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 517-519, October.
    2. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Rejoinder," Purdue University Economics Working Papers 1268, Purdue University, Department of Economics.

  9. Hausken, Kjell & Ncube, Mthuli, 2012. "Production and Conflict in Risky Elections," UiS Working Papers in Economics and Finance 2012/14, University of Stavanger.

    Cited by:

    1. Mthuli Ncube & Basil Jones, 2014. "Working Paper 197 - Estimating the Economic Cost of Fragility in Africa," Working Paper Series 2105, African Development Bank.

  10. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.

    Cited by:

    1. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
    2. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Rejoinder," Purdue University Economics Working Papers 1268, Purdue University, Department of Economics.

  11. Bhimani, Al & Hausken, Kjell & Ncube , Mthuli, 2009. "Agent Takeover Risk of Principal in Outsourcing Relationships," UiS Working Papers in Economics and Finance 2009/2, University of Stavanger.

    Cited by:

    1. Silke Friedrich, 2011. "Policy Persistence and Rent Extraction," ifo Working Paper Series 110, ifo Institute - Leibniz Institute for Economic Research at the University of Munich.
    2. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    3. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.
    4. Silke Friedrich, 2013. "Policy Persistence and Rent Extraction," CESifo Working Paper Series 4325, CESifo.
    5. Rajorshi Sen Gupta, 2018. "Risk Management and Intellectual Property Protection in Outsourcing," Global Business Review, International Management Institute, vol. 19(2), pages 393-406, April.

  12. Hausken, Kjell & Mattli, Walter & Plümper, Thomas, 2006. "Widening versus Deepening of International Unions," MPRA Paper 75882, University Library of Munich, Germany.

    Cited by:

    1. Berglöf, Erik & Friebel, Guido & Burkart, Mike & Paltseva, Elena, 2008. "Widening and Deepening: Reforming the European Union," CEPR Discussion Papers 6672, C.E.P.R. Discussion Papers.
    2. Sunandan Ghosh, 2019. "Enlargement Decisions of Regional Trading Blocs with Asymmetric Members," Working Papers id:12992, eSocialSciences.
    3. Konstantinidis, Nikitas, 2015. "On the political geometry of international unions: A coalition-theoretic approach," Research in Economics, Elsevier, vol. 69(3), pages 453-473.

  13. Kjell Hausken & Jack Hirshleifer, 2005. "Truthful Signalling, The Heritability Paradox, and the Malthusian Equi-Marginal Principle," UCLA Economics Working Papers 842, UCLA Department of Economics.

    Cited by:

    1. Cyrus Chu, C.Y. & Lee, Ronald D., 2012. "Sexual dimorphism and sexual selection: A unified economic analysis," Theoretical Population Biology, Elsevier, vol. 82(4), pages 355-363.
    2. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.

  14. Kjell Hausken & John F. Knutsen, 2004. "An Enabling Mechanism for the Creation, Adjustment, and Dissolution of States and Governmental Units," Public Economics 0409011, University Library of Munich, Germany.

    Cited by:

    1. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.

  15. Kjell Hausken & Jack Hirshleifer, 2003. "The Truthful Signalling Hypothesis: An Economic Approach," Levine's Working Paper Archive 618897000000000808, David K. Levine.

    Cited by:

    1. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    2. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.
    3. Kjell Hausken, 2006. "A General Equilibrium Model of Signaling and Exchange," Levine's Working Paper Archive 618897000000001035, David K. Levine.

  16. Kjell Hausken & John F. Knutsen, 2002. "The Birth, Adjustment and Death of States," Public Economics 0205004, University Library of Munich, Germany.

    Cited by:

    1. Hausken, Kjell & Knutsen, John F., 2010. "An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units," Economics Discussion Papers 2010-6, Kiel Institute for the World Economy (IfW Kiel).

  17. Hausken, Kjell & Plümper, Thomas & Schneider, Gerald, 2002. "The Trilemma of the Protectionist Autocrat: An Assessment of the Political Determinants of Foreign Economic Liberalization," MPRA Paper 75866, University Library of Munich, Germany.

    Cited by:

    1. Oliver Morrissey, 2002. "Recipient Governments' Willingness and Ability to Meet Aid Conditionality: The Effectiveness of Aid Finance and Conditions," WIDER Working Paper Series DP2002-105, World Institute for Development Economic Research (UNU-WIDER).
    2. Oliver Morrissey, 2004. "Conditionality and Aid Effectiveness Re‐evaluated," The World Economy, Wiley Blackwell, vol. 27(2), pages 153-171, February.

  18. Mohr, Matthias & Hausken, Kjell, 1996. "Conflict, interest and strategy: A risk limit approach to conflict," MPIfG Discussion Paper 96/7, Max Planck Institute for the Study of Societies.

    Cited by:

    1. Kjell Hausken, 2007. "Stubbornness, Power, and Equilibrium Selection in Repeated Games with Multiple Equilibria," Theory and Decision, Springer, vol. 62(2), pages 135-160, March.

  19. Hausken, Kjell & Plümper, Thomas, 1996. "Hegemons, leaders and followers: A game-theoretic approach to the postwar dynamics of international political economy," MPIfG Discussion Paper 96/1, Max Planck Institute for the Study of Societies.

    Cited by:

    1. Hausken, Kjell, 1998. "Collective rent seeking and division of labor1," European Journal of Political Economy, Elsevier, vol. 14(4), pages 739-768, November.

Articles

  1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.

    Cited by:

    1. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.

  2. Kjell Hausken, 2023. "Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints," SN Business & Economics, Springer, vol. 3(11), pages 1-18, November.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.

  3. Guizhou Wang & Kjell Hausken, 2022. "A Generalized Interest Rates Model with Scaling," International Journal of Economics and Financial Issues, Econjournals, vol. 12(5), pages 143-150, September.

    Cited by:

    1. Guizhou Wang & Kjell Hausken, 2023. "Modeling which Factors Impact Interest Rates," Journal of Central Banking Theory and Practice, Central bank of Montenegro, vol. 12(2), pages 211-237.

  4. Guizhou Wang & Kjell Hausken, 2022. "A Bitcoin price prediction model assuming oscillatory growth and lengthening cycles," Cogent Economics & Finance, Taylor & Francis Journals, vol. 10(1), pages 2087287-208, December.

    Cited by:

    1. Hyeonoh Kim & Eojin Yi & Jooyoung Jeon & Taeyoung Park & Kwangwon Ahn, 2024. "After the Split: Market Efficiency of Bitcoin Cash," Computational Economics, Springer;Society for Computational Economics, vol. 64(1), pages 411-427, July.
    2. Bhaskar Tripathi & Rakesh Kumar Sharma, 2023. "Modeling Bitcoin Prices using Signal Processing Methods, Bayesian Optimization, and Deep Neural Networks," Computational Economics, Springer;Society for Computational Economics, vol. 62(4), pages 1919-1945, December.

  5. Guizhou Wang & Kjell Hausken, 2022. "Interest Rates, the Taylor Rule, the Quantity Equation, and the Phillips Curve," Eurasian Journal of Economics and Finance, Eurasian Publications, vol. 10(3), pages 83-93.

    Cited by:

    1. Guizhou Wang & Kjell Hausken, 2023. "Modeling which Factors Impact Interest Rates," Journal of Central Banking Theory and Practice, Central bank of Montenegro, vol. 12(2), pages 211-237.
    2. Guizhou Wang & Kjell Hausken, 2022. "A Generalized Interest Rates Model with Scaling," International Journal of Economics and Financial Issues, Econjournals, vol. 12(5), pages 143-150, September.

  6. Bhimani, Alnoor & Hausken, Kjell & Arif, Sameen, 2022. "Do national development factors affect cryptocurrency adoption?," Technological Forecasting and Social Change, Elsevier, vol. 181(C).
    See citations under working paper version above.
  7. Guizhou Wang & Kjell Hausken, 2022. "A game between central banks and households involving central bank digital currencies, other digital currencies and negative interest rates," Cogent Economics & Finance, Taylor & Francis Journals, vol. 10(1), pages 2114178-211, December.

    Cited by:

    1. Cotugno, Matteo & Manta, Francesco & Perdichizzi, Salvatore & Stefanelli, Valeria, 2024. "Ready for a digital Euro? Insights from a research agenda," Research in International Business and Finance, Elsevier, vol. 67(PA).
    2. Guizhou Wang & Kjell Hausken, 2023. "Modeling which Factors Impact Interest Rates," Journal of Central Banking Theory and Practice, Central bank of Montenegro, vol. 12(2), pages 211-237.
    3. Wang, Zhan-ao & Samuel, Ribeiro-Navarrete & Chen, Xiao-qian & Xu, Bing & Huang, Wei-lun, 2023. "Central bank digital currencies: Consumer data-driven sustainable operation management policy," Technological Forecasting and Social Change, Elsevier, vol. 196(C).
    4. Zhang, Runze & Li, Zhijun & Xiao, Chunqu & You, Jiwang, 2023. "New engines of economic growth: How digital currencies lead the way to growth in the era of digital economy," Economic Analysis and Policy, Elsevier, vol. 80(C), pages 1597-1617.
    5. Wang, Guizhou & Hausken, Kjell, 2024. "Hard money and fiat money in an inflationary world," Research in International Business and Finance, Elsevier, vol. 67(PB).

  8. Kjell Hausken, 2021. "Axiomatizing additive multi-effort contests," SN Business & Economics, Springer, vol. 1(11), pages 1-12, November.

    Cited by:

    1. Kjell Hausken, 2023. "Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints," SN Business & Economics, Springer, vol. 3(11), pages 1-18, November.

  9. Hausken, Kjell, 2021. "The precautionary principle as multi-period games where players have different thresholds for acceptable uncertainty," Reliability Engineering and System Safety, Elsevier, vol. 206(C).

    Cited by:

    1. Chen, Chao & Yang, Ming & Reniers, Genserik, 2021. "A dynamic stochastic methodology for quantifying HAZMAT storage resilience," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
    2. Iaiani, Matteo & Tugnoli, Alessandro & Macini, Paolo & Cozzani, Valerio, 2021. "Outage and asset damage triggered by malicious manipulation of the control system in process plants," Reliability Engineering and System Safety, Elsevier, vol. 213(C).
    3. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).

  10. Kjell Hausken, 2021. "Governments Playing Games and Combating the Dynamics of a Terrorist Organization," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 23(02), pages 1-26, June.

    Cited by:

    1. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).

  11. Guizhou Wang & Kjell Hausken, 2021. "Conventionalists, Pioneers and Criminals Choosing Between a National Currency and a Global Currency," Journal of Banking and Financial Economics, University of Warsaw, Faculty of Management, vol. 2(16), pages 104-133, December.

    Cited by:

    1. Patroklos Patsoulis & Marios Psychalis & Georgios A. Deirmentzoglou, 2022. "Stability and Growth Pact: Too Young to Die, Too Old to Rock ‘n’ Roll," JRFM, MDPI, vol. 15(12), pages 1-12, December.
    2. Wang, Guizhou & Hausken, Kjell, 2024. "Hard money and fiat money in an inflationary world," Research in International Business and Finance, Elsevier, vol. 67(PB).

  12. Guizhou Wang & Kjell Hausken, 2021. "Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency," Games, MDPI, vol. 12(2), pages 1-24, April.

    Cited by:

    1. Zhang, Runze & Li, Zhijun & Xiao, Chunqu & You, Jiwang, 2023. "New engines of economic growth: How digital currencies lead the way to growth in the era of digital economy," Economic Analysis and Policy, Elsevier, vol. 80(C), pages 1597-1617.
    2. Monika Eisenbardt & Tomasz Eisenbardt, 2023. "Can Cryptocurrencies Be Feasibly Adopted as a National Currency? The Perspective of the Younger Generation," European Research Studies Journal, European Research Studies Journal, vol. 0(2), pages 463-481.
    3. Wang, Guizhou & Hausken, Kjell, 2024. "Hard money and fiat money in an inflationary world," Research in International Business and Finance, Elsevier, vol. 67(PB).
    4. Goel, Rajeev K. & Mazhar, Ummad, 2024. "Cryptocurrency use and tax collections: Direct and indirect channels of influence," Journal of Financial Stability, Elsevier, vol. 72(C).
    5. Bhaskar, Ratikant & Hunjra, Ahmed Imran & Bansal, Shashank & Pandey, Dharen Kumar, 2022. "Central Bank Digital Currencies: Agendas for future research," Research in International Business and Finance, Elsevier, vol. 62(C).

  13. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.

  14. Mthuli Ncube & Kazbi Soonawalla & Kjell Hausken, 2021. "The Links between Business Environment, Economic Growth and Social Equity: A Study of African Countries," Journal of African Business, Taylor & Francis Journals, vol. 22(1), pages 61-84, January.

    Cited by:

    1. Simplice Asongu, 2024. "Fighting female unemployment: the role of female ownership of bank accounts in complementing female inclusive education," Journal of Entrepreneurship and Public Policy, Emerald Group Publishing Limited, vol. 13(3), pages 372-390, April.
    2. Waseem Ul Hameed & Asifa Jahangir & Ali Junaid Khan & Jawad Iqbal, 2022. "How to Develop Social Equity for Consumers? A Technology-Based Framework," iRASD Journal of Economics, International Research Alliance for Sustainable Development (iRASD), vol. 4(2), pages 173-186, June.
    3. Sara Casagrande & Bruno Dallago, 2022. "To Be, or Not to Be: The Role of Self-Perception in European Countries’ Performance Assessment," Sustainability, MDPI, vol. 14(20), pages 1-23, October.

  15. Kjell Hausken, 2020. "Modeling the evolution of countries and ethnic groups," International Journal of Modern Physics C (IJMPC), World Scientific Publishing Co. Pte. Ltd., vol. 31(01), pages 1-15, January.

    Cited by:

    1. Julide Yazar & Robert J. Gitter, 2023. "Border Games: A Game Theoretic Model of Undocumented Immigration," Games, MDPI, vol. 14(5), pages 1-19, August.

  16. Kjell Hausken & Mthuli Ncube, 2020. "Game Theoretic Analysis of Insurgent Attacks, Government Protection, and International Intervention," International Journal of Strategic Decision Sciences (IJSDS), IGI Global, vol. 11(1), pages 56-75, January.

    Cited by:

    1. Kjell Hausken and & Ncube, Mthuli, 2019. "Insurgent attacks, government protection, and international intervention," International Journal of Development and Conflict, Gokhale Institute of Politics and Economics, vol. 9(2), pages 142-175.

  17. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.

  18. Kjell Hausken, 2020. "Additive multi-effort contests," Theory and Decision, Springer, vol. 89(2), pages 203-248, September.
    See citations under working paper version above.
  19. Kjell Hausken, 2020. "Game theoretic analysis of ideologically biased clickbait or fake news and real news," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(2), pages 39-57.

    Cited by:

    1. Daniel Menció-Padrón & Gemayqzel Bouza-Allende, 2023. "Simulating the propagation of rumours with spreaders of distinct characters," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 33(3), pages 75-87.

  20. Kjell Hausken, 2020. "The Shapley value of coalitions to other coalitions," Palgrave Communications, Palgrave Macmillan, vol. 7(1), pages 1-10, December.

    Cited by:

    1. Tobias Hiller, 2023. "Measuring the Difficulties in Forming a Coalition Government," Games, MDPI, vol. 14(2), pages 1-15, March.
    2. Zhengxing Zou & René Brink & Yukihiko Funaki, 2022. "Sharing the surplus and proportional values," Theory and Decision, Springer, vol. 93(1), pages 185-217, July.

  21. Kjell Hausken, 2020. "Additive multi-effort contests with multiple investment opportunities," Applied Economics Letters, Taylor & Francis Journals, vol. 27(1), pages 67-71, January.

    Cited by:

    1. Hausken, Kjell, 2016. "Additive Multi-Effort Contests," UiS Working Papers in Economics and Finance 2016/2, University of Stavanger.

  22. Kjell Hausken, 2019. "Defence and attack of complex interdependent systems," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(3), pages 364-376, March.

    Cited by:

    1. Valcamonico, Dario & Sansavini, Giovanni & Zio, Enrico, 2020. "Cooperative co-evolutionary approach to optimize recovery for improving resilience in multi-communities," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    2. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    3. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    4. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    5. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    6. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    7. Gabriel Kuper & Fabio Massacci & Woohyun Shim & Julian Williams, 2020. "Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1001-1019, May.
    8. Baraldi, Piero & Castellano, Andrea & Shokry, Ahmed & Gentile, Ugo & Serio, Luigi & Zio, Enrico, 2020. "A Feature Selection-based Approach for the Identification of Critical Components in Complex Technical Infrastructures: Application to the CERN Large Hadron Collider," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    9. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    10. Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
    11. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    12. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    13. Gatmiry, Zohreh S. & Hafezalkotob, Ashkan & Khakzar bafruei, Morteza & Soltani, Roya, 2021. "Food web conservation vs. strategic threats: A security game approach," Ecological Modelling, Elsevier, vol. 442(C).
    14. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    15. Almoghathawi, Yasser & Selim, Shokri & Barker, Kash, 2023. "Community structure recovery optimization for partial disruption, functionality, and restoration in interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    16. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    17. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).

  23. Mthuli Ncube & Kjell Hausken, 2019. "Evidence On The Troubled Assets Relief Program, Bailout Size, Returns And Tail Risk," The International Journal of Business and Finance Research, The Institute for Business and Finance Research, vol. 13(2), pages 1-20.

    Cited by:

    1. Mthuli Ncube & Kjell Hausken, 2019. "Evidence On The Impact Of The Troubled Assets Relief Program On Stock Returns," The International Journal of Business and Finance Research, The Institute for Business and Finance Research, vol. 13(1), pages 1-30.

  24. Kjell Hausken & John F. Moxnes, 2019. "Innovation, Development and National Indices," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 141(3), pages 1165-1188, February.

    Cited by:

    1. Marta Kuc-Czarnecka & Samuele Lo Piano & Andrea Saltelli, 2020. "Quantitative Storytelling in the Making of a Composite Indicator," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 149(3), pages 775-802, June.
    2. Marlo M. Vernon & C. Makenzie Danley & Frances M. Yang, 2021. "Developing a measure of innovation from research in higher education data," Scientometrics, Springer;Akadémiai Kiadó, vol. 126(5), pages 3919-3928, May.

  25. Hausken, Kjell, 2019. "The dynamics of terrorist organizations," Operations Research Perspectives, Elsevier, vol. 6(C).

    Cited by:

    1. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    2. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.

  26. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.

    Cited by:

    1. Iny Hwang & Youngsoo Kim & Michael K. Lim, 2023. "Optimal Ratcheting in Executive Compensation," Decision Analysis, INFORMS, vol. 20(2), pages 166-185, June.

  27. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Abdolmajid Yolmeh & Melike Baykal-Gürsoy & Vicki Bier, 2023. "A decomposable resource allocation model with generalized overarching protections," Annals of Operations Research, Springer, vol. 320(1), pages 493-507, January.
    3. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.

  28. Mthuli Ncube & Kjell Hausken, 2019. "Evidence On The Impact Of The Troubled Assets Relief Program On Stock Returns," The International Journal of Business and Finance Research, The Institute for Business and Finance Research, vol. 13(1), pages 1-30.

    Cited by:

    1. Mthuli Ncube & Kjell Hausken, 2019. "Evidence On The Troubled Assets Relief Program, Bailout Size, Returns And Tail Risk," The International Journal of Business and Finance Research, The Institute for Business and Finance Research, vol. 13(2), pages 1-20.

  29. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.

    Cited by:

    1. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    2. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    3. Hausken, Kjell, 2019. "The dynamics of terrorist organizations," Operations Research Perspectives, Elsevier, vol. 6(C).

  30. Kjell Hausken, 2019. "A Game Theoretic Model of Adversaries and Media Manipulation," Games, MDPI, vol. 10(4), pages 1-15, December.

    Cited by:

    1. Kjell Hausken, 2020. "Game theoretic analysis of ideologically biased clickbait or fake news and real news," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(2), pages 39-57.

  31. Kjell Hausken, 2018. "A cost–benefit analysis of terrorist attacks," Defence and Peace Economics, Taylor & Francis Journals, vol. 29(2), pages 111-129, February.

    Cited by:

    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Grant, Matthew J. & Stewart, Mark G., 2017. "Modelling improvised explosive device attacks in the West – Assessing the hazard," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 345-354.
    4. Halkos, George & Managi, Shunsuke & Zisiadou, Argyro, 2017. "Analyzing the determinants of terrorist attacks and their market reactions," Economic Analysis and Policy, Elsevier, vol. 54(C), pages 57-73.
    5. Hausken, Kjell, 2021. "The precautionary principle as multi-period games where players have different thresholds for acceptable uncertainty," Reliability Engineering and System Safety, Elsevier, vol. 206(C).
    6. Halkos, George & Zisiadou, Argyro, 2016. "Exploring the effect of terrorist attacks on markets," MPRA Paper 71877, University Library of Munich, Germany.
    7. Bin Mai & Shailesh Kulkarni, 2018. "When Hackers Err: The Impacts of False Positives on Information Security Games," Decision Analysis, INFORMS, vol. 15(2), pages 90-109, June.
    8. Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
    9. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    10. Jaspersen, Johannes G. & Montibeller, Gilberto, 2020. "On the learning patterns and adaptive behavior of terrorist organizations," European Journal of Operational Research, Elsevier, vol. 282(1), pages 221-234.
    11. Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
    12. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    13. Chen, Chao & Reniers, Genserik & Khakzad, Nima, 2019. "Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: A dynamic graph approach," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    14. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    15. Daniel G. Arce, 2019. "On the human consequences of terrorism," Public Choice, Springer, vol. 178(3), pages 371-396, March.
    16. Kjell Hausken, 2020. "Game theoretic analysis of ideologically biased clickbait or fake news and real news," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(2), pages 39-57.

  32. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.

    Cited by:

    1. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    4. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    5. William N. Caballero & Ethan Gharst & David Banks & Jeffery D. Weir, 2023. "Multipolar Security Cooperation Planning: A Multiobjective, Adversarial-Risk-Analysis Approach," Decision Analysis, INFORMS, vol. 20(1), pages 16-39, March.
    6. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    7. Ali Pala & Jun Zhuang, 2019. "Information Sharing in Cybersecurity: A Review," Decision Analysis, INFORMS, vol. 16(3), pages 172-196, September.

  33. Kjell Hausken & Mthuli Ncube, 2018. "Service delivery weaknesses within education and healthcare: Applying empirics from Kenya, Uganda, Tanzania, and Senegal," Review of Development Economics, Wiley Blackwell, vol. 22(1), pages 133-147, February.

    Cited by:

    1. Kjell Hausken & Mthuli Ncube, 2018. "Service Delivery versus Moonlighting: Using Data from Kenya, Uganda, Tanzania and Senegal," African Development Review, African Development Bank, vol. 30(2), pages 219-232, June.

  34. Kjell Hausken & Mthuli Ncube, 2018. "Policy makers, the international community and people living with HIV/AIDS: the need for new commitment mechanisms," International Journal of Public Policy, Inderscience Enterprises Ltd, vol. 14(3/4), pages 275-301.

    Cited by:

    1. Kjell Hausken & Mthuli Ncube, 2020. "Game theoretic analysis of persons, the pharmaceutical industry, and donors in disease contraction and recovery," Palgrave Communications, Palgrave Macmillan, vol. 7(1), pages 1-17, December.

  35. Kjell Hausken, 2018. "Formalizing the Precautionary Principle Accounting for Strategic Interaction, Natural Factors, and Technological Factors," Risk Analysis, John Wiley & Sons, vol. 38(10), pages 2055-2072, October.

    Cited by:

    1. Hausken, Kjell, 2021. "The precautionary principle as multi-period games where players have different thresholds for acceptable uncertainty," Reliability Engineering and System Safety, Elsevier, vol. 206(C).
    2. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    3. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.

  36. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    3. Rana Alabdan, 2020. "Phishing Attacks Survey: Types, Vectors, and Technical Approaches," Future Internet, MDPI, vol. 12(10), pages 1-37, September.
    4. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    5. Iaiani, Matteo & Tugnoli, Alessandro & Macini, Paolo & Cozzani, Valerio, 2021. "Outage and asset damage triggered by malicious manipulation of the control system in process plants," Reliability Engineering and System Safety, Elsevier, vol. 213(C).
    6. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    7. Kjell Hausken, 2018. "Formalizing the Precautionary Principle Accounting for Strategic Interaction, Natural Factors, and Technological Factors," Risk Analysis, John Wiley & Sons, vol. 38(10), pages 2055-2072, October.
    8. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    9. Ali Pala & Jun Zhuang, 2019. "Information Sharing in Cybersecurity: A Review," Decision Analysis, INFORMS, vol. 16(3), pages 172-196, September.
    10. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).

  37. Jonathan William Welburn & Kjell Hausken, 2017. "Game Theoretic Modeling of Economic Systems and the European Debt Crisis," Computational Economics, Springer;Society for Computational Economics, vol. 49(2), pages 177-226, February.

    Cited by:

    1. Hausken, Kjell & Welburn, Jonathan W., 2024. "Debt crises between a country and an international lender as a two-period game," International Review of Economics & Finance, Elsevier, vol. 92(C), pages 704-723.
    2. Jonathan W. Welburn, 2020. "Crises Beyond Belief: Findings on Contagion, the Role of Beliefs, and the Eurozone Debt Crisis from a Borrower–Lender Game," Computational Economics, Springer;Society for Computational Economics, vol. 56(2), pages 263-317, August.
    3. Guizhou Wang & Kjell Hausken, 2021. "Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency," Games, MDPI, vol. 12(2), pages 1-24, April.
    4. Anubha Goel & Aparna Mehra, 2019. "Analyzing Contagion Effect in Markets During Financial Crisis Using Stochastic Autoregressive Canonical Vine Model," Computational Economics, Springer;Society for Computational Economics, vol. 53(3), pages 921-950, March.
    5. Wang, Guizhou & Hausken, Kjell, 2024. "Hard money and fiat money in an inflationary world," Research in International Business and Finance, Elsevier, vol. 67(PB).

  38. Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    3. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    4. Pramod C. Mane & Nagarajan Krishnamurthy & Kapil Ahuja, 2019. "Formation of Stable and Efficient Social Storage Cloud," Games, MDPI, vol. 10(4), pages 1-17, November.
    5. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    6. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    7. Ali Pala & Jun Zhuang, 2019. "Information Sharing in Cybersecurity: A Review," Decision Analysis, INFORMS, vol. 16(3), pages 172-196, September.
    8. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).

  39. Kjell Hausken & Mthuli Ncube, 2017. "Policy makers, the international community and the population in the prevention and treatment of diseases: case study on HIV/AIDS," Health Economics Review, Springer, vol. 7(1), pages 1-12, December.

    Cited by:

    1. Kjell Hausken & Mthuli Ncube, 2020. "Game theoretic analysis of persons, the pharmaceutical industry, and donors in disease contraction and recovery," Palgrave Communications, Palgrave Macmillan, vol. 7(1), pages 1-17, December.

  40. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.

    Cited by:

    1. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    2. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    3. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    4. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    5. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    6. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    7. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    8. Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
    9. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    10. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
    11. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    12. Gatmiry, Zohreh S. & Hafezalkotob, Ashkan & Khakzar bafruei, Morteza & Soltani, Roya, 2021. "Food web conservation vs. strategic threats: A security game approach," Ecological Modelling, Elsevier, vol. 442(C).
    13. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).

  41. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.

    Cited by:

    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Raheleh Khanduzi & İhsan Sadati & Vahid Akbari, 2024. "A bilevel hierarchical covering model to protect a healthcare network against failures," Operational Research, Springer, vol. 24(4), pages 1-40, December.
    3. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    5. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    6. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    7. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    8. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    9. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    10. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    11. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    12. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    13. Hannah Lobban & Yasser Almoghathawi & Nazanin Tajik & Kash Barker, 2021. "Community vulnerability perspective on robust protection planning in interdependent infrastructure networks," Journal of Risk and Reliability, , vol. 235(5), pages 798-813, October.
    14. Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
    15. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    16. Fang, Yi-Ping & Zio, Enrico, 2019. "An adaptive robust framework for the optimization of the resilience of interdependent infrastructures under natural hazards," European Journal of Operational Research, Elsevier, vol. 276(3), pages 1119-1136.
    17. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.
    18. Gabriel Kuper & Fabio Massacci & Woohyun Shim & Julian Williams, 2020. "Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1001-1019, May.
    19. Zhang, Xiaoyu & Xu, Maochao & Da, Gaofeng & Zhao, Peng, 2021. "Ensuring confidentiality and availability of sensitive data over a network system under cyber threats," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    20. Evans B. Sansolis & Carmenda S. Leonoras, 2021. "Viability of a technology-based education afterschool program," Technium Social Sciences Journal, Technium Science, vol. 19(1), pages 76-100, May.
    21. Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
    22. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    23. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    24. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    25. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    26. Gatmiry, Zohreh S. & Hafezalkotob, Ashkan & Khakzar bafruei, Morteza & Soltani, Roya, 2021. "Food web conservation vs. strategic threats: A security game approach," Ecological Modelling, Elsevier, vol. 442(C).
    27. Ouyang, Min, 2017. "A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1072-1084.
    28. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    29. Almoghathawi, Yasser & Selim, Shokri & Barker, Kash, 2023. "Community structure recovery optimization for partial disruption, functionality, and restoration in interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    30. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    31. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Optimal defense of a distributed data storage system against hackers’ attacks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).

  42. Kjell HAUSKEN, 2016. "The Ranking of Researchers by Publications and Citations: Using RePEc Data," Journal of Economics Bibliography, KSP Journals, vol. 3(4), pages 530-558, December.

    Cited by:

    1. Nadia Simoes & Nuno Crespo, 2020. "A flexible approach for measuring author-level publishing performance," Scientometrics, Springer;Akadémiai Kiadó, vol. 122(1), pages 331-355, January.
    2. Marlo M. Vernon & C. Makenzie Danley & Frances M. Yang, 2021. "Developing a measure of innovation from research in higher education data," Scientometrics, Springer;Akadémiai Kiadó, vol. 126(5), pages 3919-3928, May.
    3. Mark Levene & Martyn Harris & Trevor Fenner, 2020. "A two-dimensional bibliometric index reflecting both quality and quantity," Scientometrics, Springer;Akadémiai Kiadó, vol. 123(3), pages 1235-1246, June.

  43. Kjell Hausken & Dipak K. Gupta, 2016. "Determining the ideological orientation of terrorist organisations: the effects of government repression and organised crime," International Journal of Public Policy, Inderscience Enterprises Ltd, vol. 12(1/2), pages 71-97.

    Cited by:

    1. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    2. Hausken, Kjell, 2019. "The dynamics of terrorist organizations," Operations Research Perspectives, Elsevier, vol. 6(C).
    3. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.

  44. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.

    Cited by:

    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Thöns, Sebastian & Stewart, Mark G., 2019. "On decision optimality of terrorism risk mitigation measures for iconic bridges," Reliability Engineering and System Safety, Elsevier, vol. 188(C), pages 574-583.
    3. Chen, Chao & Yang, Ming & Reniers, Genserik, 2021. "A dynamic stochastic methodology for quantifying HAZMAT storage resilience," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
    4. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    5. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    6. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    7. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    8. Grant, Matthew J. & Stewart, Mark G., 2017. "Modelling improvised explosive device attacks in the West – Assessing the hazard," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 345-354.
    9. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    10. Gabriel Kuper & Fabio Massacci & Woohyun Shim & Julian Williams, 2020. "Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1001-1019, May.
    11. Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
    12. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    13. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    14. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    15. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    16. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    17. Fabrizio Baiardi & Federico Tonelli & Alessandro Bertolini, 2015. "Iterative selection of countermeasures for intelligent threat agents," International Journal of Network Management, John Wiley & Sons, vol. 25(5), pages 340-354, September.
    18. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).

  45. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.

    Cited by:

    1. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.
    2. Vicki M. Bier & Yuqun Zhou & Hongru Du, 2020. "Game-theoretic modeling of pre-disaster relocation," The Engineering Economist, Taylor & Francis Journals, vol. 65(2), pages 89-113, April.
    3. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    4. Dennis Fok & André Stel & Andrew Burke & Roy Thurik, 2019. "How entry crowds and grows markets: the gradual disaster management view of market dynamics in the retail industry," Annals of Operations Research, Springer, vol. 283(1), pages 1111-1138, December.
    5. John B. Coles & Jing Zhang & Jun Zhuang, 2022. "Bridging the research-practice gap in disaster relief: using the IFRC Code of Conduct to develop an aid model," Annals of Operations Research, Springer, vol. 312(2), pages 1337-1357, May.
    6. Shitao Gong & Xin Gao & Zhou Li & Linyan Chen, 2021. "Developing a Dynamic Supervision Mechanism to Improve Construction Safety Investment Supervision Efficiency in China: Theoretical Simulation of Evolutionary Game Process," IJERPH, MDPI, vol. 18(7), pages 1-29, March.
    7. Wenxin Su & Xin Gao & Yukun Jiang & Jinrong Li, 2021. "Developing a Construction Safety Standard System to Enhance Safety Supervision Efficiency in China: A Theoretical Simulation of the Evolutionary Game Process," Sustainability, MDPI, vol. 13(23), pages 1-22, December.
    8. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    9. Kyle H. Goldschmidt & Sameer Kumar, 2019. "Reducing the cost of humanitarian operations through disaster preparation and preparedness," Annals of Operations Research, Springer, vol. 283(1), pages 1139-1152, December.
    10. Wen Li & Tong Zhou & Qiang Mei & Xiangyang Liu & Muhammad Imran, 2023. "Evolution of micro and small enterprises’ work safety behavior in high-risk industries," Small Business Economics, Springer, vol. 60(1), pages 85-104, January.
    11. Liangdong Lu & Hong Huang & Jiuchang Wei & Jia Xu, 2020. "Safety Regulations and the Uncertainty of Work‐Related Road Accident Loss: The Triple Identity of Chinese Local Governments Under Principal–Agent Framework," Risk Analysis, John Wiley & Sons, vol. 40(6), pages 1168-1182, June.
    12. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Niki Matinrad, 2016. "Disaster Management from a POM Perspective: Mapping a New Domain," Production and Operations Management, Production and Operations Management Society, vol. 25(10), pages 1611-1637, October.
    13. Bo Shao & Zhigen Hu & Dawei Liu, 2019. "Using Improved Principal Component Analysis to Explore Construction Accident Situations from the Multi-Dimensional Perspective: A Chinese Study," IJERPH, MDPI, vol. 16(18), pages 1-18, September.
    14. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    15. Zongjie Pi & Xin Gao & Linyan Chen & Jinghua Liu, 2019. "The New Path to Improve Construction Safety Performance in China: An Evolutionary Game Theoretic Approach," IJERPH, MDPI, vol. 16(13), pages 1-24, July.
    16. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.

  46. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    3. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.

  47. Kjell Hausken & Dipak K. Gupta, 2015. "Government protection against terrorism and crime," Global Crime, Taylor & Francis Journals, vol. 16(2), pages 59-80, April.

    Cited by:

    1. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    2. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    3. Hausken, Kjell, 2019. "The dynamics of terrorist organizations," Operations Research Perspectives, Elsevier, vol. 6(C).
    4. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.

  48. Welburn, Jonathan W. & Hausken, Kjell, 2015. "A game theoretic model of economic crises," Applied Mathematics and Computation, Elsevier, vol. 266(C), pages 738-762.
    See citations under working paper version above.
  49. Kjell Hausken & Sheheryar Banuri & Dipak Gupta & Klaus Abbink, 2015. "Al Qaeda at the bar: coordinating ideologues and mercenaries in terrorist organizations," Public Choice, Springer, vol. 164(1), pages 57-73, July.

    Cited by:

    1. Kjell Hausken & Dipak K. Gupta, 2016. "Determining the ideological orientation of terrorist organisations: the effects of government repression and organised crime," International Journal of Public Policy, Inderscience Enterprises Ltd, vol. 12(1/2), pages 71-97.
    2. Ryoji Makino & Kenju Akai & Jun-ichi Takeshita & Takanori Kudo & Keiko Aoki, 2021. "Effect of disclosing the relation between effort and unit reliability on system reliability: An economic experiment," PLOS ONE, Public Library of Science, vol. 16(4), pages 1-18, April.
    3. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    4. Hausken, Kjell, 2019. "The dynamics of terrorist organizations," Operations Research Perspectives, Elsevier, vol. 6(C).
    5. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.

  50. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.

    Cited by:

    1. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    2. Subhasish M. Chowdhury & Dan Kovenock & David Rojo Arjona & Nathaniel T. Wilcox, 2016. "Focality and Asymmetry in Multi-battle Contests," Working Papers 16-16, Chapman University, Economic Science Institute.
    3. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    5. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    6. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    7. Abdolmajid Yolmeh & Melike Baykal-Gürsoy & Vicki Bier, 2023. "A decomposable resource allocation model with generalized overarching protections," Annals of Operations Research, Springer, vol. 320(1), pages 493-507, January.
    8. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    9. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    10. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    11. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.

  51. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.

    Cited by:

    1. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    2. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    3. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    4. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    5. Shan, Xiaojun Gene & Zhuang, Jun, 2020. "A game-theoretic approach to modeling attacks and defenses of smart grids at three levels," Reliability Engineering and System Safety, Elsevier, vol. 195(C).
    6. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    7. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    8. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    9. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    10. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    11. Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
    12. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    13. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    14. Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
    15. Wu, Di & Liu, Xiang-dong & Yan, Xiang-bin & Peng, Rui & Li, Gang, 2019. "Equilibrium analysis of bitcoin block withholding attack: A generalized model," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 318-328.
    16. Dui, Hongyan & Si, Shubin & Wu, Shaomin & Yam, Richard C.M., 2017. "An importance measure for multistate systems with external factors," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 49-57.
    17. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
    18. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    19. Almoghathawi, Yasser & Selim, Shokri & Barker, Kash, 2023. "Community structure recovery optimization for partial disruption, functionality, and restoration in interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    20. Cao, Minhao & Guo, Jianjun & Xiao, Hui & Wu, Liang, 2022. "Reliability analysis and optimal generator allocation and protection strategy of a non-repairable power grid system," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
    21. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).

  52. Kjell Hausken & Mthuli Ncube, 2014. "Determinants of Election Outcomes: New Evidence from Africa," African Development Review, African Development Bank, vol. 26(4), pages 610-630, December.

    Cited by:

    1. Olayemi M. Olabiyi, 2020. "Electoral participation and household food insecurity in sub‐Saharan Africa," African Development Review, African Development Bank, vol. 32(3), pages 392-403, September.
    2. Tugba Zeydanli, 2017. "Elections and Subjective Living Conditions in Sub†Saharan Africa," African Development Review, African Development Bank, vol. 29(4), pages 545-561, December.

  53. Mthuli Ncube & John C. Anyanwu & Kjell Hausken, 2014. "Inequality, Economic Growth and Poverty in the Middle East and North Africa (MENA)," African Development Review, African Development Bank, vol. 26(3), pages 435-453, September.

    Cited by:

    1. Simplice Asongu & Uchenna Efobi & Ibukun Beecroft, 2015. "Inclusive Human Development in Pre-crisis Times of Globalization-driven Debts," African Development Review, African Development Bank, vol. 27(4), pages 428-442, December.
    2. Simplice A. Asongu & Jacinta C. Nwachukwu, 2016. "Mobile Phone Penetration, Mobile Banking and Inclusive Development in Africa," The African Finance Journal, Africagrowth Institute, vol. 18(1), pages 34-52.
    3. Simplice A. Asongu & Jacinta C. Nwachukwu, 2017. "Foreign Aid and Inclusive Development: Updated Evidence from Africa, 2005–2012," Social Science Quarterly, Southwestern Social Science Association, vol. 98(1), pages 282-298, March.
    4. Mark Edem Kunawotor & Charles Barnor & Raymond Dziwornu, 2021. "The Income Redistributive Effects of Taxes in Africa," Economics Bulletin, AccessEcon, vol. 41(3), pages 1579-1591.
    5. Joseph I. Uduji & Elda N. Okolo-Obasi & Simplice A. Asongu, 2019. "Growth Enhancement Support Scheme (GESS) and Farmers’ Fertilizer Use in Rural Nigeria," Working Papers 19/055, European Xtramile Centre of African Studies (EXCAS).
    6. Simplice A. Asongu & Nicholas M. Odhiambo, 2018. "ICT, Financial Access and Gender Inclusion in the Formal Economic Sector: Evidence from Africa," Research Africa Network Working Papers 18/058, Research Africa Network (RAN).
    7. Oasis Kodila-Tedika & Simplice A. Asongu & Julio Mukendi Kayembe, 2014. "Middle class in Africa: Determinants and Consequences," Research Africa Network Working Papers 14/026, Research Africa Network (RAN).
    8. Simplice A. Asongu & Nicholas M. Odhiambo, 2018. "How Enhancing Information and Communication Technology has affected Inequality in Africa for Sustainable Development: An Empirical Investigation," AFEA Working Papers 18/045, African Finance and Economic Association (AFEA).
    9. Simplice A. Asongu & Jacinta C. Nwachukwu, 2017. "Quality of Growth Empirics: Comparative Gaps, Benchmarking and Policy Syndromes," Research Africa Network Working Papers 17/034, Research Africa Network (RAN).
    10. Simplice Asongu & Rexon Nting, 2020. "The comparative economics of financial access in gender economic inclusion," African Journal of Economic and Management Studies, Emerald Group Publishing Limited, vol. 12(2), pages 193-207, December.
    11. Kouadio, Hugues Kouassi & Gakpa, Lewis-Landry, 2022. "Do economic growth and institutional quality reduce poverty and inequality in West Africa?," Journal of Policy Modeling, Elsevier, vol. 44(1), pages 41-63.
    12. Obadiah Jonathan Gimba & Mehdi Seraj & Huseyin Ozdeser, 2021. "What drives income inequality in sub‐Saharan Africa and its sub‐regions? An examination of long‐run and short‐run effects," African Development Review, African Development Bank, vol. 33(4), pages 729-741, December.
    13. Joseph I. Uduji & Elda N. Okolo-Obasi & Simplice A. Asongu, 2019. "Growth Enhancement Support Scheme (GESS) and Farmers’ Fertilizer Use in Rural Nigeria," Working Papers of the African Governance and Development Institute. 19/055, African Governance and Development Institute..
    14. Simplice A. Asongu & Stella-Maris I. Orim & Rexon T. Nting, 2019. "Inequality, Information Technology and Inclusive Education in Sub-Saharan Africa," Working Papers of the African Governance and Development Institute. 19/035, African Governance and Development Institute..
    15. Asongu, Simplice & Nwachukwu, Jacinta, 2016. "Globalization and Inclusive Human Development in Africa," MPRA Paper 78140, University Library of Munich, Germany.
    16. Asongu, Simplice & Odhiambo, Nicholas, 2019. "Foreign Aid Complementarities and Inclusive Human Development in Africa," MPRA Paper 101086, University Library of Munich, Germany.
    17. Simplice Asongu, 2014. "A brief clarification to the questionable economics of foreign aid for inclusive human development," Working Papers of the African Governance and Development Institute. 14/028, African Governance and Development Institute..
    18. Simplice A. Asongu & Joseph Nnanna & Paul N. Acha-Anyi, 2019. "Inequality and gender economic inclusion: the moderating role of financial access in Sub-Saharan Africa," Working Papers 19/099, European Xtramile Centre of African Studies (EXCAS).
    19. Kwami Ossadzifo Wonyra & Tomgouani Lanie & Yacobou Sanoussi, 2021. "Effets Potentiels de Court‐terme de la Pandémie de la COVID‐19 sur la Pauvreté dans les Pays de l'Union Economique et Monétaire Ouest Africaine (UEMOA)," African Development Review, African Development Bank, vol. 33(S1), pages 60-74, April.
    20. Simplice A. Asongu & Nicholas M. Odhiambo, 2020. "Insurance and Inequality in Sub-Saharan Africa: Policy Thresholds," Working Papers of the African Governance and Development Institute. 20/005, African Governance and Development Institute..
    21. Aynalem Shita & Nand Kumar & Seema Singh, 2021. "Technology, poverty and income distribution nexus: The case of fertilizer adoption in Ethiopia," African Development Review, African Development Bank, vol. 33(4), pages 742-755, December.
    22. Simplice A. Asongu & Ivo J. Leke, 2017. "External Flows and Inclusive Human Development in Sub-Saharan Africa," Research Africa Network Working Papers 17/058, Research Africa Network (RAN).
    23. Abdellatif Chatri & Otman Chahbi & Mustapha Snihji, 2021. "The multilevel analysis of students’ achievement: Evidence from Morocco," African Development Review, African Development Bank, vol. 33(1), pages 117-129, March.
    24. Egla Mansi & Eglantina Hysa & Mirela Panait & Marian Catalin Voica, 2020. "Poverty—A Challenge for Economic Development? Evidences from Western Balkan Countries and the European Union," Sustainability, MDPI, vol. 12(18), pages 1-24, September.
    25. Burhan Can Karahasan & Fırat Bilgel, 2021. "The Topography and Sources of Multidimensional Poverty in Turkey," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 154(2), pages 413-445, April.
    26. Chong Hui Ling & Khalid Ahmed & Rusnah Muhamad & Muhammad Shahbaz & Nanthakumar Loganathan, 2017. "Testing the Social Cost of Rapid Economic Development in Malaysia: The Effect of Trade on Life Expectancy," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 130(3), pages 1005-1023, February.
    27. Asongu, Simplice & Nwachukwu, Jacinta, 2016. "The Comparative Inclusive Human Development of Globalisation in Africa," MPRA Paper 76122, University Library of Munich, Germany, revised Sep 2016.
    28. Simplice A. Asongu & Joseph I. Uduji & Elda N. Okolo-Obasi, 2019. "Thresholds of External Flows for Inclusive Human Development in Sub-Saharan Africa," Research Africa Network Working Papers 19/045, Research Africa Network (RAN).
    29. Reham Rizk & Ronia Hawash, 2020. "Education Gap and Youth: A Growing Challenge in the MENA Region," LIS Working papers 790, LIS Cross-National Data Center in Luxembourg.
    30. Simplice A. Asongu & Joseph Nnanna, 2020. "Inclusive Human Development in Sub-Saharan Africa," Working Papers of the African Governance and Development Institute. 20/014, African Governance and Development Institute..
    31. Luciana Koprencka & Valbona Gjini & Redian Hysi, 2018. "Real Estate Market in Tirana," European Journal of Marketing and Economics Articles, Revistia Research and Publishing, vol. 1, ejme_v1_i.
    32. R Varela & L Rodríguez-Díaz & M deCastro, 2020. "Persistent heat waves projected for Middle East and North Africa by the end of the 21st century," PLOS ONE, Public Library of Science, vol. 15(11), pages 1-18, November.
    33. Simplice A. Asongu & Joseph Nnanna & Paul N. Acha-Anyi, 2020. "Inclusive Education for Inclusive Economic Participation: the Financial Access Channel," Working Papers 20/019, European Xtramile Centre of African Studies (EXCAS).
    34. Mahmoud Salameh Qandeel, 2024. "Implications of public policies performance on social inequality worldwide," SN Business & Economics, Springer, vol. 4(9), pages 1-33, September.
    35. Kjell Hausken & Mthuli Ncube, 2018. "Service Delivery versus Moonlighting: Using Data from Kenya, Uganda, Tanzania and Senegal," African Development Review, African Development Bank, vol. 30(2), pages 219-232, June.
    36. Simplice A. Asongu & Oasis Kodila-Tedika, 2014. "Institutions and Poverty: A Critical Comment Based on Evolving Currents and Debates," Research Africa Network Working Papers 14/031, Research Africa Network (RAN).
    37. Carr, Olivia G. & Jilani-Hyler, Nadia & Murray, Gregg R., 2022. "Identifying factors related to school closures due to COVID-19 in the Middle East and North Africa region," International Journal of Educational Development, Elsevier, vol. 90(C).
    38. Simplice A. Asongu & Nicholas M. Odhiambo, 2022. "Enhancing ICT for Female Economic Participation in Sub-Saharan Africa," Working Papers of the African Governance and Development Institute. 22/002, African Governance and Development Institute..
    39. Romuald Foueka, 2020. "Analyse du différentiel de performances scolaires dans les pays PASEC sur la base de la régression quantile contrefactuelle," African Development Review, African Development Bank, vol. 32(4), pages 605-618, December.
    40. Simplice A. Asongu & Ndemaze Asongu, 2018. "Comparative determinants of quality of growth in developing countries," International Journal of Happiness and Development, Inderscience Enterprises Ltd, vol. 4(1), pages 65-89.
    41. Arayssi, Mahmoud & Fakih, Ali, 2017. "Finance–growth nexus in a changing political region: How important was the Arab Spring?," Economic Analysis and Policy, Elsevier, vol. 55(C), pages 106-123.
    42. Jiquan Peng & Zihao Zhao & Lili Chen, 2022. "The Impact of High-Standard Farmland Construction Policy on Rural Poverty in China," Land, MDPI, vol. 11(9), pages 1-20, September.
    43. John C. Anyanwu, 2016. "Empirical Analysis of the Main Drivers of Income Inequality in Southern Africa," Annals of Economics and Finance, Society for AEF, vol. 17(2), pages 337-364, November.
    44. Asongu, Simplice, 2015. "Rational Asymmetric Development: Transfer Mispricing and Sub-Saharan Africa’s Extreme Poverty Tragedy," MPRA Paper 71175, University Library of Munich, Germany.
    45. BANDA, Iges & WILLIAMS-ADEYANJU, Zainab & SKRAME, Dea, 2022. "Poverty, Education And Economic Growth: A Case Study Of Western Balkan Countries," Journal of Financial and Monetary Economics, Centre of Financial and Monetary Research "Victor Slavescu", vol. 10(1), pages 30-43, October.
    46. Li, Yuchun & Durani, Farah & Syed, Qasim Raza & Abddel-Jalil Sallam, Osama Azmi, 2024. "Role of minerals rent, geopolitical risk, and economic policy uncertainty in achieving green growth: Evidence from novel wavelet quantile correlation approach," Resources Policy, Elsevier, vol. 93(C).
    47. Arne Bigsten, 2018. "Determinants of the Evolution of Inequality in Africa," Journal of African Economies, Centre for the Study of African Economies, vol. 27(1), pages 127-148.
    48. Mark Edem Kunawotor & Godfred Alufar Bokpin & Charles Barnor, 2020. "Drivers of income inequality in Africa: Does institutional quality matter?," African Development Review, African Development Bank, vol. 32(4), pages 718-729, December.
    49. Ernestine Atangana, 2022. "With the Continuing Increase in Sub-Saharan African Countries, Will Sustainable Development of Goal 1 Ever Be Achieved by 2030?," Sustainability, MDPI, vol. 14(16), pages 1-28, August.
    50. Simplice A. Asongu, 2015. "Rational Asymmetric Development: Transfer Mispricing and Sub-Saharan Africa’s Extreme Poverty Tragedy," Research Africa Network Working Papers 15/054, Research Africa Network (RAN).
    51. Davidmac O. Ekeocha & Chimere O. Iheonu, 2021. "Household‐level poverty, consumption poverty thresholds, income inequality and quality of lives in sub‐Saharan Africa," African Development Review, African Development Bank, vol. 33(2), pages 234-248, June.
    52. Asongu, Simplice & Nnanna, Joseph, 2018. "Foreign aid and sustainable inclusive human development in Africa," MPRA Paper 91988, University Library of Munich, Germany.
    53. Amal Jmaii & Damien Rousselière & Christophe Daniel, 2017. "Semi†parametric Regression†based Decomposition Methods: Evidence from Regional Inequality in Tunisia," African Development Review, African Development Bank, vol. 29(4), pages 660-673, December.
    54. Antonella Biscione & Dorothée Boccanfuso & Raul Caruso, 2020. "A Hypothesis on Poverty Change in Albania (2007-2016)," Cahiers de recherche 20-08, Departement d'économique de l'École de gestion à l'Université de Sherbrooke.
    55. Fambeu, Ariel Herbert & Yomi, Patricia Tchawa, 2023. "Is democracy pro poor in Sub-Saharan Africa?," Journal of Policy Modeling, Elsevier, vol. 45(1), pages 10-30.
    56. Nur Feriyanto, 2015. "Dominant Economic Sectors in Kulonprogo, Gunungkidul, and Bantul Regencies in Yogyakarta Special Province," Economic Journal of Emerging Markets, Universitas Islam Indonesia, vol. 7(2), pages 93-106, April.
    57. Hakki Hakan Yilmaz & Ali Sertaç Kanaci, 2021. "Redistribution, Growth and Productivity Relationship in Fiscal Policy in Core and Peripheral Countries," Hacienda Pública Española / Review of Public Economics, IEF, vol. 238(3), pages 61-79, September.
    58. Rasheed O. Alao & Andrew A. Alola, 2022. "The role of foreign aids and income inequality in poverty reduction: A sustainable development approach for Africa?," Journal of Social and Economic Development, Springer;Institute for Social and Economic Change, vol. 24(2), pages 456-469, December.
    59. Mohamed Ali Chroufa & Nouri Chtourou, 2022. "Inequality and Growth in Tunisia: New Evidence from Threshold Regression," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 163(2), pages 901-924, September.
    60. Seher Gülşah Topuz, 2022. "The Relationship Between Income Inequality and Economic Growth: Are Transmission Channels Effective?," Social Indicators Research: An International and Interdisciplinary Journal for Quality-of-Life Measurement, Springer, vol. 162(3), pages 1177-1231, August.
    61. Marinko Škare & Sabina Lacmanovic, 2015. "Human capital and economic growth: a review essay," The AMFITEATRU ECONOMIC journal, Academy of Economic Studies - Bucharest, Romania, vol. 17(39), pages 735-735, May.

  54. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.

    Cited by:

    1. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    2. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    3. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    4. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    5. Ryoji Makino & Kenju Akai & Jun-ichi Takeshita & Takanori Kudo & Keiko Aoki, 2021. "Effect of disclosing the relation between effort and unit reliability on system reliability: An economic experiment," PLOS ONE, Public Library of Science, vol. 16(4), pages 1-18, April.
    6. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    7. Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
    8. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    9. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    10. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    11. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    12. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    13. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    14. Gatmiry, Zohreh S. & Hafezalkotob, Ashkan & Khakzar bafruei, Morteza & Soltani, Roya, 2021. "Food web conservation vs. strategic threats: A security game approach," Ecological Modelling, Elsevier, vol. 442(C).
    15. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

  55. Kjell Hausken & Mthuli Ncube, 2014. "Political Economy of Service Delivery: Monitoring Versus Contestation," The Developing Economies, Institute of Developing Economies, vol. 52(1), pages 68-84, March.

    Cited by:

    1. Kjell Hausken & Mthuli Ncube, 2018. "Service Delivery versus Moonlighting: Using Data from Kenya, Uganda, Tanzania and Senegal," African Development Review, African Development Bank, vol. 30(2), pages 219-232, June.

  56. Kjell Hausken, 2014. "Returns to information security investment: Endogenizing the expected loss," Information Systems Frontiers, Springer, vol. 16(2), pages 329-336, April.

    Cited by:

    1. Saini Das & Arunabha Mukhopadhyay & Debashis Saha & Samir Sadhukhan, 2019. "A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs," Information Systems Frontiers, Springer, vol. 21(5), pages 959-977, October.
    2. Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
    3. Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.
    4. Yosra Miaoui & Noureddine Boudriga, 2019. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 21(2), pages 261-300, April.
    5. Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 2021. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 23(3), pages 773-790, June.
    6. Mahmud Akhter Shareef & Vinod Kumar & Yogesh K. Dwivedi & Uma Kumar, 2016. "Service delivery through mobile-government (mGov): Driving factors and cultural impacts," Information Systems Frontiers, Springer, vol. 18(2), pages 315-332, April.
    7. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    8. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    9. Feng Xu & Xin (Robert) Luo & Hongyun Zhang & Shan Liu & Wei (Wayne) Huang, 2019. "Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect," Information Systems Frontiers, Springer, vol. 21(5), pages 1069-1083, October.
    10. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    11. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
    12. Tung-Hsien Wu & Shi-Ming Huang & Shaio Yan Huang & David C. Yen, 2017. "The effect of competencies, team problem-solving ability, and computer audit activity on internal audit performance," Information Systems Frontiers, Springer, vol. 19(5), pages 1133-1148, October.
    13. Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 0. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 0, pages 1-18.
    14. Yosra Miaoui & Noureddine Boudriga, 0. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 0, pages 1-40.
    15. Tung-Hsien Wu & Shi-Ming Huang & Shaio Yan Huang & David C. Yen, 0. "The effect of competencies, team problem-solving ability, and computer audit activity on internal audit performance," Information Systems Frontiers, Springer, vol. 0, pages 1-16.

  57. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2013. "Individual vs. overarching protection for minimizing the expected damage caused by an attack," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 117-125.

    Cited by:

    1. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    2. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    3. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    5. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.
    6. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    7. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    8. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    9. Xiao, Hui & Shi, Daimin & Ding, Yi & Peng, Rui, 2016. "Optimal loading and protection of multi-state systems considering performance sharing mechanism," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 88-95.
    10. Cao, Minhao & Guo, Jianjun & Xiao, Hui & Wu, Liang, 2022. "Reliability analysis and optimal generator allocation and protection strategy of a non-repairable power grid system," Reliability Engineering and System Safety, Elsevier, vol. 222(C).

  58. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.

    Cited by:

    1. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimal early warning defense of N-version programming service against co-resident attacks in cloud system," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    2. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    3. Olive Emil Wetter & Valentino Wüthrich, 2015. "“What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism," Defense & Security Analysis, Taylor & Francis Journals, vol. 31(3), pages 185-198, September.
    4. Levitin, Gregory & Xing, Liudong & Dai, Yuanshun, 2022. "Co-residence based data theft game in cloud system with virtual machine replication and cancellation," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
    5. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    6. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    7. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    8. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    9. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2021. "Minimization of Expected User Losses Considering Co-resident Attacks in Cloud System with Task Replication and Cancellation," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    10. Xing, Liudong & Levitin, Gregory, 2017. "Balancing theft and corruption threats by data partition in cloud system with independent server protection," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 248-254.
    11. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    12. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    13. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    14. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    15. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.

  59. Kjell Hausken, 2013. "Combined Series And Parallel Systems Subject To Individual Versus Overarching Defense And Attack," Asia-Pacific Journal of Operational Research (APJOR), World Scientific Publishing Co. Pte. Ltd., vol. 30(02), pages 1-33.

    Cited by:

    1. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    2. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    3. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    4. Abdolmajid Yolmeh & Melike Baykal-Gürsoy & Vicki Bier, 2023. "A decomposable resource allocation model with generalized overarching protections," Annals of Operations Research, Springer, vol. 320(1), pages 493-507, January.
    5. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    6. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    7. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.

  60. Gregory Levitin & Kjell Hausken, 2013. "Parallel systems under two sequential attacks with contest intensity variation," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 21(1), pages 207-224, January.

    Cited by:

    1. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    2. Gregory Levitin & Maxim Finkelstein, 2017. "A new stress–strength model for systems subject to stochastic shocks," Journal of Risk and Reliability, , vol. 231(2), pages 172-179, April.

  61. Willigers, Bart J.A. & Hausken, Kjell, 2013. "The strategic interaction between the government and international oil companies in the UK: An example of a country with dwindling hydrocarbon reserves," Energy Policy, Elsevier, vol. 57(C), pages 276-286.

    Cited by:

    1. Felipe Costa Araujo & Alexandre Bevilacqua Leoneti, 2020. "Evaluating the Stability of the Oil and Gas Exploration and Production Regulatory Framework in Brazil," Group Decision and Negotiation, Springer, vol. 29(1), pages 143-156, February.

  62. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.

    Cited by:

    1. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.
    2. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    3. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    4. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    5. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    6. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    7. Bhatt, Sneha Dhyani & Sinha, Ankur & Jayaswal, Sachin, 2024. "The capacitated r-hub interdiction problem with congestion: Models and solution approaches," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 185(C).
    8. Manxi Wu & Saurabh Amin, 2019. "Securing Infrastructure Facilities: When Does Proactive Defense Help?," Dynamic Games and Applications, Springer, vol. 9(4), pages 984-1025, December.
    9. Yaghlane, Asma Ben & Azaiez, M. Naceur & Mrad, Mehdi, 2019. "System survivability in the context of interdiction networks," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 362-371.
    10. Darvishan, Ayda & Lim, Gino J., 2021. "Dynamic network flow optimization for real-time evacuation reroute planning under multiple road disruptions," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    11. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    12. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    13. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
    14. Nogal, Maria & O'Connor, Alan & Caulfield, Brian & Martinez-Pastor, Beatriz, 2016. "Resilience of traffic networks: From perturbation to recovery via a dynamic restricted equilibrium model," Reliability Engineering and System Safety, Elsevier, vol. 156(C), pages 84-96.
    15. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    16. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    17. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    18. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.

  63. Liv‐Helen Heggland & Aslaug Mikkelsen & Kjell Hausken, 2013. "Models, phases and cases of patient participation in decision‐making in surgical treatment in Norway: A qualitative study," Nursing & Health Sciences, John Wiley & Sons, vol. 15(1), pages 39-44, March.

    Cited by:

    1. Marja Härkänen & Marjo Kervinen & Jouni Ahonen & Hannele Turunen & Katri Vehviläinen‐Julkunen, 2015. "An observational study of how patients are identified before medication administrations in medical and surgical wards," Nursing & Health Sciences, John Wiley & Sons, vol. 17(2), pages 188-194, June.

  64. Levitin, Gregory & Hausken, Kjell & Ben Haim, Hanoch, 2013. "Defending majority voting systems against a strategic attacker," Reliability Engineering and System Safety, Elsevier, vol. 111(C), pages 37-44.

    Cited by:

    1. Wang, Tai-Ran & Pedroni, Nicola & Zio, Enrico, 2016. "Identification of protective actions to reduce the vulnerability of safety-critical systems to malevolent acts: A sensitivity-based decision-making approach," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 9-18.
    2. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    3. Wu, Di & Liu, Xiang-dong & Yan, Xiang-bin & Peng, Rui & Li, Gang, 2019. "Equilibrium analysis of bitcoin block withholding attack: A generalized model," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 318-328.
    4. Li, Yijia & Hu, Xiaoxiao & Zhao, Peng, 2021. "On the reliability of a voting system under cyber attacks," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    5. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.

  65. G Levitin & K Hausken, 2013. "Defence resource distribution between protection and decoys for constant resource stockpiling pace," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 64(9), pages 1409-1417, September.

    Cited by:

    1. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    2. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    3. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    4. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    5. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    6. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.

  66. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.

    Cited by:

    1. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.
    2. Daniel Seaberg & Laura Devine & Jun Zhuang, 2017. "A review of game theory applications in natural disaster management research," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(3), pages 1461-1483, December.
    3. Vicki M. Bier & Yuqun Zhou & Hongru Du, 2020. "Game-theoretic modeling of pre-disaster relocation," The Engineering Economist, Taylor & Francis Journals, vol. 65(2), pages 89-113, April.
    4. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    5. Yisha Xiang & Jun Zhuang, 2016. "A medical resource allocation model for serving emergency victims with deteriorating health conditions," Annals of Operations Research, Springer, vol. 236(1), pages 177-196, January.
    6. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    7. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    8. Shitao Gong & Xin Gao & Zhou Li & Linyan Chen, 2021. "Developing a Dynamic Supervision Mechanism to Improve Construction Safety Investment Supervision Efficiency in China: Theoretical Simulation of Evolutionary Game Process," IJERPH, MDPI, vol. 18(7), pages 1-29, March.
    9. Wenxin Su & Xin Gao & Yukun Jiang & Jinrong Li, 2021. "Developing a Construction Safety Standard System to Enhance Safety Supervision Efficiency in China: A Theoretical Simulation of the Evolutionary Game Process," Sustainability, MDPI, vol. 13(23), pages 1-22, December.
    10. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    11. Chunlin Xin & Jianwen Zhang & Chia-Huei Wu & Sang-Bing Tsai, 2020. "Safety Investment Decision Problem without Probability Distribution: A Robust Optimization Approach," Mathematical Problems in Engineering, Hindawi, vol. 2020, pages 1-10, November.
    12. Cameron MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    13. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    14. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    15. Liangdong Lu & Hong Huang & Jiuchang Wei & Jia Xu, 2020. "Safety Regulations and the Uncertainty of Work‐Related Road Accident Loss: The Triple Identity of Chinese Local Governments Under Principal–Agent Framework," Risk Analysis, John Wiley & Sons, vol. 40(6), pages 1168-1182, June.
    16. Cameron A. MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    17. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.
    18. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Niki Matinrad, 2016. "Disaster Management from a POM Perspective: Mapping a New Domain," Production and Operations Management, Production and Operations Management Society, vol. 25(10), pages 1611-1637, October.
    19. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    20. Liu, Yang & Cui, Na & Zhang, Jianghua, 2019. "Integrated temporary facility location and casualty allocation planning for post-disaster humanitarian medical service," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 128(C), pages 1-16.
    21. Zongjie Pi & Xin Gao & Linyan Chen & Jinghua Liu, 2019. "The New Path to Improve Construction Safety Performance in China: An Evolutionary Game Theoretic Approach," IJERPH, MDPI, vol. 16(13), pages 1-24, July.

  67. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.

    Cited by:

    1. Kjell Hausken, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 517-519, October.
    2. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Rejoinder," Purdue University Economics Working Papers 1268, Purdue University, Department of Economics.

  68. G Levitin & K Hausken, 2012. "Parallel systems under two sequential attacks with imperfect detection of the first attack outcome," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(11), pages 1545-1555, November.

    Cited by:

    1. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    2. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    3. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    4. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.

  69. Gregory Levitin & Kjell Hausken, 2012. "Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 304-318, February.

    Cited by:

    1. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    2. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    3. Yaghlane, Asma Ben & Azaiez, M. Naceur & Mrad, Mehdi, 2019. "System survivability in the context of interdiction networks," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 362-371.
    4. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.
    5. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    6. Krishna Kalyanam & David Casbeer & Meir Pachter, 2020. "A sequential partial information bomber‐defender shooting problem," Naval Research Logistics (NRL), John Wiley & Sons, vol. 67(3), pages 223-235, April.
    7. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    8. Ding, Weiyong & Xu, Maochao & Huang, Yu & Zhao, Peng, 2020. "Cyber risks of PMU networks with observation errors: Assessment and mitigation," Reliability Engineering and System Safety, Elsevier, vol. 198(C).
    9. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    10. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    11. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    12. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.

  70. Kjell Hausken, 2012. "On The Impossibility Of Deterrence In Sequential Colonel Blotto Games," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 14(02), pages 1-13.

    Cited by:

    1. Kjell Hausken, 2023. "Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints," SN Business & Economics, Springer, vol. 3(11), pages 1-18, November.
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    4. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    5. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    6. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).

  71. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.

    Cited by:

    1. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimization of time constrained N-version programming service components with competing task execution and version corruption processes," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    2. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimal early warning defense of N-version programming service against co-resident attacks in cloud system," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    3. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    4. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    5. Luo, Liang & Xing, Liudong & Levitin, Gregory, 2019. "Optimizing dynamic survivability and security of replicated data in cloud systems under co-residence attacks," Reliability Engineering and System Safety, Elsevier, vol. 192(C).
    6. Chołda, Piotr & Følstad, Eirik L. & Helvik, Bjarne E. & Kuusela, Pirkko & Naldi, Maurizio & Norros, Ilkka, 2013. "Towards risk-aware communications networking," Reliability Engineering and System Safety, Elsevier, vol. 109(C), pages 160-174.
    7. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    8. Levitin, Gregory & Xing, Liudong & Dai, Yuanshun, 2018. "Co-residence based data vulnerability vs. security in cloud computing system with random server assignment," European Journal of Operational Research, Elsevier, vol. 267(2), pages 676-686.
    9. Zhang, Xiaoyu & Xu, Maochao & Da, Gaofeng & Zhao, Peng, 2021. "Ensuring confidentiality and availability of sensitive data over a network system under cyber threats," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    10. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    11. Xing, Liudong & Levitin, Gregory, 2017. "Balancing theft and corruption threats by data partition in cloud system with independent server protection," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 248-254.
    12. Gregory Levitin & Liudong Xing & Hong‐Zhong Huang, 2019. "Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 846-858, April.
    13. Heping Jia & Rui Peng & Yi Ding & Changzheng Shao, 2020. "Reliability analysis of distributed storage systems considering data loss and theft," Journal of Risk and Reliability, , vol. 234(2), pages 303-321, April.
    14. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Optimal defense of a distributed data storage system against hackers’ attacks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).

  72. Kjell Hausken, 2012. "The economics of terrorism against two targets," Applied Economics Letters, Taylor & Francis Journals, vol. 19(12), pages 1135-1138, August.

    Cited by:

    1. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    2. Subhayu Bandyopadhyay & Todd Sandler, 2022. "Voluntary participation in a terror group and counterterrorism policy," Working Papers 2022-023, Federal Reserve Bank of St. Louis.
    3. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    4. Yang Jiao & Zijun Luo, 2019. "A model of terrorism and counterterrorism with location choices," Public Choice, Springer, vol. 179(3), pages 301-313, June.
    5. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.

  73. Hausken, Kjell, 2012. "On the inappropriateness of collective rent seeking analysis when agents exert within-group and between-group efforts," Economics Letters, Elsevier, vol. 116(3), pages 504-507.

    Cited by:

    1. Christoph March & Marco Sahm, 2021. "Parochial altruism and the absence of the group size paradox in inter-group conflicts," Economics Bulletin, AccessEcon, vol. 41(2), pages 361-373.
    2. Osório, António (António Miguel), 2018. "Group contest success function: The heterogeneous individuals case," Working Papers 2072/332583, Universitat Rovira i Virgili, Department of Economics.
    3. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    4. Feng, Qun & Shi, Xuejun & Zhang, Jianghua, 2019. "Influence of rent-seeking on safety supervision in Chinese construction: Based on a simulation technology," Technological Forecasting and Social Change, Elsevier, vol. 138(C), pages 1-9.
    5. Chen, Hong & Feng, Qun & Cao, Jing, 2014. "Rent-seeking mechanism for safety supervision in the Chinese coal industry based on a tripartite game model," Energy Policy, Elsevier, vol. 72(C), pages 140-145.

  74. K Hausken & J Zhuang, 2012. "The timing and deterrence of terrorist attacks due to exogenous dynamics," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 726-735, June.

    Cited by:

    1. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    2. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    3. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    4. Dong, Mingxin & Zhang, Zhen & Liu, Yi & Zhao, Dong Feng & Meng, Yifei & Shi, Jihao, 2023. "Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
    5. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    6. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    7. Song, Yu & Chen, Bo & Hou, Na & Yang, Yi, 2022. "Terrorist attacks and oil prices: A time-varying causal relationship analysis," Energy, Elsevier, vol. 246(C).
    8. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    9. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    10. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    11. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    12. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    13. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    14. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    15. Afshan Naseem & Yasir Ahmad, 2020. "Critical Success Factors for Neutralization of Airborne Threats," SAGE Open, , vol. 10(3), pages 21582440209, September.
    16. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    17. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    18. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    19. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    20. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    21. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    22. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Niki Matinrad, 2016. "Disaster Management from a POM Perspective: Mapping a New Domain," Production and Operations Management, Production and Operations Management Society, vol. 25(10), pages 1611-1637, October.
    23. Yanling Chang & Alan Erera & Chelsea White, 2015. "A leader–follower partially observed, multiobjective Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 103-128, December.
    24. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    25. Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
    26. Xiaojun Shan & Jun Zhuang, 2014. "Subsidizing to disrupt a terrorism supply chain—a four-player game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(7), pages 1108-1119, July.
    27. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    28. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    29. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    30. Hausken, Kjell, 2016. "Additive Multi-Effort Contests," UiS Working Papers in Economics and Finance 2016/2, University of Stavanger.
    31. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    32. Afshan Naseem & Shoab Ahmed Khan & Asad Waqar Malik, 2017. "A real-time man-in-loop threat evaluation and resource assignment in defense," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(6), pages 725-738, June.
    33. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    34. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    35. Hausken, Kjell, 2016. "Axiomatization of Group Contest Success Functions," UiS Working Papers in Economics and Finance 2016/8, University of Stavanger.

  75. G Levitin & K Hausken, 2012. "Individual versus overarching protection against strategic attacks," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(7), pages 969-981, July.

    Cited by:

    1. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    2. Peng, Rui & Wu, Di & Xiao, Hui & Xing, Liudong & Gao, Kaiye, 2019. "Redundancy versus protection for a non-reparable phased-mission system subject to external impacts," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    3. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    4. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    5. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    6. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    7. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.
    8. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    9. Abdolmajid Yolmeh & Melike Baykal-Gürsoy & Vicki Bier, 2023. "A decomposable resource allocation model with generalized overarching protections," Annals of Operations Research, Springer, vol. 320(1), pages 493-507, January.
    10. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
    11. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    12. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    13. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2013. "Individual vs. overarching protection for minimizing the expected damage caused by an attack," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 117-125.
    14. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
    15. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    16. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    17. Levitin, Gregory & Xing, Liudong & Dai, Yanshun, 2021. "Security and reliability of N-version cloud-based task solvers with individual version cancellation under data theft attacks," Reliability Engineering and System Safety, Elsevier, vol. 216(C).

  76. John F. Moxnes & Kjell Hausken, 2012. "Mathematical modelling of acute virus influenza A infections," Mathematical and Computer Modelling of Dynamical Systems, Taylor & Francis Journals, vol. 18(5), pages 521-538, February.

    Cited by:

    1. Kjell Hausken & Mthuli Ncube, 2020. "Game theoretic analysis of persons, the pharmaceutical industry, and donors in disease contraction and recovery," Palgrave Communications, Palgrave Macmillan, vol. 7(1), pages 1-17, December.

  77. Knut Arne Sund & Kjell Hausken, 2012. "Fixed price contract versus incentive-based contract in the oil and gas industry," International Journal of Global Energy Issues, Inderscience Enterprises Ltd, vol. 35(5), pages 371-410.

    Cited by:

    1. Jun Tu & Liangdong Wan & Zijiao Sun, 2023. "Safety Improvement of Sustainable Coal Transportation in Mines: A Contract Design Perspective," Sustainability, MDPI, vol. 15(3), pages 1-21, January.

  78. Kjell Hausken, 2012. "Production versus safety in a risky competitive industry," International Journal of Decision Sciences, Risk and Management, Inderscience Enterprises Ltd, vol. 4(1/2), pages 92-107.

    Cited by:

    1. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.

  79. Kjell Hausken, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 517-519, October.
    See citations under working paper version above.
  80. Kjell Hausken, 2011. "Production, safety, exchange, and risk," International Journal of Business Continuity and Risk Management, Inderscience Enterprises Ltd, vol. 2(4), pages 346-350.

    Cited by:

    1. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
    2. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).

  81. Kjell Hausken, 2011. "Protecting complex infrastructures against multiple strategic attackers," International Journal of Systems Science, Taylor & Francis Journals, vol. 42(1), pages 11-29.

    Cited by:

    1. D E Salazar A & C M Rocco S & E Zio, 2008. "Optimal protection of complex networks exposed to a terrorist hazard: A multi-objective evolutionary approach," Journal of Risk and Reliability, , vol. 222(3), pages 327-335, September.
    2. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    3. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    4. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    5. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.
    6. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    7. Alcantara-Jiménez, Guillermo & Clempner, Julio B., 2020. "Repeated Stackelberg security games: Learning with incomplete state information," Reliability Engineering and System Safety, Elsevier, vol. 195(C).
    8. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    9. Olive Emil Wetter & Valentino Wüthrich, 2015. "“What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism," Defense & Security Analysis, Taylor & Francis Journals, vol. 31(3), pages 185-198, September.
    10. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    11. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    12. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    13. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    14. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    15. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    16. Bricha, Naji & Nourelfath, Mustapha, 2015. "Protection of warehouses and plants under capacity constraint," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 93-104.
    17. Oléron Evans, Thomas P. & Bishop, Steven R., 2013. "Static search games played over graphs and general metric spaces," European Journal of Operational Research, Elsevier, vol. 231(3), pages 667-689.
    18. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    19. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    20. Wenping Xu & Zongjun Wang & Liu Hong & Ligang He & Xueguang Chen, 2015. "The uncertainty recovery analysis for interdependent infrastructure systems using the dynamic inoperability input–output model," International Journal of Systems Science, Taylor & Francis Journals, vol. 46(7), pages 1299-1306, May.
    21. Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
    22. Siva Sivatha Sindhu & S. Geetha & A. Kannan, 2012. "Evolving optimised decision rules for intrusion detection using particle swarm paradigm," International Journal of Systems Science, Taylor & Francis Journals, vol. 43(12), pages 2334-2350.
    23. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
    24. Jalali, Sajjad & Seifbarghy, Mehdi & Niaki, Seyed Taghi Akhavan, 2018. "A risk-averse location-protection problem under intentional facility disruptions: A modified hybrid decomposition algorithm," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 114(C), pages 196-219.
    25. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    26. Li, Yijia & Hu, Xiaoxiao & Zhao, Peng, 2021. "On the reliability of a voting system under cyber attacks," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    27. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    28. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    29. Mumtaz Karatas & Ertan Yakıcı & Abdullah Dasci, 2022. "Solving a bi-objective unmanned aircraft system location-allocation problem," Annals of Operations Research, Springer, vol. 319(2), pages 1631-1654, December.
    30. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    31. Nicholas T. Boardman & Brian J. Lunday & Matthew J. Robbins, 2017. "Heterogeneous surface-to-air missile defense battery location: a game theoretic approach," Journal of Heuristics, Springer, vol. 23(6), pages 417-447, December.
    32. Zhang, C. & Liu, X. & Jiang, YP. & Fan, B. & Song, X., 2016. "A two-stage resource allocation model for lifeline systems quick response with vulnerability analysis," European Journal of Operational Research, Elsevier, vol. 250(3), pages 855-864.
    33. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    34. Ouyang, Min, 2017. "A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1072-1084.
    35. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    36. Almoghathawi, Yasser & Selim, Shokri & Barker, Kash, 2023. "Community structure recovery optimization for partial disruption, functionality, and restoration in interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    37. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    38. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    39. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.

  82. Kjell Hausken & Jun Zhuang, 2011. "Defending Against a Stockpiling Terrorist," The Engineering Economist, Taylor & Francis Journals, vol. 56(4), pages 321-353.

    Cited by:

    1. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    2. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    3. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    4. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    5. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    6. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    7. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    8. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    9. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    10. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    11. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.

  83. Kjell Hausken, 2011. "Production, safety, fighting, and risk," International Journal of Business Continuity and Risk Management, Inderscience Enterprises Ltd, vol. 2(4), pages 324-329.

    Cited by:

    1. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    2. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).

  84. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.

    Cited by:

    1. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    2. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    3. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    4. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    5. Xiao, Hui & Shi, Daimin & Ding, Yi & Peng, Rui, 2016. "Optimal loading and protection of multi-state systems considering performance sharing mechanism," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 88-95.
    6. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.

  85. Marianne Storm & Knud Knudsen & Larry Davidson & Kjell Hausken & Jan Johannessen, 2011. ""Service user involvement in practice": The evaluation of an intervention program for service providers and inpatients in Norwegian Community Mental Health Centers," Psychosis, Taylor & Francis Journals, vol. 3(1), pages 29-40.

    Cited by:

    1. Marit By Rise & Aslak Steinsbekk, 2016. "Long Term Effect on Professionals’ Knowledge, Practice and Attitudes towards User Involvement Four Years after Implementing an Organisational Development Plan: A Controlled Study," PLOS ONE, Public Library of Science, vol. 11(3), pages 1-18, March.

  86. Kjell Hausken, 2011. "Strategic defense and attack of series systems when agents move sequentially," IISE Transactions, Taylor & Francis Journals, vol. 43(7), pages 483-504.

    Cited by:

    1. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.
    2. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    3. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Brian Lunday & Hanif Sherali, 2012. "Network interdiction to minimize the maximum probability of evasion with synergy between applied resources," Annals of Operations Research, Springer, vol. 196(1), pages 411-442, July.
    5. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    6. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    7. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    8. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    9. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.
    10. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    11. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    12. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    13. Nageswara S. V. Rao & Chris Y. T. Ma & Fei He & David K. Y. Yau & Jun Zhuang, 2018. "Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures," Games, MDPI, vol. 9(3), pages 1-24, July.
    14. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    15. González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.

  87. Kjell Hausken, 2011. "Game Theoretic Analysis Of Two-Period-Dependent Degraded Multistate Reliability Systems," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 13(03), pages 247-267.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.

  88. Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.

    Cited by:

    1. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Frank Yeong-Sung Lin & Yu-Shun Wang & Ming-Yang Huang, 2013. "Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-11, August.
    4. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    5. Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
    6. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    7. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    8. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    9. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    10. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    11. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    12. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).

  89. Marianne Storm & Kjell Hausken & Knud Knudsen, 2011. "Inpatient service providers’ perspectives on service user involvement in Norwegian community mental health centres," International Journal of Social Psychiatry, , vol. 57(6), pages 551-563, November.

    Cited by:

    1. Marit By Rise & Aslak Steinsbekk, 2016. "Long Term Effect on Professionals’ Knowledge, Practice and Attitudes towards User Involvement Four Years after Implementing an Organisational Development Plan: A Controlled Study," PLOS ONE, Public Library of Science, vol. 11(3), pages 1-18, March.

  90. Kjell Hausken & Gregory Levitin, 2011. "Shield versus sword resource distribution in K-round duels," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 19(4), pages 589-603, December.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Anelí Bongers & José L. Torres, 2021. "A bottleneck combat model: an application to the Battle of Thermopylae," Operational Research, Springer, vol. 21(4), pages 2859-2877, December.
    3. Yaghlane, Asma Ben & Azaiez, M. Naceur & Mrad, Mehdi, 2019. "System survivability in the context of interdiction networks," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 362-371.
    4. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    5. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    6. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    7. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    8. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    9. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.

  91. Kjell Hausken & Gregory Levitin, 2011. "Active Vs. Passive Defense Against A Strategic Attacker," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 13(01), pages 1-12.

    Cited by:

    1. McCarter, Matthew & Barker, Kash & Johansson, Jonas & Ramirez-Marquez, Jose E., 2018. "A bi-objective formulation for robust defense strategies in multi-commodity networks," Reliability Engineering and System Safety, Elsevier, vol. 176(C), pages 154-161.
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    4. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.
    5. Nakao, Keisuke, 2019. "Modeling Deterrence by Denial and by Punishment," MPRA Paper 95100, University Library of Munich, Germany.
    6. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.

  92. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.

    Cited by:

    1. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    2. Deck, Cary & Foster, Joshua & Song, Hongwei, 2015. "Defense against an opportunistic challenger: Theory and experiments," European Journal of Operational Research, Elsevier, vol. 242(2), pages 501-513.
    3. Cary Deck & Roman M. Sheremeta, 2018. "The Tug-of-War in the Laboratory," Working Papers 18-21, Chapman University, Economic Science Institute.
    4. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    5. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    6. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    7. Olive Emil Wetter & Valentino Wüthrich, 2015. "“What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism," Defense & Security Analysis, Taylor & Francis Journals, vol. 31(3), pages 185-198, September.
    8. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    9. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    10. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    11. Gallice, Andrea, 2017. "An approximate solution to rent-seeking contests with private information," European Journal of Operational Research, Elsevier, vol. 256(2), pages 673-684.
    12. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    13. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    14. Subhayu Bandyopadhyay & Todd Sandler, 2022. "Voluntary participation in a terror group and counterterrorism policy," Working Papers 2022-023, Federal Reserve Bank of St. Louis.
    15. Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
    16. Ratul Lahkar & Rezina Sultana, 2023. "Rent dissipation in large population Tullock contests," Public Choice, Springer, vol. 197(1), pages 253-282, October.
    17. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    18. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    19. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    20. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    21. Jorge González-Ortega & Refik Soyer & David Ríos Insua & Fabrizio Ruggeri, 2021. "An Adversarial Risk Analysis Framework for Batch Acceptance Problems," Decision Analysis, INFORMS, vol. 18(1), pages 25-40, March.
    22. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    23. Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
    24. Edouard Kujawski, 2016. "A Probabilistic Game‐Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems," Systems Engineering, John Wiley & Sons, vol. 19(6), pages 549-566, November.
    25. Ioannidis, Christos & Pym, David & Williams, Julian, 2012. "Information security trade-offs and optimal patching policies," European Journal of Operational Research, Elsevier, vol. 216(2), pages 434-444.
    26. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    27. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    28. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    29. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    30. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    31. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    32. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    33. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    34. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    35. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
    36. Fabrizio Baiardi & Daniele Sgandurra, 2013. "Assessing ICT risk through a Monte Carlo method," Environment Systems and Decisions, Springer, vol. 33(4), pages 486-499, December.
    37. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    38. Fabrizio Baiardi & Federico Tonelli & Alessandro Bertolini, 2015. "Iterative selection of countermeasures for intelligent threat agents," International Journal of Network Management, John Wiley & Sons, vol. 25(5), pages 340-354, September.
    39. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    40. González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
    41. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    42. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    43. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    44. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).

  93. Gregory Levitin & Kjell Hausken, 2011. "Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace," Risk Analysis, John Wiley & Sons, vol. 31(10), pages 1632-1645, October.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    3. Li, Yijia & Hu, Xiaoxiao & Zhao, Peng, 2021. "On the reliability of a voting system under cyber attacks," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    4. Kaiye Gao & Hui Xiao & Li Qu & Shouyang Wang, 2022. "Optimal interception strategy of air defence missile system considering multiple targets and phases," Journal of Risk and Reliability, , vol. 236(1), pages 138-147, February.
    5. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    6. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    7. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    8. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.

  94. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.

    Cited by:

    1. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    2. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    3. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    4. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    5. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    6. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    7. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    8. Liles, Joseph M. & Robbins, Matthew J. & Lunday, Brian J., 2023. "Improving defensive air battle management by solving a stochastic dynamic assignment problem via approximate dynamic programming," European Journal of Operational Research, Elsevier, vol. 305(3), pages 1435-1449.
    9. Song, Yu & Chen, Bo & Hou, Na & Yang, Yi, 2022. "Terrorist attacks and oil prices: A time-varying causal relationship analysis," Energy, Elsevier, vol. 246(C).
    10. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    11. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    12. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    13. Jason R. W. Merrick & Fabrizio Ruggeri & Refik Soyer & L. Robin Keller, 2012. "From the Editors---Games and Decisions in Reliability and Risk," Decision Analysis, INFORMS, vol. 9(2), pages 81-85, June.
    14. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    15. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    16. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    17. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    18. G. Quijano, Eduardo & Ríos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
    19. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    20. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    21. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    22. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    23. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    24. L. Robin Keller & Kelly M. Kophazi, 2011. "From the Editors---Deterrence, Multiattribute Utility, and Probability and Bayes' Updating," Decision Analysis, INFORMS, vol. 8(2), pages 83-87, June.
    25. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    26. Fei He & Jun Zhuang & Nageswara S. V. Rao, 2020. "Discrete game-theoretic analysis of defense in correlated cyber-physical systems," Annals of Operations Research, Springer, vol. 294(1), pages 741-767, November.
    27. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    28. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    29. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    30. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    31. Yanling Chang & Alan Erera & Chelsea White, 2015. "A leader–follower partially observed, multiobjective Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 103-128, December.
    32. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.
    33. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    34. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    35. Rakesh K. Sarin & L. Robin Keller, 2013. "From the Editors: Probability Approximations, Anti-Terrorism Strategy, and Bull's-Eye Display for Performance Feedback," Decision Analysis, INFORMS, vol. 10(1), pages 1-5, March.
    36. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    37. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    38. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    39. Kevin S. Ni & Daniel Faissol & Thomas Edmunds & Richard Wheeler, 2013. "Exploitation of Ambiguous Cues to Infer Terrorist Activity," Decision Analysis, INFORMS, vol. 10(1), pages 42-62, March.
    40. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    41. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    42. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).

  95. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.

    Cited by:

    1. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    2. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    3. Hamid Mohtadi, 2017. "Risk‐Mitigating Policies and Adversarial Behavior: Case of Backlash," Risk Analysis, John Wiley & Sons, vol. 37(3), pages 459-470, March.
    4. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
    5. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    6. Song, Yu & Chen, Bo & Hou, Na & Yang, Yi, 2022. "Terrorist attacks and oil prices: A time-varying causal relationship analysis," Energy, Elsevier, vol. 246(C).
    7. Bagchi, Aniruddha & Paul, Jomon A., 2021. "National security vs. human rights: A game theoretic analysis of the tension between these objectives," European Journal of Operational Research, Elsevier, vol. 290(2), pages 790-805.
    8. Julei Fu & Duoyong Sun & Jian Chai & Jin Xiao & Shouyang Wang, 2015. "The “six-element” analysis method for the research on the characteristics of terrorist activities," Annals of Operations Research, Springer, vol. 234(1), pages 17-35, November.
    9. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    10. Jaspersen, Johannes G. & Montibeller, Gilberto, 2020. "On the learning patterns and adaptive behavior of terrorist organizations," European Journal of Operational Research, Elsevier, vol. 282(1), pages 221-234.
    11. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    12. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.
    13. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    14. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    15. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    16. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    17. Hamid Mohtadi & Bryan Weber, 2019. "Terrorism risk and optimal policy response: theory and empirics," Indian Growth and Development Review, Emerald Group Publishing Limited, vol. 13(2), pages 449-468, October.
    18. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    19. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    20. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.
    21. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    22. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.

  96. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.

    Cited by:

    1. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    2. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    3. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    4. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    5. Kaiye Gao & Hui Xiao & Li Qu & Shouyang Wang, 2022. "Optimal interception strategy of air defence missile system considering multiple targets and phases," Journal of Risk and Reliability, , vol. 236(1), pages 138-147, February.

  97. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.

    Cited by:

    1. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    2. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
    3. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    5. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    6. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    7. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    8. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    9. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    10. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    11. Eyal Pecht & Asher Tishler, 2017. "Budget allocation, national security, military intelligence, and human capital: a dynamic model," Defence and Peace Economics, Taylor & Francis Journals, vol. 28(3), pages 367-399, May.
    12. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    13. Losada, Chaya & Scaparra, M. Paola & O’Hanley, Jesse R., 2012. "Optimizing system resilience: A facility protection model with recovery time," European Journal of Operational Research, Elsevier, vol. 217(3), pages 519-530.
    14. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    15. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    16. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    17. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.

  98. K Hausken & G Levitin, 2010. "Defence of homogeneous parallel multi-state systems subject to two sequential attacks," Journal of Risk and Reliability, , vol. 224(3), pages 171-183, September.

    Cited by:

    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    3. J Setréus & D Månsson & P Hilber & S Arnborg, 2012. "Component ranking in Great Britain transmission system based on either equipment failures or sabotage," Journal of Risk and Reliability, , vol. 226(1), pages 96-108, February.
    4. Yun Zhang & Zhengguo Xu & Xinli Wang & Jiangang Lu & Youxian Sun, 2014. "Single minimal path based backup path for multi-state network," Journal of Risk and Reliability, , vol. 228(2), pages 152-165, April.
    5. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    6. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.

  99. Alnoor Bhimani & Kjell Hausken & Mthuli Ncube, 2010. "Agent takeover risk of principal in outsourcing relationships," Global Business and Economics Review, Inderscience Enterprises Ltd, vol. 12(4), pages 329-340.
    See citations under working paper version above.
  100. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.

    Cited by:

    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Levitin, Gregory & Xing, Liudong & Amari, Suprasad V. & Dai, Yuanshun, 2013. "Reliability of non-repairable phased-mission systems with propagated failures," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 218-228.
    3. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    4. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    5. Hiba Baroud & Kash Barker & Jose E. Ramirez‐Marquez & Claudio M. Rocco, 2015. "Inherent Costs and Interdependent Impacts of Infrastructure Network Resilience," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 642-662, April.
    6. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    7. Lins, Isis Didier & Rêgo, Leandro Chaves & Moura, Márcio das Chagas & Droguett, Enrique López, 2013. "Selection of security system design via games of imperfect information and multi-objective genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 59-66.
    8. Levitin, Gregory & Finkelstein, Maxim, 2017. "Effect of element separation in series-parallel systems exposed to random shocks," European Journal of Operational Research, Elsevier, vol. 260(1), pages 305-315.
    9. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    10. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

  101. Kjell Hausken, 2010. "Risk, production and conflict when utilities are as if certain," International Journal of Decision Sciences, Risk and Management, Inderscience Enterprises Ltd, vol. 2(3/4), pages 228-251.

    Cited by:

    1. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    2. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    3. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
    4. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    5. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    6. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    7. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    8. Kjell Hausken & Mthuli Ncube, 2016. "How Elections are Impacted by Production, Economic Growth and Conflict," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 18(01), pages 1-29, March.
    9. Hausken, Kjell & Ncube, Mthuli, 2012. "Production and Conflict in Risky Elections," UiS Working Papers in Economics and Finance 2012/14, University of Stavanger.

  102. Kjell Hausken, 2010. "Whether to attack growing assets and enterprises today or tomorrow," International Journal of Business Continuity and Risk Management, Inderscience Enterprises Ltd, vol. 1(4), pages 339-362.

    Cited by:

    1. Kjell Hausken, 2023. "Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints," SN Business & Economics, Springer, vol. 3(11), pages 1-18, November.

  103. Hausken, Kjell & Knutsen, John F., 2010. "An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units," Economics - The Open-Access, Open-Assessment E-Journal (2007-2020), Kiel Institute for the World Economy (IfW Kiel), vol. 4, pages 1-38.
    See citations under working paper version above.
  104. Kjell Hausken & John F. Moxnes, 2010. "A closure approximation technique for epidemic models," Mathematical and Computer Modelling of Dynamical Systems, Taylor & Francis Journals, vol. 16(6), pages 555-574, May.

    Cited by:

    1. Hausken, Kjell & Moxnes, John F., 2011. "Systematization of a set of closure techniques," Theoretical Population Biology, Elsevier, vol. 80(3), pages 175-184.

  105. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.

    Cited by:

    1. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.
    2. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    3. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    4. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    5. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    6. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    7. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    8. Olive Emil Wetter & Valentino Wüthrich, 2015. "“What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism," Defense & Security Analysis, Taylor & Francis Journals, vol. 31(3), pages 185-198, September.
    9. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    10. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    11. Zhang, Jianhua & Song, Bo & Zhang, Zhaojun & Liu, Haikuan, 2014. "An approach for modeling vulnerability of the network of networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 412(C), pages 127-136.
    12. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    13. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    14. Wang, Shuliang & Hong, Liu & Chen, Xueguang, 2012. "Vulnerability analysis of interdependent infrastructure systems: A methodological framework," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 391(11), pages 3323-3335.
    15. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    16. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    17. Fang, Yi-Ping & Zio, Enrico, 2019. "An adaptive robust framework for the optimization of the resilience of interdependent infrastructures under natural hazards," European Journal of Operational Research, Elsevier, vol. 276(3), pages 1119-1136.
    18. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.
    19. Oléron Evans, Thomas P. & Bishop, Steven R., 2013. "Static search games played over graphs and general metric spaces," European Journal of Operational Research, Elsevier, vol. 231(3), pages 667-689.
    20. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.
    21. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    22. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    23. Lalropuia, K.C. & Gupta, Vandana, 2019. "Modeling cyber-physical attacks based on stochastic game and Markov processes," Reliability Engineering and System Safety, Elsevier, vol. 181(C), pages 28-37.
    24. Zare Moayedi, Behzad & Azgomi, Mohammad Abdollahi, 2012. "A game theoretic framework for evaluation of the impacts of hackers diversity on security measures," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 45-54.
    25. Christopher Garcia, 2018. "Optimal multiunit transfer over adversarial paths with increasing intercept probabilities," IISE Transactions, Taylor & Francis Journals, vol. 50(11), pages 989-996, November.
    26. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    27. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    28. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    29. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    30. Fabrizio Baiardi & Daniele Sgandurra, 2013. "Assessing ICT risk through a Monte Carlo method," Environment Systems and Decisions, Springer, vol. 33(4), pages 486-499, December.
    31. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    32. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    33. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.

  106. Marianne Storm & Kjell Hausken & Aslaug Mikkelsen, 2010. "User involvement in in‐patient mental health services: operationalisation, empirical testing, and validation," Journal of Clinical Nursing, John Wiley & Sons, vol. 19(13‐14), pages 1897-1907, July.

    Cited by:

    1. Marianne Storm & Kjell Hausken & Knud Knudsen, 2011. "Inpatient service providers’ perspectives on service user involvement in Norwegian community mental health centres," International Journal of Social Psychiatry, , vol. 57(6), pages 551-563, November.

  107. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.

    Cited by:

    1. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    2. Baba Yumiko, 2012. "A Note on a Comparison of Simultaneous and Sequential Colonel Blotto Games," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 18(3), pages 1-6, December.
    3. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    4. Shakun D. Mago & Roman M. Sheremeta, 2012. "Multi-Battle Contests: An Experimental Study," Working Papers 12-06, Chapman University, Economic Science Institute.
    5. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    6. Hao Jia & Stergios Skaperdas & Samarth Vaidya, 2012. "Contest Functions: Theoretical Foundations and Issues in Estimation," Working Papers 111214, University of California-Irvine, Department of Economics.
    7. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    8. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    9. Hannah Lobban & Yasser Almoghathawi & Nazanin Tajik & Kash Barker, 2021. "Community vulnerability perspective on robust protection planning in interdependent infrastructure networks," Journal of Risk and Reliability, , vol. 235(5), pages 798-813, October.
    10. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    11. Gregory Levitin & Kjell Hausken, 2012. "Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 304-318, February.
    12. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    13. Cary Deck & Roman Sheremeta, 2010. "Fight or Flight? Defending Against Sequential Attacks in the Game of Siege," Working Papers 10-20, Chapman University, Economic Science Institute.
    14. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    15. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    16. Brian A Jackson & David R Frelinger & Jennifer Kavanagh & Brett A Wallace, 2021. "Adaptation by intelligent adversaries to defensive measures: framing adaptation options and demonstrating assessment of attacker preferences using proxy intelligence data," The Journal of Defense Modeling and Simulation, , vol. 18(2), pages 61-85, April.
    17. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    18. Pei-Yu Chen & Frank Yeong-Sung Lin, 2013. "Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-9, September.
    19. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
    20. Asma Ben Yaghlane & Mohamed Naceur Azaiez, 2019. "System survivability to continuous attacks: A game theoretic setting for constant attack rate processes," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(8), pages 1308-1320, August.
    21. Deck, Cary & Sheremeta, Roman, 2012. "Fight or Flight?," MPRA Paper 52130, University Library of Munich, Germany.

  108. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.

    Cited by:

    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    3. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
    4. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    5. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    6. Kjell Hausken, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 517-519, October.
    7. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    8. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    9. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    10. Frank Yeong-Sung Lin & Yu-Shun Wang & Ming-Yang Huang, 2013. "Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-11, August.
    11. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    12. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    13. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    14. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    15. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    16. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    17. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    18. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    19. B. S. Mahapatra & G. S. Mahapatra, 2010. "Reliability and cost analysis of series system models using fuzzy parametric geometric programming," Fuzzy Information and Engineering, Springer, vol. 2(4), pages 399-411, December.
    20. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    21. Pei-Yu Chen & Frank Yeong-Sung Lin, 2013. "Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-9, September.
    22. Jun Zhuang & Vicki M. Bier, 2010. "Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1737-1743, December.
    23. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    24. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    25. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    26. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    27. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
    28. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    29. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    30. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).

  109. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.

    Cited by:

    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    3. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    4. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    5. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    6. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    7. B. Golany & N. Goldberg & U. Rothblum, 2015. "Allocating multiple defensive resources in a zero-sum game setting," Annals of Operations Research, Springer, vol. 225(1), pages 91-109, February.
    8. Bagchi, Aniruddha & Paul, Jomon A., 2021. "National security vs. human rights: A game theoretic analysis of the tension between these objectives," European Journal of Operational Research, Elsevier, vol. 290(2), pages 790-805.
    9. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    10. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    11. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    12. Ghostine, Rony & Thiriet, Jean-Marc & Aubry, Jean-François, 2011. "Variable delays and message losses: Influence on the reliability of a control loop," Reliability Engineering and System Safety, Elsevier, vol. 96(1), pages 160-171.
    13. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    14. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    15. William N. Caballero & Ethan Gharst & David Banks & Jeffery D. Weir, 2023. "Multipolar Security Cooperation Planning: A Multiobjective, Adversarial-Risk-Analysis Approach," Decision Analysis, INFORMS, vol. 20(1), pages 16-39, March.
    16. Wang, Shuliang & Sun, Jingya & Zhang, Jianhua & Dong, Qiqi & Gu, Xifeng & Chen, Chen, 2023. "Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes," International Journal of Critical Infrastructure Protection, Elsevier, vol. 40(C).
    17. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    18. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    19. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    20. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

  110. Gregory Levitin & Kjell Hausken, 2009. "Intelligence and Impact Contests in Systems with Fake Targets," Defense & Security Analysis, Taylor & Francis Journals, vol. 25(2), pages 157-173, June.

    Cited by:

    1. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    2. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    3. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    4. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    5. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    6. Ghostine, Rony & Thiriet, Jean-Marc & Aubry, Jean-François, 2011. "Variable delays and message losses: Influence on the reliability of a control loop," Reliability Engineering and System Safety, Elsevier, vol. 96(1), pages 160-171.
    7. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    8. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    9. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    10. Wang, Shuliang & Sun, Jingya & Zhang, Jianhua & Dong, Qiqi & Gu, Xifeng & Chen, Chen, 2023. "Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes," International Journal of Critical Infrastructure Protection, Elsevier, vol. 40(C).
    11. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    12. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    13. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).

  111. K Hausken & G Levitin, 2009. "Parallel systems with different types of defence resource expenditure under two sequential attacks," Journal of Risk and Reliability, , vol. 223(1), pages 71-85, March.

    Cited by:

    1. Kjell Hausken, 2023. "Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints," SN Business & Economics, Springer, vol. 3(11), pages 1-18, November.
    2. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    3. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    4. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    5. Xuefeng Wang & Zhinan Wang & Ying Huang & Yun Chen & Yi Zhang & Huichao Ren & Rongrong Li & Jinhui Pang, 2017. "Measuring interdisciplinarity of a research system: detecting distinction between publication categories and citation categories," Scientometrics, Springer;Akadémiai Kiadó, vol. 111(3), pages 2023-2039, June.
    6. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.
    7. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    8. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.

  112. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.

    Cited by:

    1. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    2. X. Chen & J.-Z. Xu, 2013. "A novel method for waveform jamming based on millimeter-wave alternating current radiometer," Journal of Electromagnetic Waves and Applications, Taylor & Francis Journals, vol. 27(1), pages 66-76, January.
    3. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    4. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    5. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    6. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    7. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    8. Liles, Joseph M. & Robbins, Matthew J. & Lunday, Brian J., 2023. "Improving defensive air battle management by solving a stochastic dynamic assignment problem via approximate dynamic programming," European Journal of Operational Research, Elsevier, vol. 305(3), pages 1435-1449.
    9. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    10. Bagchi, Aniruddha & Paul, Jomon A., 2021. "National security vs. human rights: A game theoretic analysis of the tension between these objectives," European Journal of Operational Research, Elsevier, vol. 290(2), pages 790-805.
    11. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    12. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    13. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    14. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    15. Frank Yeong-Sung Lin & Yu-Shun Wang & Ming-Yang Huang, 2013. "Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-11, August.
    16. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    17. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    18. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    19. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.
    20. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    21. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    22. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    23. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    24. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    25. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    26. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    27. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    28. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    29. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    30. Lins, Isis Didier & Rêgo, Leandro Chaves & Moura, Márcio das Chagas & Droguett, Enrique López, 2013. "Selection of security system design via games of imperfect information and multi-objective genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 59-66.
    31. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    32. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    33. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    34. Welburn, Jonathan & Grana, Justin & Schwindt, Karen, 2023. "Cyber deterrence with imperfect attribution and unverifiable signaling," European Journal of Operational Research, Elsevier, vol. 306(3), pages 1399-1416.
    35. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    36. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).

  113. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.

    Cited by:

    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Bompard, E. & Napoli, R. & Xue, F., 2009. "Assessment of information impacts in power system security against malicious attacks in a general framework," Reliability Engineering and System Safety, Elsevier, vol. 94(6), pages 1087-1094.
    3. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    4. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    5. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    6. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    7. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    8. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    9. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    10. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    11. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    12. Zhou, Jun & Zhu, Jiaxing & Liang, Guangchuan & Ma, Junjie & He, Jiayi & Du, Penghua & Ye, Zhanpeng, 2024. "Three-layer and robust planning models to evaluate the strategies of defense layer, attack layer, and operation layer for optimal protection in natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 249(C).
    13. Fei He & Jun Zhuang & Nageswara S. V. Rao, 2020. "Discrete game-theoretic analysis of defense in correlated cyber-physical systems," Annals of Operations Research, Springer, vol. 294(1), pages 741-767, November.
    14. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.

  114. John F. Moxnes & Kjell Hausken, 2009. "A dynamic model of Nordic diagonal stride skiing, with a literature review of cross country skiing," Computer Methods in Biomechanics and Biomedical Engineering, Taylor & Francis Journals, vol. 12(5), pages 531-551.

    Cited by:

    1. Kjell Hausken, 2017. "Exhaustive Classification and Review of Techniques and Research Program for Techniques for Skate Skiing, Classical Skiing, and Ski Mountaineering," The Open Sports Sciences Journal, Bentham Open, vol. 10(1), pages 160-178, October.
    2. Peter Carlsson & Mats Tinnsten & Mats Ainegren, 2011. "Numerical simulation of cross-country skiing," Computer Methods in Biomechanics and Biomedical Engineering, Taylor & Francis Journals, vol. 14(08), pages 741-746.

  115. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.

    Cited by:

    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    3. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    4. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    5. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    6. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    7. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    8. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    9. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    10. Xuefeng Wang & Zhinan Wang & Ying Huang & Yun Chen & Yi Zhang & Huichao Ren & Rongrong Li & Jinhui Pang, 2017. "Measuring interdisciplinarity of a research system: detecting distinction between publication categories and citation categories," Scientometrics, Springer;Akadémiai Kiadó, vol. 111(3), pages 2023-2039, June.
    11. Gregory Levitin & Kjell Hausken, 2013. "Parallel systems under two sequential attacks with contest intensity variation," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 21(1), pages 207-224, January.
    12. Rui Fang & Xiaohu Li, 2020. "A stochastic model of cyber attacks with imperfect detection," Communications in Statistics - Theory and Methods, Taylor & Francis Journals, vol. 49(9), pages 2158-2175, May.
    13. Gregory Levitin & Kjell Hausken, 2012. "Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 304-318, February.
    14. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    15. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    16. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    17. Pei-Yu Chen & Frank Yeong-Sung Lin, 2013. "Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-9, September.
    18. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    19. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    20. Asma Ben Yaghlane & Mohamed Naceur Azaiez, 2019. "System survivability to continuous attacks: A game theoretic setting for constant attack rate processes," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(8), pages 1308-1320, August.
    21. Wang, Wei & Di Maio, Francesco & Zio, Enrico, 2020. "Considering the human operator cognitive process for the interpretation of diagnostic outcomes related to component failures and cyber security attacks," Reliability Engineering and System Safety, Elsevier, vol. 202(C).

  116. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.

    Cited by:

    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    3. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    4. McCarter, Matthew & Barker, Kash & Johansson, Jonas & Ramirez-Marquez, Jose E., 2018. "A bi-objective formulation for robust defense strategies in multi-commodity networks," Reliability Engineering and System Safety, Elsevier, vol. 176(C), pages 154-161.
    5. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    6. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    7. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    8. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2013. "Evaluating the damage associated with intentional supply deprivation in multi-commodity network," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 11-17.
    9. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    10. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2011. "Evaluating the damage associated with intentional network disintegration," Reliability Engineering and System Safety, Elsevier, vol. 96(4), pages 433-439.
    11. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.

  117. Hausken, Kjell & Levitin, Gregory, 2009. "Minmax defense strategy for complex multi-state systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 577-587.

    Cited by:

    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    3. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    4. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    5. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    6. Fang, Yiping & Sansavini, Giovanni, 2017. "Optimizing power system investments and resilience against attacks," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 161-173.
    7. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    8. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    9. Henry, Devanandham & Emmanuel Ramirez-Marquez, Jose, 2012. "Generic metrics and quantitative approaches for system resilience as a function of time," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 114-122.
    10. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    11. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    12. McCarter, Matthew & Barker, Kash & Johansson, Jonas & Ramirez-Marquez, Jose E., 2018. "A bi-objective formulation for robust defense strategies in multi-commodity networks," Reliability Engineering and System Safety, Elsevier, vol. 176(C), pages 154-161.
    13. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    14. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    15. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    16. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    17. Yuan, Wei & Zhao, Long & Zeng, Bo, 2014. "Optimal power grid protection through a defender–attacker–defender model," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 83-89.
    18. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    19. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    20. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    21. Reniers, Genserik & Soudan, Karel, 2010. "A game-theoretical approach for reciprocal security-related prevention investment decisions," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 1-9.
    22. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    23. Bricha, Naji & Nourelfath, Mustapha, 2015. "Protection of warehouses and plants under capacity constraint," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 93-104.
    24. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
    25. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    26. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    27. Guozhen Xiong & Chi Zhang & Fei Zhou, 2017. "A robust reliability redundancy allocation problem under abnormal external failures guided by a new importance measure," Journal of Risk and Reliability, , vol. 231(2), pages 180-199, April.
    28. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    29. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    30. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    31. Li, Xingyu & Epureanu, Bogdan I., 2020. "AI-based competition of autonomous vehicle fleets with application to fleet modularity," European Journal of Operational Research, Elsevier, vol. 287(3), pages 856-874.
    32. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    33. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    34. Wu, Di & Liu, Xiang-dong & Yan, Xiang-bin & Peng, Rui & Li, Gang, 2019. "Equilibrium analysis of bitcoin block withholding attack: A generalized model," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 318-328.
    35. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    36. Sayed, Ahmed R. & Wang, Cheng & Bi, Tianshu, 2019. "Resilient operational strategies for power systems considering the interactions with natural gas systems," Applied Energy, Elsevier, vol. 241(C), pages 548-566.
    37. Iaiani, Matteo & Tugnoli, Alessandro & Macini, Paolo & Cozzani, Valerio, 2021. "Outage and asset damage triggered by malicious manipulation of the control system in process plants," Reliability Engineering and System Safety, Elsevier, vol. 213(C).
    38. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    39. Zare Moayedi, Behzad & Azgomi, Mohammad Abdollahi, 2012. "A game theoretic framework for evaluation of the impacts of hackers diversity on security measures," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 45-54.
    40. Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
    41. Kaiye Gao & Hui Xiao & Li Qu & Shouyang Wang, 2022. "Optimal interception strategy of air defence missile system considering multiple targets and phases," Journal of Risk and Reliability, , vol. 236(1), pages 138-147, February.
    42. Wu Jun & Yang Hui & Cheng Yuan, 2015. "Domino Effect Analysis, Assessment and Prevention in Process Industries," Journal of Systems Science and Information, De Gruyter, vol. 3(6), pages 481-498, December.
    43. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    44. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    45. Chen, Chao & Reniers, Genserik & Khakzad, Nima, 2019. "Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: A dynamic graph approach," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    46. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    47. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    48. Lins, Isis Didier & Rêgo, Leandro Chaves & Moura, Márcio das Chagas & Droguett, Enrique López, 2013. "Selection of security system design via games of imperfect information and multi-objective genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 59-66.
    49. Ouyang, Min, 2017. "A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1072-1084.
    50. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    51. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    52. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    53. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    54. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    55. Asma Ben Yaghlane & Mohamed Naceur Azaiez, 2019. "System survivability to continuous attacks: A game theoretic setting for constant attack rate processes," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(8), pages 1308-1320, August.
    56. Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
    57. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    58. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.

  118. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.

    Cited by:

    1. Subhasish M. Chowdhury & Iryna Topolyan, 2013. "The Attack-and-Defence Group Contests," University of East Anglia Applied and Financial Economics Working Paper Series 049, School of Economics, University of East Anglia, Norwich, UK..
    2. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.
    3. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    4. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    5. Deck, Cary & Foster, Joshua & Song, Hongwei, 2015. "Defense against an opportunistic challenger: Theory and experiments," European Journal of Operational Research, Elsevier, vol. 242(2), pages 501-513.
    6. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    7. Subhasish Chowdhury & Dan Kovenock & Roman Sheremeta, 2013. "An experimental investigation of Colonel Blotto games," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 52(3), pages 833-861, April.
    8. Paola Cappanera & Maria Paola Scaparra, 2011. "Optimal Allocation of Protective Resources in Shortest-Path Networks," Transportation Science, INFORMS, vol. 45(1), pages 64-80, February.
    9. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    10. Fang, Yiping & Sansavini, Giovanni, 2017. "Optimizing power system investments and resilience against attacks," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 161-173.
    11. Bompard, E. & Napoli, R. & Xue, F., 2009. "Assessment of information impacts in power system security against malicious attacks in a general framework," Reliability Engineering and System Safety, Elsevier, vol. 94(6), pages 1087-1094.
    12. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    13. Irfanoglu, Zeynep & Mago, Shakun & Sheremeta, Roman, 2015. "New Hampshire Effect: Behavior in Sequential and Simultaneous Election Contests," MPRA Paper 67520, University Library of Munich, Germany.
    14. Dong, Mingxin & Zhang, Zhen & Liu, Yi & Zhao, Dong Feng & Meng, Yifei & Shi, Jihao, 2023. "Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
    15. Subhasish M. Chowdhury & Iryna Topolyan, 2015. "The Group All-Pay Auction with Heterogeneous Impact Functions," University of East Anglia Applied and Financial Economics Working Paper Series 069, School of Economics, University of East Anglia, Norwich, UK..
    16. Hausken, Kjell & Levitin, Gregory, 2009. "Minmax defense strategy for complex multi-state systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 577-587.
    17. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    18. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
    19. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    20. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    21. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    22. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    23. Kjell Hausken, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 517-519, October.
    24. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    25. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    26. Gallice, Andrea, 2017. "An approximate solution to rent-seeking contests with private information," European Journal of Operational Research, Elsevier, vol. 256(2), pages 673-684.
    27. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    28. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    29. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    30. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    31. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    32. Yuan, Wei & Zhao, Long & Zeng, Bo, 2014. "Optimal power grid protection through a defender–attacker–defender model," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 83-89.
    33. Dan Kovenock & Brian Roberson, 2017. "The Optimal Defense of Networks of Targets," Working Papers 17-18, Chapman University, Economic Science Institute.
    34. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    35. Reniers, Genserik & Soudan, Karel, 2010. "A game-theoretical approach for reciprocal security-related prevention investment decisions," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 1-9.
    36. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    37. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    38. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
    39. Gregory Levitin & Kjell Hausken, 2011. "Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace," Risk Analysis, John Wiley & Sons, vol. 31(10), pages 1632-1645, October.
    40. Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
    41. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    42. Ríos Insua, David & Ruggeri, Fabrizio & Soyer, Refik & Rasines, Daniel G., 2018. "Adversarial issues in reliability," European Journal of Operational Research, Elsevier, vol. 266(3), pages 1113-1119.
    43. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.
    44. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    45. Kiril Tenekedjiev & Simon Cooley & Boyan Mednikarov & Guixin Fan & Natalia Nikolova, 2021. "Reliability Simulation of Two Component Warm-Standby System with Repair, Switching, and Back-Switching Failures under Three Aging Assumptions," Mathematics, MDPI, vol. 9(20), pages 1-40, October.
    46. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    47. Shakun D. Mago & Roman M. Sheremeta, 2019. "New Hampshire Effect: behavior in sequential and simultaneous multi-battle contests," Experimental Economics, Springer;Economic Science Association, vol. 22(2), pages 325-349, June.
    48. Arad, Ayala & Penczynski, Stefan P., 2024. "Multi-dimensional reasoning in competitive resource allocation games: Evidence from intra-team communication," Games and Economic Behavior, Elsevier, vol. 144(C), pages 355-377.
    49. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    50. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    51. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    52. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    53. Zare Moayedi, Behzad & Azgomi, Mohammad Abdollahi, 2012. "A game theoretic framework for evaluation of the impacts of hackers diversity on security measures," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 45-54.
    54. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    55. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    56. Christopher Garcia, 2018. "Optimal multiunit transfer over adversarial paths with increasing intercept probabilities," IISE Transactions, Taylor & Francis Journals, vol. 50(11), pages 989-996, November.
    57. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    58. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    59. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2021. "Minimization of Expected User Losses Considering Co-resident Attacks in Cloud System with Task Replication and Cancellation," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    60. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    61. Gregor, Martin, 2015. "Task divisions in teams with complementary tasks," Journal of Economic Behavior & Organization, Elsevier, vol. 117(C), pages 102-120.
    62. Alper Atamtürk & Andrés Gómez, 2017. "Maximizing a Class of Utility Functions Over the Vertices of a Polytope," Operations Research, INFORMS, vol. 65(2), pages 433-445, March-Apr.
    63. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    64. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Barker, Kash & Moronta, Jose, 2018. "Quantifying the resilience of community structures in networks," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 466-474.
    65. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
    66. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Rejoinder," Purdue University Economics Working Papers 1268, Purdue University, Department of Economics.
    67. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    68. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    69. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    70. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
    71. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    72. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    73. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    74. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    75. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    76. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    77. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    78. Subhasish M. Chowdhury & Iryna Topolyan, 2016. "The Attack-And-Defense Group Contests: Best Shot Versus Weakest Link," Economic Inquiry, Western Economic Association International, vol. 54(1), pages 548-557, January.

  119. Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.

    Cited by:

    1. Kjell Hausken, 2023. "Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints," SN Business & Economics, Springer, vol. 3(11), pages 1-18, November.
    2. J. Atsu Amegashie & Marco Runkel, 2008. "The Paradoxes of Revenge in Conflicts," Working Papers 0805, University of Guelph, Department of Economics and Finance.
    3. Shakun D. Mago & Roman M. Sheremeta, 2012. "Multi-Battle Contests: An Experimental Study," Working Papers 12-06, Chapman University, Economic Science Institute.
    4. Satya P. Das & Prabal Roy Chowdhury, 2014. "Deterrence, Preemption, And Panic: A Common-Enemy Problem Of Terrorism," Economic Inquiry, Western Economic Association International, vol. 52(1), pages 219-238, January.
    5. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    6. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    7. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    8. Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.
    9. Subhayu Bandyopadhyay & Todd Sandler, 2022. "Voluntary participation in a terror group and counterterrorism policy," Working Papers 2022-023, Federal Reserve Bank of St. Louis.
    10. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    11. Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
    12. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    13. Cárceles-Poveda, Eva & Tauman, Yair, 2011. "A strategic analysis of the war against transnational terrorism," Games and Economic Behavior, Elsevier, vol. 71(1), pages 49-65, January.
    14. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    15. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    16. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    17. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    18. Khusrav Gaibulloev & Todd Sandler, 2023. "Common myths of terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 37(2), pages 271-301, April.
    19. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    20. Satya P. Das & Sajal Lahiri, 2021. "Why direct counter‐terrorism measures only may fail: An analysis of direct and preventive counter‐terrorism measures," International Journal of Economic Theory, The International Society for Economic Theory, vol. 17(4), pages 416-445, December.
    21. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
    22. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.
    23. Kjell Hausken, 2019. "A Game Theoretic Model of Adversaries and Media Manipulation," Games, MDPI, vol. 10(4), pages 1-15, December.
    24. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    25. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.

  120. John F. Moxnes & Kjell Hausken, 2008. "Cross-country skiing motion equations, locomotive forces and mass scaling laws," Mathematical and Computer Modelling of Dynamical Systems, Taylor & Francis Journals, vol. 14(6), pages 535-569, April.

    Cited by:

    1. Kjell Hausken, 2017. "Exhaustive Classification and Review of Techniques and Research Program for Techniques for Skate Skiing, Classical Skiing, and Ski Mountaineering," The Open Sports Sciences Journal, Bentham Open, vol. 10(1), pages 160-178, October.

  121. Hausken, Kjell & Hirshleifer, Jack, 2008. "Truthful signalling, the heritability paradox, and the Malthusian equi-marginal principle," Theoretical Population Biology, Elsevier, vol. 73(1), pages 11-23.
    See citations under working paper version above.
  122. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.

    Cited by:

    1. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.
    2. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    3. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    4. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    5. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    6. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    7. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    8. Gregory Levitin & Maxim Finkelstein, 2017. "A new stress–strength model for systems subject to stochastic shocks," Journal of Risk and Reliability, , vol. 231(2), pages 172-179, April.
    9. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.
    10. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    11. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    12. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    13. Gregory Levitin & Liudong Xing & Hong‐Zhong Huang, 2019. "Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 846-858, April.
    14. Kjell Hausken, 2019. "A Game Theoretic Model of Adversaries and Media Manipulation," Games, MDPI, vol. 10(4), pages 1-15, December.

  123. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.

    Cited by:

    1. Subhasish M. Chowdhury & Iryna Topolyan, 2013. "The Attack-and-Defence Group Contests," University of East Anglia Applied and Financial Economics Working Paper Series 049, School of Economics, University of East Anglia, Norwich, UK..
    2. Hausken, Kjell, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply on Comment," MPRA Paper 25497, University Library of Munich, Germany, revised 02 Oct 2010.
    3. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    4. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    5. Deck, Cary & Foster, Joshua & Song, Hongwei, 2015. "Defense against an opportunistic challenger: Theory and experiments," European Journal of Operational Research, Elsevier, vol. 242(2), pages 501-513.
    6. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    7. Subhasish Chowdhury & Dan Kovenock & Roman Sheremeta, 2013. "An experimental investigation of Colonel Blotto games," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 52(3), pages 833-861, April.
    8. Paola Cappanera & Maria Paola Scaparra, 2011. "Optimal Allocation of Protective Resources in Shortest-Path Networks," Transportation Science, INFORMS, vol. 45(1), pages 64-80, February.
    9. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    10. Fang, Yiping & Sansavini, Giovanni, 2017. "Optimizing power system investments and resilience against attacks," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 161-173.
    11. Bompard, E. & Napoli, R. & Xue, F., 2009. "Assessment of information impacts in power system security against malicious attacks in a general framework," Reliability Engineering and System Safety, Elsevier, vol. 94(6), pages 1087-1094.
    12. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    13. Irfanoglu, Zeynep & Mago, Shakun & Sheremeta, Roman, 2015. "New Hampshire Effect: Behavior in Sequential and Simultaneous Election Contests," MPRA Paper 67520, University Library of Munich, Germany.
    14. Dong, Mingxin & Zhang, Zhen & Liu, Yi & Zhao, Dong Feng & Meng, Yifei & Shi, Jihao, 2023. "Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
    15. Subhasish M. Chowdhury & Iryna Topolyan, 2015. "The Group All-Pay Auction with Heterogeneous Impact Functions," University of East Anglia Applied and Financial Economics Working Paper Series 069, School of Economics, University of East Anglia, Norwich, UK..
    16. Hausken, Kjell & Levitin, Gregory, 2009. "Minmax defense strategy for complex multi-state systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 577-587.
    17. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    18. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
    19. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    20. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    21. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    22. Kjell Hausken, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 517-519, October.
    23. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    24. Gallice, Andrea, 2017. "An approximate solution to rent-seeking contests with private information," European Journal of Operational Research, Elsevier, vol. 256(2), pages 673-684.
    25. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    26. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    27. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    28. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    29. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    30. Yuan, Wei & Zhao, Long & Zeng, Bo, 2014. "Optimal power grid protection through a defender–attacker–defender model," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 83-89.
    31. Dan Kovenock & Brian Roberson, 2017. "The Optimal Defense of Networks of Targets," Working Papers 17-18, Chapman University, Economic Science Institute.
    32. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    33. Reniers, Genserik & Soudan, Karel, 2010. "A game-theoretical approach for reciprocal security-related prevention investment decisions," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 1-9.
    34. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    35. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    36. Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
    37. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    38. Kjell Hausken, 2012. "Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 525-531, October.
    39. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    40. Kiril Tenekedjiev & Simon Cooley & Boyan Mednikarov & Guixin Fan & Natalia Nikolova, 2021. "Reliability Simulation of Two Component Warm-Standby System with Repair, Switching, and Back-Switching Failures under Three Aging Assumptions," Mathematics, MDPI, vol. 9(20), pages 1-40, October.
    41. Shakun D. Mago & Roman M. Sheremeta, 2019. "New Hampshire Effect: behavior in sequential and simultaneous multi-battle contests," Experimental Economics, Springer;Economic Science Association, vol. 22(2), pages 325-349, June.
    42. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    43. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    44. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    45. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    46. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    47. Christopher Garcia, 2018. "Optimal multiunit transfer over adversarial paths with increasing intercept probabilities," IISE Transactions, Taylor & Francis Journals, vol. 50(11), pages 989-996, November.
    48. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    49. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    50. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2021. "Minimization of Expected User Losses Considering Co-resident Attacks in Cloud System with Task Replication and Cancellation," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    51. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    52. Gregor, Martin, 2015. "Task divisions in teams with complementary tasks," Journal of Economic Behavior & Organization, Elsevier, vol. 117(C), pages 102-120.
    53. Alper Atamtürk & Andrés Gómez, 2017. "Maximizing a Class of Utility Functions Over the Vertices of a Polytope," Operations Research, INFORMS, vol. 65(2), pages 433-445, March-Apr.
    54. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    55. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    56. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Barker, Kash & Moronta, Jose, 2018. "Quantifying the resilience of community structures in networks," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 466-474.
    57. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    58. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Rejoinder," Purdue University Economics Working Papers 1268, Purdue University, Department of Economics.
    59. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    60. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    61. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    62. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
    63. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    64. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    65. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    66. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    67. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.

  124. John F. Moxnes & Kjell Hausken, 2008. "The dynamics of athletic performance, fitness and fatigue," Mathematical and Computer Modelling of Dynamical Systems, Taylor & Francis Journals, vol. 14(6), pages 515-533, May.

    Cited by:

    1. Guillaume Roels, 2020. "High-Performance Practice Processes," Management Science, INFORMS, vol. 66(4), pages 1509-1526, April.

  125. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.

    Cited by:

    1. D E Salazar A & C M Rocco S & E Zio, 2008. "Optimal protection of complex networks exposed to a terrorist hazard: A multi-objective evolutionary approach," Journal of Risk and Reliability, , vol. 222(3), pages 327-335, September.
    2. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    3. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    4. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    5. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    6. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    7. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    8. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    9. McCarter, Matthew & Barker, Kash & Johansson, Jonas & Ramirez-Marquez, Jose E., 2018. "A bi-objective formulation for robust defense strategies in multi-commodity networks," Reliability Engineering and System Safety, Elsevier, vol. 176(C), pages 154-161.
    10. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    11. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    12. Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
    13. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    14. Gregory Levitin & Maxim Finkelstein, 2017. "A new stress–strength model for systems subject to stochastic shocks," Journal of Risk and Reliability, , vol. 231(2), pages 172-179, April.
    15. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    16. Gregory Levitin & Kjell Hausken, 2011. "Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace," Risk Analysis, John Wiley & Sons, vol. 31(10), pages 1632-1645, October.
    17. Vahabi,Mehrdad, 2015. "The Political Economy of Predation," Cambridge Books, Cambridge University Press, number 9781107133976, September.
    18. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    19. Gregory Levitin & Kjell Hausken, 2013. "Parallel systems under two sequential attacks with contest intensity variation," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 21(1), pages 207-224, January.
    20. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.
    21. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    22. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    23. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    24. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    25. Dui, Hongyan & Si, Shubin & Wu, Shaomin & Yam, Richard C.M., 2017. "An importance measure for multistate systems with external factors," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 49-57.
    26. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    27. Alper Atamtürk & Andrés Gómez, 2017. "Maximizing a Class of Utility Functions Over the Vertices of a Polytope," Operations Research, INFORMS, vol. 65(2), pages 433-445, March-Apr.
    28. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    29. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    30. Lins, Isis Didier & Rêgo, Leandro Chaves & Moura, Márcio das Chagas & Droguett, Enrique López, 2013. "Selection of security system design via games of imperfect information and multi-objective genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 59-66.
    31. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    32. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.

  126. Kjell Hausken, 2007. "Stubbornness, Power, and Equilibrium Selection in Repeated Games with Multiple Equilibria," Theory and Decision, Springer, vol. 62(2), pages 135-160, March.

    Cited by:

    1. Jan Libich & Dat Thanh Nguyen, 2022. "When a compromise gets compromised by another compromise," Australian Economic Papers, Wiley Blackwell, vol. 61(4), pages 678-716, December.
    2. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.

  127. Moxnes, John F. & Hausken, Kjell, 2007. "The population dynamics of potato cyst nematodes," Ecological Modelling, Elsevier, vol. 207(2), pages 339-348.

    Cited by:

    1. Stucchi, Luciano & Giménez-Benavides, Luis & Galeano, Javier, 2019. "The role of parasitoids in a nursery-pollinator system: A population dynamics model," Ecological Modelling, Elsevier, vol. 396(C), pages 50-58.

  128. Hausken, Kjell, 2007. "Information sharing among firms and cyber attacks," Journal of Accounting and Public Policy, Elsevier, vol. 26(6), pages 639-688.

    Cited by:

    1. Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.
    2. Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
    3. Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.
    4. Tania Wallis & Rafał Leszczyna, 2022. "EE-ISAC—Practical Cybersecurity Solution for the Energy Sector," Energies, MDPI, vol. 15(6), pages 1-23, March.
    5. Daniel Schatz & Rabih Bashroush, 0. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 0, pages 1-24.
    6. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    7. Yosra Miaoui & Noureddine Boudriga, 2019. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 21(2), pages 261-300, April.
    8. Chul Ho Lee & Xianjun Geng & Srinivasan Raghunathan, 2016. "Mandatory Standards and Organizational Information Security," Information Systems Research, INFORMS, vol. 27(1), pages 70-86, March.
    9. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    10. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    11. Xiaofei Qian & Jun Pei & Xinbao Liu & Mi Zhou & Panos M. Pardalos, 2019. "Information security decisions for two firms in a market with different types of customers," Journal of Combinatorial Optimization, Springer, vol. 38(4), pages 1263-1285, November.
    12. Xiaotong Li, 2022. "An evolutionary game‐theoretic analysis of enterprise information security investment based on information sharing platform," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(3), pages 595-606, April.
    13. Daniel Schatz & Rabih Bashroush, 2017. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 19(5), pages 1205-1228, October.
    14. Xinbao Liu & Xiaofei Qian & Jun Pei & Panos M. Pardalos, 2018. "Security investment and information sharing in the market of complementary firms: impact of complementarity degree and industry size," Journal of Global Optimization, Springer, vol. 70(2), pages 413-436, February.
    15. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    16. Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
    17. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    18. Camélia Radu & Nadia Smaili, 2022. "Board Gender Diversity and Corporate Response to Cyber Risk: Evidence from Cybersecurity Related Disclosure," Journal of Business Ethics, Springer, vol. 177(2), pages 351-374, May.
    19. Xiaofei Qian & Xinbao Liu & Jun Pei & Panos M. Pardalos, 2018. "A new game of information sharing and security investment between two allied firms," International Journal of Production Research, Taylor & Francis Journals, vol. 56(12), pages 4069-4086, June.
    20. Xing Gao & Weijun Zhong, 2015. "Information security investment for competitive firms with hacker behavior and security requirements," Annals of Operations Research, Springer, vol. 235(1), pages 277-300, December.
    21. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
    22. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    23. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    24. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
    25. Alain Mermoud & Marcus Matthias Keupp & Kévin Huguenin & Maximilian Palmié & Dimitri Percia David, 2019. "To share or not to share: A behavioral perspective on human participation in security information sharing," Post-Print hal-02147702, HAL.
    26. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    27. Solak, Senay & Zhuo, Yueran, 2020. "Optimal policies for information sharing in information system security," European Journal of Operational Research, Elsevier, vol. 284(3), pages 934-950.
    28. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    29. Xing Gao & Siyu Gong, 2022. "An economic analysis of information security outsourcing with competitive firms," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(7), pages 2748-2758, October.
    30. Xiaotong Li & Qianyao Xue, 2021. "An economic analysis of information security investment decision making for substitutable enterprises," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 42(5), pages 1306-1316, July.
    31. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    32. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
    33. Yosra Miaoui & Noureddine Boudriga, 0. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 0, pages 1-40.
    34. Meilin He & Laura Devine & Jun Zhuang, 2018. "Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 215-225, February.
    35. Ali Pala & Jun Zhuang, 2019. "Information Sharing in Cybersecurity: A Review," Decision Analysis, INFORMS, vol. 16(3), pages 172-196, September.
    36. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    37. Tridib Bandyopadhyay & Dengpan Liu & Vijay S. Mookerjee & Allen W. Wilhite, 2014. "Dynamic competition in IT security: A differential games approach," Information Systems Frontiers, Springer, vol. 16(4), pages 643-661, September.
    38. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Optimal defense of a distributed data storage system against hackers’ attacks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    39. Yosra Miaoui & Noureddine Boudriga, 2019. "Enterprise security economics: A self‐defense versus cyber‐insurance dilemma," Applied Stochastic Models in Business and Industry, John Wiley & Sons, vol. 35(3), pages 448-478, May.

  129. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.

    Cited by:

    1. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.

  130. Magne Emhjellen & Kjell Hausken & Petter Osmundsen, 2006. "The choice of strategic core – impact of financial volume," International Journal of Global Energy Issues, Inderscience Enterprises Ltd, vol. 26(1/2), pages 136-157.

    Cited by:

    1. Osmundsen, Petter & Lovas, Kjell & Emhjellen, Magne, 2017. "Petroleum tax competition subject to capital rationing," UiS Working Papers in Economics and Finance 2017/5, University of Stavanger.
    2. Elmhjellen, Magne & Osmundsen, Petter, 2016. "Oil project selection by metrics," UiS Working Papers in Economics and Finance 2016/5, University of Stavanger.
    3. Magne Emhjellen & Petter Osmundsen, 2013. "CCS - Failing to Pass Decision Gates," CESifo Working Paper Series 4525, CESifo.
    4. Osmundsen, Petter & Emhjellen, Magne, 2010. "Decision criteria for climate projects," UiS Working Papers in Economics and Finance 2010/2, University of Stavanger.

  131. Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.

    Cited by:

    1. Derrick Huang, C. & Hu, Qing & Behara, Ravi S., 2008. "An economic analysis of the optimal information security investment in the case of a risk-averse firm," International Journal of Production Economics, Elsevier, vol. 114(2), pages 793-804, August.
    2. Mayadunne, Sanjaya & Park, Sungjune, 2016. "An economic model to evaluate information security investment of risk-taking small and medium enterprises," International Journal of Production Economics, Elsevier, vol. 182(C), pages 519-530.
    3. Kjell Hausken, 2014. "Returns to information security investment: Endogenizing the expected loss," Information Systems Frontiers, Springer, vol. 16(2), pages 329-336, April.
    4. Xiaofei Qian & Xinbao Liu & Jun Pei & Panos M. Pardalos & Lin Liu, 2017. "A game-theoretic analysis of information security investment for multiple firms in a network," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(10), pages 1290-1305, October.
    5. Yosra Miaoui & Noureddine Boudriga, 2019. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 21(2), pages 261-300, April.
    6. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    7. Chul Ho Lee & Xianjun Geng & Srinivasan Raghunathan, 2016. "Mandatory Standards and Organizational Information Security," Information Systems Research, INFORMS, vol. 27(1), pages 70-86, March.
    8. Guang Zhu & Hu Liu & Mining Feng, 2018. "Sustainability of Information Security Investment in Online Social Networks: An Evolutionary Game-Theoretic Approach," Mathematics, MDPI, vol. 6(10), pages 1-19, September.
    9. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    10. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    11. Anna Nagurney & Ladimer Nagurney, 2015. "A game theory model of cybersecurity investments with information asymmetry," Netnomics, Springer, vol. 16(1), pages 127-148, August.
    12. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    13. Mansooreh Ezhei & Behrouz Tork Ladani, 2020. "Interdependency Analysis in Security Investment against Strategic Attacks," Information Systems Frontiers, Springer, vol. 22(1), pages 187-201, February.
    14. Xiaofei Qian & Jun Pei & Xinbao Liu & Mi Zhou & Panos M. Pardalos, 2019. "Information security decisions for two firms in a market with different types of customers," Journal of Combinatorial Optimization, Springer, vol. 38(4), pages 1263-1285, November.
    15. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    16. Alessandro Mazzoccoli, 2023. "Optimal Cyber Security Investment in a Mixed Risk Management Framework: Examining the Role of Cyber Insurance and Expenditure Analysis," Risks, MDPI, vol. 11(9), pages 1-14, August.
    17. Daniel Schatz & Rabih Bashroush, 2017. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 19(5), pages 1205-1228, October.
    18. Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
    19. Bin Srinidhi & Jia Yan & Giri Kumar Tayi, 2008. "Firm-level Resource Allocation to Information Security in the Presence of Financial Distress," Working Papers 2008-17, School of Economic Sciences, Washington State University.
    20. Feng Xu & Xin (Robert) Luo & Hongyun Zhang & Shan Liu & Wei (Wayne) Huang, 2019. "Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect," Information Systems Frontiers, Springer, vol. 21(5), pages 1069-1083, October.
    21. Fabio BISOGNI & Simona CAVALLINI & Sara DI TROCCHIO, 2011. "Cybersecurity at European Level: The Role of Information Availability," Communications & Strategies, IDATE, Com&Strat dept., vol. 1(81), pages 105-124, 1st quart.
    22. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
    23. Loic Mar'echal & Alain Mermoud & Dimitri Percia David & Mathias Humbert, 2024. "Measuring the performance of investments in information security startups: An empirical analysis by cybersecurity sectors using Crunchbase data," Papers 2402.04765, arXiv.org, revised Feb 2024.
    24. Schilling, Andreas & Werners, Brigitte, 2016. "Optimal selection of IT security safeguards from an existing knowledge base," European Journal of Operational Research, Elsevier, vol. 248(1), pages 318-327.
    25. Jaume Belles‐Sampera & Montserrat Guillén & Miguel Santolino, 2014. "Beyond Value‐at‐Risk: GlueVaR Distortion Risk Measures," Risk Analysis, John Wiley & Sons, vol. 34(1), pages 121-134, January.
    26. Xing Gao & Weijun Zhong, 2015. "Information security investment for competitive firms with hacker behavior and security requirements," Annals of Operations Research, Springer, vol. 235(1), pages 277-300, December.
    27. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
    28. Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.
    29. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    30. Guang Zhu & Hu Liu & Mining Feng, 2018. "An Evolutionary Game-Theoretic Approach for Assessing Privacy Protection in mHealth Systems," IJERPH, MDPI, vol. 15(10), pages 1-27, October.
    31. Yong Wu & Gengzhong Feng & Richard Y. K. Fung, 2018. "Comparison of information security decisions under different security and business environments," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 69(5), pages 747-761, May.
    32. Huang, C. Derrick & Behara, Ravi S., 2013. "Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints," International Journal of Production Economics, Elsevier, vol. 141(1), pages 255-268.
    33. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    34. Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
    35. Hee-Kyung Kong & Tae-Sung Kim & Jungduk Kim, 2012. "An analysis on effects of information security investments: a BSC perspective," Journal of Intelligent Manufacturing, Springer, vol. 23(4), pages 941-953, August.
    36. Gurvirender P.S. Tejay & Babak Shoraka, 2011. "Reducing cyber harassment through de jure standards: a study on the lack of the information security management standard adoption in the USA," International Journal of Management and Decision Making, Inderscience Enterprises Ltd, vol. 11(5/6), pages 324-343.
    37. Lawrence A. Gordon & Martin P. Loeb, 2006. "Economic aspects of information security: An emerging field of research," Information Systems Frontiers, Springer, vol. 8(5), pages 335-337, December.
    38. Jaume Belles-Sampera & Montserrat Guillén & Miguel Santolino, 2013. "“Beyond Value-at-Risk: GlueVaR Distortion Risk Measures”," IREA Working Papers 201302, University of Barcelona, Research Institute of Applied Economics, revised Feb 2013.
    39. Linda J. Tallau & Manish Gupta & Raj Sharman, 2010. "Information security investment decisions: evaluating the Balanced Scorecard method," International Journal of Business Information Systems, Inderscience Enterprises Ltd, vol. 5(1), pages 34-57.
    40. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    41. Lu Xu & Yanhui Li & Qi Yao, 2022. "Information security investment and purchase decision for personalized products," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(6), pages 2619-2635, September.
    42. Alessandro Mazzoccoli & Maurizio Naldi, 2022. "An Overview of Security Breach Probability Models," Risks, MDPI, vol. 10(11), pages 1-29, November.
    43. Xing Gao & Weijun Zhong, 2016. "Economic incentives in security information sharing: the effects of market structures," Information Technology and Management, Springer, vol. 17(4), pages 361-377, December.
    44. Yosra Miaoui & Noureddine Boudriga, 0. "Enterprise security investment through time when facing different types of vulnerabilities," Information Systems Frontiers, Springer, vol. 0, pages 1-40.
    45. Liao, Chun-Hsiung & Chen, Chun-Wei, 2014. "Network externality and incentive to invest in network security," Economic Modelling, Elsevier, vol. 36(C), pages 398-404.
    46. Soumyo D. Moitra, 2014. "A Model for Estimating the Benefits from Network Security Systems," International Journal of Business Analytics (IJBAN), IGI Global, vol. 1(3), pages 1-20, July.
    47. Lu Xu & Yanhui Li & Jing Fu, 2019. "Cybersecurity Investment Allocation for a Multi-Branch Firm: Modeling and Optimization," Mathematics, MDPI, vol. 7(7), pages 1-20, July.
    48. Paul, Jomon A. & Zhang, Minjiao, 2021. "Decision support model for cybersecurity risk planning: A two-stage stochastic programming framework featuring firms, government, and attacker," European Journal of Operational Research, Elsevier, vol. 291(1), pages 349-364.
    49. Hamid Mohtadi & Swati Agiwal, 2012. "Optimal Security Investments and Extreme Risk," Risk Analysis, John Wiley & Sons, vol. 32(8), pages 1309-1325, August.

  132. Kjell Hausken, 2006. "The Stability Of Anarchy And Breakdown Of Production," Defence and Peace Economics, Taylor & Francis Journals, vol. 17(6), pages 589-603.

    Cited by:

    1. Naghshpour Shahdad & St. Marie Joseph J., 2009. "Globalization Discontent: The Effects of Globalization on Ethnic Protest," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 14(3), pages 1-29, March.
    2. Powell, Benjamin & Stringham, Edward, 2009. "Public choice and the economic analysis of anarchy: a survey," MPRA Paper 26097, University Library of Munich, Germany.
    3. Caruso, Raul, 2012. "Differentials in Property Rights in a two sector-economy," NEPS Working Papers 2/2012, Network of European Peace Scientists.
    4. Raul Caruso, 2010. "Butter, Guns And Ice-Cream Theory And Evidence From Sub-Saharan Africa," Defence and Peace Economics, Taylor & Francis Journals, vol. 21(3), pages 269-283.
    5. Caruso Raul, 2011. "On the Nature of Peace Economics," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 16(2), pages 1-13, January.
    6. Anna Balestra & Raul Caruso, 2022. "Vaccines between War and Market," Working Papers 1019, European Centre of Peace Science, Integration and Cooperation (CESPIC), Catholic University 'Our Lady of Good Counsel'.
    7. Raul Caruso & Jon Echevarria-Coco, 2023. "International prices and continuing conflict: Theory and evidence from sub-Saharan Africa (1980–2017)," Journal of Peace Research, Peace Research Institute Oslo, vol. 60(6), pages 889-905, November.

  133. Hausken, Kjell, 2006. "Income, interdependence, and substitution effects affecting incentives for security investment," Journal of Accounting and Public Policy, Elsevier, vol. 25(6), pages 629-665.

    Cited by:

    1. Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.
    2. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    3. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    4. Hulisi Öğüt & Srinivasan Raghunathan & Nirup Menon, 2011. "Cyber Security Risk Management: Public Policy Implications of Correlated Risk, Imperfect Ability to Prove Loss, and Observability of Self‐Protection," Risk Analysis, John Wiley & Sons, vol. 31(3), pages 497-512, March.
    5. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.
    6. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    7. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    8. Yong Wu & Mengyao Xu & Dong Cheng & Tao Dai, 2022. "Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker," Decision Analysis, INFORMS, vol. 19(2), pages 99-122, June.
    9. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    10. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    11. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    12. Daniel Schatz & Rabih Bashroush, 0. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 0, pages 1-24.
    13. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    14. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    15. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    16. Vicki Bier & Kjell Hausken, 2011. "Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures," Annals of Operations Research, Springer, vol. 186(1), pages 39-59, June.
    17. Chul Ho Lee & Xianjun Geng & Srinivasan Raghunathan, 2016. "Mandatory Standards and Organizational Information Security," Information Systems Research, INFORMS, vol. 27(1), pages 70-86, March.
    18. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    19. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    20. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    21. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    22. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    23. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    24. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    25. Daniel Schatz & Rabih Bashroush, 2017. "Economic valuation for information security investment: a systematic literature review," Information Systems Frontiers, Springer, vol. 19(5), pages 1205-1228, October.
    26. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    27. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    28. Bricha, Naji & Nourelfath, Mustapha, 2015. "Protection of warehouses and plants under capacity constraint," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 93-104.
    29. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    30. Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
    31. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    32. Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.
    33. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    34. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
    35. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    36. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    37. Hare, Forrest & Goldstein, Jonathan, 2010. "The interdependent security problem in the defense industrial base: An agent-based model on a social network," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 128-139.
    38. Xing Gao, 2020. "Open Source or Closed Source? A Competitive Analysis with Software Security," Decision Analysis, INFORMS, vol. 17(1), pages 56-73, March.
    39. Meyer Sunniva F., 2011. "Preventing Mass Killings: Determining the Optimal Allocation of Security Resources between Crowded Targets," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 17(1), pages 1-37, September.
    40. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    41. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    42. Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
    43. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    44. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    45. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    46. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    47. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    48. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    49. Masoud, Najeb & Al-Utaibi, Ghassan, 2022. "The determinants of cybersecurity risk disclosure in firms’ financial reporting: Empirical evidence," Research in Economics, Elsevier, vol. 76(2), pages 131-140.
    50. Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.
    51. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    52. Meilin He & Laura Devine & Jun Zhuang, 2018. "Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 215-225, February.
    53. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    54. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    55. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    56. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    57. Tridib Bandyopadhyay & Dengpan Liu & Vijay S. Mookerjee & Allen W. Wilhite, 2014. "Dynamic competition in IT security: A differential games approach," Information Systems Frontiers, Springer, vol. 16(4), pages 643-661, September.
    58. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    59. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.

  134. Kjell Hausken & John F. Moxnes, 2005. "The Dynamics Of Crime And Punishment," International Journal of Modern Physics C (IJMPC), World Scientific Publishing Co. Pte. Ltd., vol. 16(11), pages 1701-1732.

    Cited by:

    1. Cheng‐Kuang Wu & Yi‐Ming Chen & Dachrahn Wu & Ching‐Lin Chi, 2020. "A Game Theory Approach for Assessment of Risk and Deployment of Police Patrols in Response to Criminal Activity in San Francisco," Risk Analysis, John Wiley & Sons, vol. 40(3), pages 534-549, March.
    2. Guizhou Wang & Kjell Hausken, 2021. "Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency," Games, MDPI, vol. 12(2), pages 1-24, April.
    3. Shuying Li & Jun Zhuang & Shifei Shen, 2017. "Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time‐Series and Intervention Analysis," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1287-1297, July.

  135. Kjell Hausken & John F. Moxnes, 2005. "The Dynamics Of Multilateral Exchange," International Journal of Modern Physics C (IJMPC), World Scientific Publishing Co. Pte. Ltd., vol. 16(04), pages 607-631.

    Cited by:

    1. Hausken, Kjell & Moxnes, John F., 2011. "Systematization of a set of closure techniques," Theoretical Population Biology, Elsevier, vol. 80(3), pages 175-184.
    2. Kjell Hausken, 2018. "Janet Tai Landa: Economic success of Chinese merchants in Southeast Asia: identity, ethnic cooperation and conflict: integrating the social sciences with evolutionary biology," Journal of Bioeconomics, Springer, vol. 20(2), pages 251-256, July.
    3. Kjell Hausken, 2013. "Exchange of goods while investing into production and safety," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 23(1), pages 29-35.

  136. Kjell Hausken & John F. Moxnes, 2005. "The Dynamics Of Bilateral Exchange And Division Of Labor," International Journal of Modern Physics C (IJMPC), World Scientific Publishing Co. Pte. Ltd., vol. 16(01), pages 117-137.

    Cited by:

    1. Kjell Hausken, 2013. "Exchange of goods while investing into production and safety," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 23(1), pages 29-35.

  137. Kjell Hausken & John F. Moxnes, 2005. "Approximations and empirics for stochastic war equations," Naval Research Logistics (NRL), John Wiley & Sons, vol. 52(7), pages 682-700, October.

    Cited by:

    1. Kress, Moshe & Caulkins, Jonathan P. & Feichtinger, Gustav & Grass, Dieter & Seidl, Andrea, 2018. "Lanchester model for three-way combat," European Journal of Operational Research, Elsevier, vol. 264(1), pages 46-54.
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Anelí Bongers & José L. Torres, 2021. "A bottleneck combat model: an application to the Battle of Thermopylae," Operational Research, Springer, vol. 21(4), pages 2859-2877, December.
    4. Michael J Armstrong, 2014. "The salvo combat model with a sequential exchange of fire," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(10), pages 1593-1601, October.

  138. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.

    Cited by:

    1. Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.
    2. Atallah, Samer, 2017. "Price shocks and political conflict," International Journal of Development and Conflict, Gokhale Institute of Politics and Economics, vol. 7(2), pages 65-80.
    3. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    4. Galindo-Silva Hector, 2021. "Conflict Externalization and the Quest for Peace: Theory and Case Evidence from Colombia," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 27(1), pages 29-50, February.
    5. Indraneel Dasgupta, 2024. "A rent-seeking perspective on imperial peace," Discussion Papers 2024-06, University of Nottingham, CREDIT.
    6. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    7. Levine, David K. & Modica, Salvatore, 2013. "Anti-Malthus: Conflict and the evolution of societies," Research in Economics, Elsevier, vol. 67(4), pages 289-306.
    8. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.
    9. Caruso, Raul, 2007. "Recirpcity in the shadow of Threat," MPRA Paper 1788, University Library of Munich, Germany.
    10. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    11. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    12. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    13. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    14. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    15. Jay Pil Choi & Subhasish M. Chowdhury & Jaesoo Kim, 2011. "Group Contests with Internal Conflict and Power Asymmetry," University of East Anglia Applied and Financial Economics Working Paper Series 025, School of Economics, University of East Anglia, Norwich, UK..
    16. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    17. Kjell Hausken, 2014. "Returns to information security investment: Endogenizing the expected loss," Information Systems Frontiers, Springer, vol. 16(2), pages 329-336, April.
    18. Caruso Raul, 2006. "Conflict and Conflict Management with Interdependent Instruments and Asymmetric Stakes, (The Good-Cop and the Bad-Cop Game)," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 12(1), pages 1-53, September.
    19. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    20. Song, Jian & Houser, Daniel, 2021. "Non-exclusive group contests: An experimental analysis," Journal of Economic Psychology, Elsevier, vol. 87(C).
    21. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    22. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    23. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    24. Raul Caruso, 2009. "Spesa pubblica e criminalità organizzata in Italia: evidenza empirica su dati Panel nel periodo 1997-2003," Economia & lavoro, Carocci editore, issue 1, pages 1-73.
    25. David K Levine & Salvatore Modica, 2016. "An Evolutionary Model of Intervention and Peace," Levine's Bibliography 786969000000001391, UCLA Department of Economics.
    26. Alex Coram, 2006. "An asymmetric dynamic struggle between pirates and producers," UMASS Amherst Economics Working Papers 2006-07, University of Massachusetts Amherst, Department of Economics.
    27. Johannes Münster, 2009. "Group contest success functions," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 41(2), pages 345-357, November.
    28. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    29. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    30. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    31. Hassani-Mahmooei, Behrooz & Parris, Brett W., 2013. "Resource scarcity, effort allocation and environmental security: An agent-based theoretical approach," Economic Modelling, Elsevier, vol. 30(C), pages 183-192.
    32. Behrooz Hassani-Mahmooei & Brett W. Parris, 2014. "Dynamics of effort allocation and evolution of trust: an agent-based model," Computational and Mathematical Organization Theory, Springer, vol. 20(2), pages 133-154, June.
    33. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    34. Nitzan, Shmuel & Ueda, Kaoru, 2009. "Collective contests for commons and club goods," Journal of Public Economics, Elsevier, vol. 93(1-2), pages 48-55, February.
    35. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    36. Hausken, Kjell & Knutsen, John F., 2010. "An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units," Economics Discussion Papers 2010-6, Kiel Institute for the World Economy (IfW Kiel).
    37. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    38. Hubert János Kiss & Alfonso Rosa-Garcia & Vita Zhukova, 2023. "Group contest in a coopetitive setup: experimental evidence," Journal of Economic Interaction and Coordination, Springer;Society for Economic Science with Heterogeneous Interacting Agents, vol. 18(3), pages 463-490, July.
    39. Gregory Levitin & Maxim Finkelstein, 2017. "A new stress–strength model for systems subject to stochastic shocks," Journal of Risk and Reliability, , vol. 231(2), pages 172-179, April.
    40. K Hausken & G Levitin, 2010. "Defence of homogeneous parallel multi-state systems subject to two sequential attacks," Journal of Risk and Reliability, , vol. 224(3), pages 171-183, September.
    41. Hassani Mahmooei, Behrooz & Parris, Brett, 2012. "Dynamics of effort allocation and evolution of trust: an agent-based model," MPRA Paper 44919, University Library of Munich, Germany.
    42. Send, Jonas, 2020. "Conflict between non-exclusive groups," Journal of Economic Behavior & Organization, Elsevier, vol. 177(C), pages 858-874.
    43. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    44. David K Levine & Salvatore Modica, 2022. "Survival of the Weakest: Why the West Rules," Levine's Working Paper Archive 786969000000001458, David K. Levine.
    45. Levine, David K. & Modica, Salvatore, 2022. "Survival of the Weakest: Why the West Rules," Journal of Economic Behavior & Organization, Elsevier, vol. 204(C), pages 394-421.
    46. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    47. Bhattacharya, Puja & Rampal, Jeevant, 2024. "Contests within and between groups: Theory and experiment," Games and Economic Behavior, Elsevier, vol. 145(C), pages 467-492.
    48. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    49. Dasgupta, Indraneel & Neogi, Ranajoy Guha, 2017. "Between-Group Contests over Group-Specific Public Goods with Within-Group Fragmentation," IZA Discussion Papers 10881, Institute of Labor Economics (IZA).
    50. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    51. Gregory Levitin & Kjell Hausken, 2011. "Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace," Risk Analysis, John Wiley & Sons, vol. 31(10), pages 1632-1645, October.
    52. Gries, Thomas & Haake, Claus-Jochen, 2016. "An Economic Theory of 'Destabilization War' '- Compromise for Peace versus Conventional, Guerilla, or Terrorist Warfare," VfS Annual Conference 2016 (Augsburg): Demographic Change 145617, Verein für Socialpolitik / German Economic Association.
    53. Fausto, Cavalli & Mario, Gilli & Ahmad, Naimzada, 2017. "A New Approach to Contest Models," Working Papers 364, University of Milano-Bicocca, Department of Economics, revised 03 Mar 2017.
    54. Brouwer, Thijs & Potters, Jan, 2019. "Friends for (almost) a day : Studying breakaways in cycling races," Other publications TiSEM 87e430ce-6c73-47be-b0e1-8, Tilburg University, School of Economics and Management.
    55. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    56. Gregory Levitin & Kjell Hausken, 2013. "Parallel systems under two sequential attacks with contest intensity variation," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 21(1), pages 207-224, January.
    57. Kjell Hausken & Andreas Ortmann, 2007. "A first experimental test of multilevel game theory: the PD case," Applied Economics Letters, Taylor & Francis Journals, vol. 15(4), pages 261-264.
    58. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    59. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.
    60. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
    61. Thomas Gries & Claus-Jochen Haake, 2016. "An Economic Theory of 'Destabilization War'," Working Papers CIE 95, Paderborn University, CIE Center for International Economics.
    62. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.
    63. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    64. Hassani Mahmooei, Behrooz & Parris, Brett, 2012. "Why might climate change not cause conflict? an agent-based computational response," MPRA Paper 44918, University Library of Munich, Germany.
    65. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2013. "Evaluating the damage associated with intentional supply deprivation in multi-commodity network," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 11-17.
    66. K Hausken & G Levitin, 2009. "Parallel systems with different types of defence resource expenditure under two sequential attacks," Journal of Risk and Reliability, , vol. 223(1), pages 71-85, March.
    67. David K. Levine & Salvatore Modica, 2012. "Conflict and the evolution of societies," Working Papers 2012-032, Federal Reserve Bank of St. Louis.
    68. Kjell Hausken, 2021. "Axiomatizing additive multi-effort contests," SN Business & Economics, Springer, vol. 1(11), pages 1-12, November.
    69. Gregory Levitin & Kjell Hausken, 2012. "Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 304-318, February.
    70. Xiao, Hui & Shi, Daimin & Ding, Yi & Peng, Rui, 2016. "Optimal loading and protection of multi-state systems considering performance sharing mechanism," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 88-95.
    71. Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2011. "Evaluating the damage associated with intentional network disintegration," Reliability Engineering and System Safety, Elsevier, vol. 96(4), pages 433-439.
    72. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    73. Dasgupta, Indraneel & Pal, Sarmistha, 2021. "Touch thee not: Group conflict, caste power and untouchability in rural India," Journal of Comparative Economics, Elsevier, vol. 49(2), pages 442-466.
    74. David K Levine & Salvatore Modica, 2013. "Conflict, Evolution, Hegemony, and the Power of the State," Levine's Working Paper Archive 786969000000000692, David K. Levine.
    75. Kjell Hausken, 2006. "The Stability Of Anarchy And Breakdown Of Production," Defence and Peace Economics, Taylor & Francis Journals, vol. 17(6), pages 589-603.
    76. Lins, Isis Didier & Rêgo, Leandro Chaves & Moura, Márcio das Chagas & Droguett, Enrique López, 2013. "Selection of security system design via games of imperfect information and multi-objective genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 59-66.
    77. Kjell Hausken & Mthuli Ncube, 2013. "Working Paper 172 - Political Economy of Service Delivery: Monitoring versus Contestation," Working Paper Series 468, African Development Bank.
    78. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    79. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    80. Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.
    81. Kjell Hausken & Mthuli Ncube, 2014. "Political Economy of Service Delivery: Monitoring Versus Contestation," The Developing Economies, Institute of Developing Economies, vol. 52(1), pages 68-84, March.
    82. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    83. Antoine Pietri, 2017. "Les modèles de « rivalité coercitive » dans l’analyse économique des conflits," Revue d'économie politique, Dalloz, vol. 127(3), pages 307-352.
    84. Hausken, Kjell, 2016. "Additive Multi-Effort Contests," UiS Working Papers in Economics and Finance 2016/2, University of Stavanger.
    85. Kyung Hwan Baik & Dongryul Lee, 2012. "Do Rent‐Seeking Groups Announce Their Sharing Rules?," Economic Inquiry, Western Economic Association International, vol. 50(2), pages 348-363, April.
    86. Kjell Hausken & Mthuli Ncube, 2013. "Working Paper 173 - Production and Conflict in Risky Elections," Working Paper Series 469, African Development Bank.
    87. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    88. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    89. Kjell Hausken & Mthuli Ncube, 2016. "How Elections are Impacted by Production, Economic Growth and Conflict," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 18(01), pages 1-29, March.
    90. Hausken, Kjell & Ncube, Mthuli, 2012. "Production and Conflict in Risky Elections," UiS Working Papers in Economics and Finance 2012/14, University of Stavanger.

  139. Hausken, Kjell, 2005. "The battle of the sexes when the future is important," Economics Letters, Elsevier, vol. 87(1), pages 89-93, April.

    Cited by:

    1. Hausken, Kjell, 2007. "Reputation, incomplete information, and differences in patience in repeated games with multiple equilibria," Economics Letters, Elsevier, vol. 97(2), pages 138-144, November.
    2. Langlais, Eric, 2010. "An analysis of bounded rationality in judicial litigations: the case with loss/disappointment averses plaintiffs," MPRA Paper 22291, University Library of Munich, Germany.
    3. Kjell Hausken, 2007. "Stubbornness, Power, and Equilibrium Selection in Repeated Games with Multiple Equilibria," Theory and Decision, Springer, vol. 62(2), pages 135-160, March.
    4. Hausken, Kjell, 2008. "Whether to attack a terrorist's resource stock today or tomorrow," Games and Economic Behavior, Elsevier, vol. 64(2), pages 548-564, November.
    5. Wilko Bolt & Alexander F. Tieman, 2006. "On Myopic Equilibria in Dynamic Games with Endogenous Discounting," IMF Working Papers 2006/302, International Monetary Fund.

  140. Kjell Hausken & Ross Cressman, 2004. "Formalization Of Multi-Level Games," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 6(02), pages 195-221.

    Cited by:

    1. Tverskoi, Denis & Senthilnathan, Athmanathan & Gavrilets, Sergey, 2021. "The dynamics of cooperation, power, and inequality in a group-structured society," SocArXiv 24svr, Center for Open Science.
    2. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    3. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.
    4. Fenling Feng & Chengguang Liu & Jiaqi Zhang, 2020. "China's Railway Transportation Safety Regulation System Based on Evolutionary Game Theory and System Dynamics," Risk Analysis, John Wiley & Sons, vol. 40(10), pages 1944-1966, October.

  141. Kjell Hausken & Christian W. Martin & Thomas Plümper, 2004. "Government Spending and Taxation in Democracies and Autocracies," Constitutional Political Economy, Springer, vol. 15(3), pages 239-259, September.

    Cited by:

    1. Jakob Haan, 2014. "Democracy, Elections and Government Budget Deficits," German Economic Review, Verein für Socialpolitik, vol. 15(1), pages 131-142, February.
    2. Casper Hunnerup Dahl, 2014. "Parties and institutions: empirical evidence on veto players and the growth of government," Public Choice, Springer, vol. 159(3), pages 415-433, June.
    3. Johannes Blum, 2021. "Democracy’s third wave and national defense spending," Public Choice, Springer, vol. 189(1), pages 183-212, October.
    4. Gnangnon, Sèna Kimm, 2021. "Aid for trade unpredictability and trade-related government expenditure in recipient-countries," The Quarterly Review of Economics and Finance, Elsevier, vol. 79(C), pages 107-125.
    5. Toke Aidt & Peter Jensen, 2013. "Democratization and the size of government: evidence from the long 19th century," Public Choice, Springer, vol. 157(3), pages 511-542, December.
    6. Fasoranti, Modupe Mary & Alimi, Rasaq Santos, 2017. "Government Size, Political Institutions and Output Growth in Nigeria," MPRA Paper 80562, University Library of Munich, Germany.
    7. Sajjad Faraji Dizaji & Mohammad Reza Farzanegan, 2014. "Political Institutions and Government Spending Behavior in Iran," CESifo Working Paper Series 4620, CESifo.
    8. Bougharriou, Nouha & Benayed, Walid & Gabsi, Foued Badr, 2022. "Democratic transition and fiscal policy in the Arab world," Economic Systems, Elsevier, vol. 46(2).
    9. Oualid Lajili and Philippe Gilles, 2018. "Financial Liberalization, Political Openness and Growth in Developing Countries: Relationship and Transmission Channels," Journal of Economic Development, Chung-Ang Unviersity, Department of Economics, vol. 43(1), pages 1-27, March.
    10. S. F. Dizaji & M. R. Farzanegan & A. Naghavi, 2015. "Political Institutions and Government Spending Behavior: Theory and Evidence from Iran," Working Papers wp986, Dipartimento Scienze Economiche, Universita' di Bologna.
    11. Alexander Libman, 2012. "Democracy and Growth: Is The Effect Non-Linear?," Economic Research Guardian, Weissberg Publishing, vol. 2(1), pages 99-120, May.
    12. Abel Escribà-Folch, 2009. "Do authoritarian institutions mobilize economic cooperation?," Constitutional Political Economy, Springer, vol. 20(1), pages 71-93, March.
    13. Aloys L. Prinz & Christian J. Sander, 2020. "Political leadership and the quality of public goods and services: Does religion matter?," Economics of Governance, Springer, vol. 21(4), pages 299-334, December.
    14. Plümper, Thomas & Neumayer, Eric, 2007. "Famine mortality, rational political inactivity, and international food aid," LSE Research Online Documents on Economics 25169, London School of Economics and Political Science, LSE Library.
    15. Dodlova, Marina & Lucas, Viola, 2021. "Regime security and taxation in autocracies: Who is taxed and how?," European Journal of Political Economy, Elsevier, vol. 67(C).
    16. Nouha Bougharriou & Walid Benayed & Foued Badr Gabsi, 2021. "Under Which Condition Does the Democratization of the Arab World Improve FDI?," Comparative Economic Studies, Palgrave Macmillan;Association for Comparative Economic Studies, vol. 63(2), pages 224-248, June.
    17. Morten Endrikat, 2017. "Natural resource rents, autocracy and the composition of government spending," MAGKS Papers on Economics 201727, Philipps-Universität Marburg, Faculty of Business Administration and Economics, Department of Economics (Volkswirtschaftliche Abteilung).
    18. Balamatsias, Pavlos, 2018. "Democracy and government spending," MPRA Paper 84975, University Library of Munich, Germany.
    19. Abel L. Costa Fernandes & Paulo R. Mota, 2012. "The Present Sovereign Debt Crisis Of The Euro Zone Peripheral Countries: A Case Of Non-Mature Democracies And Less Developed Economies," FEP Working Papers 458, Universidade do Porto, Faculdade de Economia do Porto.
    20. Profeta, Paola & Puglisi, Riccardo & Scabrosetti, Simona, 2013. "Does democracy affect taxation and government spending? Evidence from developing countries," Journal of Comparative Economics, Elsevier, vol. 41(3), pages 684-718.
    21. Blum, Johannes, 2018. "Defense Burden and the Effect of Democracy: Evidence from a Spatial Panel Analysis," Munich Reprints in Economics 62815, University of Munich, Department of Economics.
    22. Dragoi Andreea, 2015. "Greece Crisis and The European Model of The Welfare State," Revista de Economie Mondiala / The Journal of Global Economics, Institute for World Economy, Romanian Academy, vol. 7(3).
    23. Neudorfer, Natascha S., 2018. "Commodities and corruption – How the middle class and democratic institutions lead to less corruption in resource-rich countries," Resources Policy, Elsevier, vol. 58(C), pages 175-191.
    24. Daniel Sakyi & Samuel Adams, 2012. "Democracy, Government Spending and Economic Growth: The Case of Ghana, 1960–2008," Margin: The Journal of Applied Economic Research, National Council of Applied Economic Research, vol. 6(3), pages 361-383, August.
    25. Joan Costa-Font & Ana Rico, 2006. "Vertical Competition in the Spanish National Health System (NHS)," Public Choice, Springer, vol. 128(3), pages 477-498, September.
    26. Johannes Blum & Florian Dorn & Axel Heuer, 2021. "Political institutions and health expenditure," International Tax and Public Finance, Springer;International Institute of Public Finance, vol. 28(2), pages 323-363, April.
    27. Daniel Sakyi, 2013. "On the implications of trade openness, foreign aid and democracy for Wagner’s law in developing countries: panel data evidence from west African monetary zone (WAMZ)," Journal of Developing Areas, Tennessee State University, College of Business, vol. 47(2), pages 319-339, July-Dece.
    28. Offiong Helen Solomon & Sibhaa Shrestha, 2014. "Does the informal sector thrive under democracy or autocracy? the case of Nepal," Journal of Developing Areas, Tennessee State University, College of Business, vol. 48(3), pages 245-267, July-Sept.
    29. Samuel Kwabena Obeng Author-Name: Daniel Sakyi, 2017. "Explaining the Growth of Government Spending in Ghana," Journal of Developing Areas, Tennessee State University, College of Business, vol. 51(1), pages 103-128, January-M.
    30. Giovanni B. Pittaluga & Elena Seghezza & Pierluigi Morelli, 2018. "Suffrage Extension, Government Size and National Identity in Europe Before WWI," Rivista di storia economica, Società editrice il Mulino, issue 2, pages 137-172.
    31. Libman, Alexander, 2008. "Democracy and growth: is the effect non-linear?," MPRA Paper 17795, University Library of Munich, Germany.
    32. Samuel Adams & Daniel Sakyi, 2012. "Globalization, Democracy, and Government Spending in Sub-Saharan Africa: Evidence from Panel Data," Chapters, in: Zlatan Delic (ed.), Globalization and Responsibility, IntechOpen.

  142. Kjell Hausken, 2004. "Mutual Raiding of Production and the Emergence of Exchange," Economic Inquiry, Western Economic Association International, vol. 42(4), pages 572-586, October.

    Cited by:

    1. Charles Anderton & John Carter, 2004. "Vulnerable Trade: The Dark Side of an Edgeworth Box," Working Papers 0411, College of the Holy Cross, Department of Economics.
    2. Caruso, Raul, 2012. "Differentials in Property Rights in a two sector-economy," NEPS Working Papers 2/2012, Network of European Peace Scientists.
    3. Michelle R. Garfinkel & Stergios Skaperdas, 2006. "Economics of Conflict: An Overview," Working Papers 050623, University of California-Irvine, Department of Economics, revised Sep 2006.
    4. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    5. Leeson,Peter T., 2014. "Anarchy Unbound," Cambridge Books, Cambridge University Press, number 9781107025806, September.
    6. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    7. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    8. Raul Caruso, 2010. "Butter, Guns And Ice-Cream Theory And Evidence From Sub-Saharan Africa," Defence and Peace Economics, Taylor & Francis Journals, vol. 21(3), pages 269-283.
    9. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    10. Hausken, Kjell & Knutsen, John F., 2010. "An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units," Economics Discussion Papers 2010-6, Kiel Institute for the World Economy (IfW Kiel).
    11. Tridimas, George, 2011. "The political economy of power-sharing," European Journal of Political Economy, Elsevier, vol. 27(2), pages 328-342, June.
    12. Anderton, Charles H. & Carter, John R., 2007. "A Survey of Peace Economics," Handbook of Defense Economics, in: Keith Hartley & Todd Sandler (ed.), Handbook of Defense Economics, edition 1, volume 2, chapter 35, pages 1211-1258, Elsevier.
    13. Caruso Raul, 2011. "On the Nature of Peace Economics," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 16(2), pages 1-13, January.
    14. Kjell Hausken, 2013. "Exchange of goods while investing into production and safety," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 23(1), pages 29-35.
    15. Kjell Hausken & Gregory Levitin, 2011. "Shield versus sword resource distribution in K-round duels," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 19(4), pages 589-603, December.
    16. Peter T. Leeson, 2007. "Trading with Bandits," Journal of Law and Economics, University of Chicago Press, vol. 50(2), pages 303-321.
    17. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.
    18. Hoffmann, Magnus, 2006. "Enforcement of Property Rights in a Barter Economy," MPRA Paper 3260, University Library of Munich, Germany.
    19. Anna Balestra & Raul Caruso, 2022. "Vaccines between War and Market," Working Papers 1019, European Centre of Peace Science, Integration and Cooperation (CESPIC), Catholic University 'Our Lady of Good Counsel'.
    20. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    21. Raul Caruso & Jon Echevarria-Coco, 2023. "International prices and continuing conflict: Theory and evidence from sub-Saharan Africa (1980–2017)," Journal of Peace Research, Peace Research Institute Oslo, vol. 60(6), pages 889-905, November.
    22. Antoine Pietri, 2017. "Les modèles de « rivalité coercitive » dans l’analyse économique des conflits," Revue d'économie politique, Dalloz, vol. 127(3), pages 307-352.
    23. Caruso, Raul, 2007. "A Tentative Model of Conflict, Appropriation and Production in a two-sector Economy," MPRA Paper 4053, University Library of Munich, Germany.

  143. Hausken, Kjell & Plumper, Thomas, 2002. "Containing Contagious Financial Crises: The Political Economy of Joint Intervention into the Asian Crisis," Public Choice, Springer, vol. 111(3-4), pages 209-236, June.

    Cited by:

    1. Welburn, Jonathan & Hausken, Kjell, 2014. "Game-Theoretic Perspectives on Financial Crises," UiS Working Papers in Economics and Finance 2014/22, University of Stavanger.
    2. Robin Pope & Reinhard Selten & Johannes Kaiser & Sebastian Kube & Jürgen Hagen, 2012. "Exchange rate determination: a theory of the decisive role of central bank cooperation and conflict," International Economics and Economic Policy, Springer, vol. 9(1), pages 13-51, March.
    3. Hausken, Kjell & Plümper, Thomas & Schneider, Gerald, 2002. "The Trilemma of the Protectionist Autocrat: An Assessment of the Political Determinants of Foreign Economic Liberalization," MPRA Paper 75866, University Library of Munich, Germany.
    4. Jonathan W. Welburn, 2020. "Crises Beyond Belief: Findings on Contagion, the Role of Beliefs, and the Eurozone Debt Crisis from a Borrower–Lender Game," Computational Economics, Springer;Society for Computational Economics, vol. 56(2), pages 263-317, August.
    5. Sorin BURNETE, 2009. "Emerging Economies Faced With The Downside Of Financial Globalization: Hedges And Way Outs," Review of Economic and Business Studies, Alexandru Ioan Cuza University, Faculty of Economics and Business Administration, issue 3, pages 41-55, May.
    6. Pope, Robin & Selten, Reinhard & Kube, Sebastian & von Hagen, Jürgen, 2009. "Managed Floats to Damp Shocks like 1982-5 and 2006-9: Field and Laboratory Evidence for Chinese Interest in a Single World Currency," Bonn Econ Discussion Papers 26/2009, University of Bonn, Bonn Graduate School of Economics (BGSE).
    7. Welburn, Jonathan & Hausken, Kjell, 2014. "A Game Theoretic Model of Economic Crises," UiS Working Papers in Economics and Finance 2014/23, University of Stavanger.
    8. Jiang, Hai & Tang, Shenfeng & Li, Lifang & Xu, Fangming & Di, Qian, 2022. "Re-examining the Contagion Channels of Global Financial Crises: Evidence from the Twelve Years since the US Subprime Crisis," Research in International Business and Finance, Elsevier, vol. 60(C).
    9. Pope, Robin & Selten, Reinhard & Kube, Sebastian & von Hagen, Jürgen, 2009. "Prominent Numbers, Indices and Ratios in Exchange Rate Determination and Financial Crashes: in Economists’ Models, in the Field and in the Laboratory," Bonn Econ Discussion Papers 18/2009, University of Bonn, Bonn Graduate School of Economics (BGSE).
    10. Hausken, Kjell & Mattli, Walter & Plümper, Thomas, 2006. "Widening versus Deepening of International Unions," MPRA Paper 75882, University Library of Munich, Germany.
    11. Welburn, Jonathan William & Hausken, Kjell, 2015. "A Game-Theoretic Model with Empirics of Economic Crises," UiS Working Papers in Economics and Finance 2015/7, University of Stavanger.
    12. Coyne, Christopher J., 2011. "Constitutions and crisis," Journal of Economic Behavior & Organization, Elsevier, vol. 80(2), pages 351-357.
    13. Troeger, Vera, 2012. "Monetary Policy Flixibility in floating Exchange Rate Regimes: Currency Denomination and Import Shares," CAGE Online Working Paper Series 82, Competitive Advantage in the Global Economy (CAGE).
    14. Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
    15. Anubha Goel & Aparna Mehra, 2019. "Analyzing Contagion Effect in Markets During Financial Crisis Using Stochastic Autoregressive Canonical Vine Model," Computational Economics, Springer;Society for Computational Economics, vol. 53(3), pages 921-950, March.
    16. Pope, Robin & Selten, Reinhard & Kaiser, Johannes & Kube, Sebastian & von Hagen, Jürgen, 2007. "The damage from clean floats: From an anti-inflationary monetary policy," Bonn Econ Discussion Papers 19/2007, University of Bonn, Bonn Graduate School of Economics (BGSE).
    17. Jonathan William Welburn & Kjell Hausken, 2017. "Game Theoretic Modeling of Economic Systems and the European Debt Crisis," Computational Economics, Springer;Society for Computational Economics, vol. 49(2), pages 177-226, February.
    18. Thomas Plümper & Vera E. Troeger, 2006. "Fear of Floating and the External Effects of Currency Unions," The Institute for International Integration Studies Discussion Paper Series iiisdp181, IIIS.

  144. Kjell Hausken, 2002. "Probabilistic Risk Analysis and Game Theory," Risk Analysis, John Wiley & Sons, vol. 22(1), pages 17-27, February.

    Cited by:

    1. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    2. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    3. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    4. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    5. Namun Cho & Tae-Seok Jang, 2019. "Asset Market Volatility and New Keynesian Macroeconomics: A Game-Theoretic Approach," Computational Economics, Springer;Society for Computational Economics, vol. 54(1), pages 245-266, June.
    6. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    7. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.
    8. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    9. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    10. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    11. Stefano Barbieri & David Malueg, 2014. "Group efforts when performance is determined by the “best shot”," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 56(2), pages 333-373, June.
    12. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    13. Grant, Matthew J. & Stewart, Mark G., 2017. "Modelling improvised explosive device attacks in the West – Assessing the hazard," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 345-354.
    14. Askeland, Tore & Flage, Roger & Aven, Terje, 2017. "Moving beyond probabilities – Strength of knowledge characterisations applied to security," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 196-205.
    15. Edward JM Colbert & Alexander Kott & Lawrence P Knachel, 2020. "The game-theoretic model and experimental investigation of cyber wargaming," The Journal of Defense Modeling and Simulation, , vol. 17(1), pages 21-38, January.
    16. Claus Dierksmeier, 2020. "From Jensen to Jensen: Mechanistic Management Education or Humanistic Management Learning?," Journal of Business Ethics, Springer, vol. 166(1), pages 73-87, September.
    17. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    18. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    19. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    20. Ryoji Makino & Kenju Akai & Jun-ichi Takeshita & Takanori Kudo & Keiko Aoki, 2021. "Effect of disclosing the relation between effort and unit reliability on system reliability: An economic experiment," PLOS ONE, Public Library of Science, vol. 16(4), pages 1-18, April.
    21. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    22. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    23. Sang-Hyun Kim & Brian Tomlin, 2013. "Guilt by Association: Strategic Failure Prevention and Recovery Capacity Investments," Management Science, INFORMS, vol. 59(7), pages 1631-1649, July.
    24. Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
    25. Zhao, Yunfei & Huang, Linan & Smidts, Carol & Zhu, Quanyan, 2020. "Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    26. Martina de Gramatica & Fabio Massacci & Woohyun Shim & Uğur Turhan & Julian Williams, 2017. "Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 372-395, February.
    27. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.
    28. Andrew Samuel & Seth D. Guikema, 2012. "Resource Allocation for Homeland Defense: Dealing with the Team Effect," Decision Analysis, INFORMS, vol. 9(3), pages 238-252, September.
    29. Argenti, Francesca & Landucci, Gabriele & Reniers, Genserik & Cozzani, Valerio, 2018. "Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 515-530.
    30. Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
    31. Shouqiang Wang & David Banks, 2011. "Network routing for insurgency: An adversarial risk analysis framework," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(6), pages 595-607, September.
    32. Daniel G. Arce & Dan Kovenock & Brian Roberson, 2012. "Weakest‐link attacker‐defender games with multiple attack technologies," Naval Research Logistics (NRL), John Wiley & Sons, vol. 59(6), pages 457-469, September.
    33. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    34. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    35. Zare Moayedi, Behzad & Azgomi, Mohammad Abdollahi, 2012. "A game theoretic framework for evaluation of the impacts of hackers diversity on security measures," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 45-54.
    36. Longxia Qian & Ren Zhang & Mei Hong & Hongrui Wang & Lizhi Yang, 2016. "A new multiple integral model for water shortage risk assessment and its application in Beijing, China," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 80(1), pages 43-67, January.
    37. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    38. Kjell Hausken, 2018. "Formalizing the Precautionary Principle Accounting for Strategic Interaction, Natural Factors, and Technological Factors," Risk Analysis, John Wiley & Sons, vol. 38(10), pages 2055-2072, October.
    39. Insua, David Rios & Ruggeri, Fabrizio & Soyer, Refik & Wilson, Simon, 2020. "Advances in Bayesian decision making in reliability," European Journal of Operational Research, Elsevier, vol. 282(1), pages 1-18.
    40. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    41. João Ricardo Faria & Andreas Novak & Aniruddha Bagchi & Timothy Mathews, 2020. "The Refugee Game: The Relationship between Individual Security Expenditures and Collective Security," Games, MDPI, vol. 11(2), pages 1-13, June.
    42. Kirchgässner, Gebhard, 2010. "On minimal morals," European Journal of Political Economy, Elsevier, vol. 26(3), pages 330-339, September.
    43. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    44. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    45. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    46. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    47. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.

  145. Hausken, Kjell & Moxnes, John F., 2002. "Stochastic conditional and unconditional warfare," European Journal of Operational Research, Elsevier, vol. 140(1), pages 61-87, July.

    Cited by:

    1. Kress, Moshe & Caulkins, Jonathan P. & Feichtinger, Gustav & Grass, Dieter & Seidl, Andrea, 2018. "Lanchester model for three-way combat," European Journal of Operational Research, Elsevier, vol. 264(1), pages 46-54.
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Liles, Joseph M. & Robbins, Matthew J. & Lunday, Brian J., 2023. "Improving defensive air battle management by solving a stochastic dynamic assignment problem via approximate dynamic programming," European Journal of Operational Research, Elsevier, vol. 305(3), pages 1435-1449.
    4. Anelí Bongers & José L. Torres, 2021. "A bottleneck combat model: an application to the Battle of Thermopylae," Operational Research, Springer, vol. 21(4), pages 2859-2877, December.
    5. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    6. Kjell Hausken & John F. Moxnes, 2005. "Approximations and empirics for stochastic war equations," Naval Research Logistics (NRL), John Wiley & Sons, vol. 52(7), pages 682-700, October.
    7. C-Y Hung & G K Yang & P S Deng & T Tang & S-P Lan & P Chu, 2005. "Fitting Lanchester's square law to the Ardennes Campaign," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 56(8), pages 942-946, August.
    8. Liu, Liwei & Yu, Jun & Guo, Zhi, 2006. "A kind of stochastic duel model for guerrilla war," European Journal of Operational Research, Elsevier, vol. 171(2), pages 430-438, June.
    9. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    10. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    11. Duffey, Romney B, 2017. "Dynamic theory of losses in wars and conflicts," European Journal of Operational Research, Elsevier, vol. 261(3), pages 1013-1027.
    12. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    13. Michael J Armstrong, 2014. "The salvo combat model with a sequential exchange of fire," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(10), pages 1593-1601, October.

  146. Kjell Hausken & Matthias Mohr, 2001. "The value of a player in n-person games," Social Choice and Welfare, Springer;The Society for Social Choice and Welfare, vol. 18(3), pages 465-483.

    Cited by:

    1. Bernd Irlenbusch & Matthias Sutter, 2006. "An experimental analysis of voting in the Stability and Growth Pact in the European Monetary Union," Public Choice, Springer, vol. 129(3), pages 417-434, December.
    2. Kjell Hausken, 2020. "The Shapley value of coalitions to other coalitions," Palgrave Communications, Palgrave Macmillan, vol. 7(1), pages 1-10, December.
    3. Filipe Bandeiras & Álvaro Gomes & Mário Gomes & Paulo Coelho, 2023. "Application and Challenges of Coalitional Game Theory in Power Systems for Sustainable Energy Trading Communities," Energies, MDPI, vol. 16(24), pages 1-42, December.
    4. Tobias Hiller, 2023. "Measuring the Difficulties in Forming a Coalition Government," Games, MDPI, vol. 14(2), pages 1-15, March.
    5. Julien Reynaud & Fabien Lange & Łukasz Gątarek & Christian Thimann, 2011. "Proximity in Coalition Building," Central European Journal of Economic Modelling and Econometrics, Central European Journal of Economic Modelling and Econometrics, vol. 3(3), pages 111-132, September.
    6. Alessio Guandalini & Claudio Ceccarelli, 2022. "Impact measurement and dimension reduction of auxiliary variables in calibration estimator using the Shapley decomposition," Statistical Methods & Applications, Springer;Società Italiana di Statistica, vol. 31(4), pages 759-784, October.
    7. Musegaas, M. & Borm, P.E.M. & Quant, M., 2015. "Three-Valued Simple Games," Other publications TiSEM 473afd5c-99b1-4073-888f-2, Tilburg University, School of Economics and Management.

  147. Hausken, Kjell, 2000. "Migration and intergroup conflict," Economics Letters, Elsevier, vol. 69(3), pages 327-331, December.

    Cited by:

    1. Hausken, Kjell & Knutsen, John F., 2010. "An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units," Economics Discussion Papers 2010-6, Kiel Institute for the World Economy (IfW Kiel).
    2. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    3. Kjell Hausken & John F. Knutsen, 2002. "The Birth, Adjustment and Death of States," Public Economics 0205004, University Library of Munich, Germany.
    4. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    5. Kjell Hausken, 2006. "The Stability Of Anarchy And Breakdown Of Production," Defence and Peace Economics, Taylor & Francis Journals, vol. 17(6), pages 589-603.

  148. Hausken, Kjell, 2000. "Cooperation and between-group competition," Journal of Economic Behavior & Organization, Elsevier, vol. 42(3), pages 417-425, July.

    Cited by:

    1. Bös, Dieter, 2002. "Contests Among Bureaucrats," Bonn Econ Discussion Papers 27/2002, University of Bonn, Bonn Graduate School of Economics (BGSE).
    2. Vjollca Sadiraj & Jan Tuinstra & Frans Winden, 2005. "Interest group size dynamics and policymaking," Public Choice, Springer, vol. 125(3), pages 271-303, December.
    3. Heinrich Ursprung, 2011. "The Evolution of Sharing Rules in Rent Seeking Contests: Incentives Crowd Out Cooperation," Working Paper Series of the Department of Economics, University of Konstanz 2011-02, Department of Economics, University of Konstanz.
    4. Dieter Bös, 2004. "Contests Among Bureaucrats," Public Choice, Springer, vol. 119(3_4), pages 359-380, June.
    5. Dieter Bös, 2002. "Contests Among Bureaucrats," CESifo Working Paper Series 807, CESifo.
    6. Rafael Reuveny & John W. Maxwell, "undated". "Conflict and Renewable Resources," Working Papers 2004-26, Indiana University, Kelley School of Business, Department of Business Economics and Public Policy.
    7. Tverskoi, Denis & Senthilnathan, Athmanathan & Gavrilets, Sergey, 2021. "The dynamics of cooperation, power, and inequality in a group-structured society," SocArXiv 24svr, Center for Open Science.
    8. Hausken, Kjell, 2000. "Migration and intergroup conflict," Economics Letters, Elsevier, vol. 69(3), pages 327-331, December.
    9. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    10. Jacobsson, Adam, 2005. "War and Peace - Cyclical Phenomena?," Research Papers in Economics 2005:8, Stockholm University, Department of Economics.
    11. Cárdenas, Juan Camilo & Dreber, Anna & von Essen, Emma & Ranehill, Eva, 2015. "Cooperativeness and competitiveness in children," Journal of Behavioral and Experimental Economics (formerly The Journal of Socio-Economics), Elsevier, vol. 59(C), pages 32-41.
    12. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    13. Kjell Hausken, 2006. "The Stability Of Anarchy And Breakdown Of Production," Defence and Peace Economics, Taylor & Francis Journals, vol. 17(6), pages 589-603.
    14. Volker Müller-Benedict, 2002. "Xenophobia and Social Closure: a Development of a Model from Coleman," Journal of Artificial Societies and Social Simulation, Journal of Artificial Societies and Social Simulation, vol. 5(1), pages 1-2.
    15. Wang, Jianwei & Xu, Wenshu & Chen, Wei & Yu, Fengyuan & He, Jialu, 2021. "Inter-group selection of strategy promotes cooperation in public goods game," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 583(C).
    16. Philippe Grégoire & Arthur Robson, 2003. "Imitation, Group Selection and Cooperation," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 5(03), pages 229-247.

  149. Hausken, Kjell, 1998. "Collective rent seeking and division of labor1," European Journal of Political Economy, Elsevier, vol. 14(4), pages 739-768, November.

    Cited by:

    1. Hausken, Kjell, 2000. "Cooperation and between-group competition," Journal of Economic Behavior & Organization, Elsevier, vol. 42(3), pages 417-425, July.
    2. Hausken, Kjell, 2000. "Migration and intergroup conflict," Economics Letters, Elsevier, vol. 69(3), pages 327-331, December.
    3. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    4. Hausken, Kjell, 2006. "Jack Hirshleifer: A Nobel Prize left unbestowed," European Journal of Political Economy, Elsevier, vol. 22(2), pages 251-276, June.
    5. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.

  150. Kjell Hausken, 1997. "Game-theoretic and Behavioral Negotiation Theory," Group Decision and Negotiation, Springer, vol. 6(6), pages 511-528, December.

    Cited by:

    1. Beuk, Frederik & Rubin, Eran, 2021. "Data-based negotiator allocation management," Business Horizons, Elsevier, vol. 64(4), pages 537-552.
    2. Luis C. Dias & Rudolf Vetschera, 2022. "Two-party Bargaining Processes Based on Subjective Expectations: A Model and a Simulation Study," Group Decision and Negotiation, Springer, vol. 31(4), pages 843-869, August.
    3. Hendrik Hakenes & Svetlana Katolnik, 2018. "Optimal Team Size and Overconfidence," Group Decision and Negotiation, Springer, vol. 27(4), pages 665-687, August.
    4. Kjell Hausken, 2018. "Janet Tai Landa: Economic success of Chinese merchants in Southeast Asia: identity, ethnic cooperation and conflict: integrating the social sciences with evolutionary biology," Journal of Bioeconomics, Springer, vol. 20(2), pages 251-256, July.
    5. Ewa Roszkowska & Tom R. Burns, 2010. "Fuzzy Bargaining Games: Conditions of Agreement, Satisfaction, and Equilibrium," Group Decision and Negotiation, Springer, vol. 19(5), pages 421-440, September.

  151. Kjell Hausken & Thomas Plãœmper, 1996. "Hegemonic Decline and International Leadership," Politics & Society, , vol. 24(3), pages 273-295, September.

    Cited by:

    1. Hausken, Kjell, 1998. "Collective rent seeking and division of labor1," European Journal of Political Economy, Elsevier, vol. 14(4), pages 739-768, November.

  152. Kjell Hausken, 1996. "Ethics and efficiency in organizations," International Journal of Social Economics, Emerald Group Publishing Limited, vol. 23(9), pages 15-40, September.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.

  153. Kjell Hausken, 1995. "Intra-Level and Inter-Level Interaction," Rationality and Society, , vol. 7(4), pages 465-488, October.

    Cited by:

    1. Hausken, Kjell, 2000. "Cooperation and between-group competition," Journal of Economic Behavior & Organization, Elsevier, vol. 42(3), pages 417-425, July.
    2. Johannes Münster & Klaas Staal, 2012. "How organizational structure can reduce rent-seeking," Public Choice, Springer, vol. 150(3), pages 579-594, March.
    3. Tverskoi, Denis & Senthilnathan, Athmanathan & Gavrilets, Sergey, 2021. "The dynamics of cooperation, power, and inequality in a group-structured society," SocArXiv 24svr, Center for Open Science.
    4. Hausken, Kjell, 2000. "Migration and intergroup conflict," Economics Letters, Elsevier, vol. 69(3), pages 327-331, December.
    5. Kjell Hausken & Andreas Ortmann, 2007. "A first experimental test of multilevel game theory: the PD case," Applied Economics Letters, Taylor & Francis Journals, vol. 15(4), pages 261-264.
    6. Andreas Ortmann & Ralph Hertwig, 2002. "The Costs of Deception: Evidence from Psychology," Experimental Economics, Springer;Economic Science Association, vol. 5(2), pages 111-131, October.
    7. Fenling Feng & Chengguang Liu & Jiaqi Zhang, 2020. "China's Railway Transportation Safety Regulation System Based on Evolutionary Game Theory and System Dynamics," Risk Analysis, John Wiley & Sons, vol. 40(10), pages 1944-1966, October.
    8. Gunnthorsdottir, Anna & Rapoport, Amnon, 2006. "Embedding social dilemmas in intergroup competition reduces free-riding," Organizational Behavior and Human Decision Processes, Elsevier, vol. 101(2), pages 184-199, November.
    9. Hausken, Kjell, 1998. "Collective rent seeking and division of labor1," European Journal of Political Economy, Elsevier, vol. 14(4), pages 739-768, November.

  154. Hausken, Kjell, 1995. "The dynamics of within-group and between-group interaction," Journal of Mathematical Economics, Elsevier, vol. 24(7), pages 655-687.

    Cited by:

    1. Bös, Dieter, 2002. "Contests Among Bureaucrats," Bonn Econ Discussion Papers 27/2002, University of Bonn, Bonn Graduate School of Economics (BGSE).
    2. Vjollca Sadiraj & Jan Tuinstra & Frans Winden, 2005. "Interest group size dynamics and policymaking," Public Choice, Springer, vol. 125(3), pages 271-303, December.
    3. Hausken, Kjell, 2000. "Cooperation and between-group competition," Journal of Economic Behavior & Organization, Elsevier, vol. 42(3), pages 417-425, July.
    4. Baik, Kyung Hwan & Lee, Sanghack, 2001. "Strategic Groups and Rent Dissipation," Economic Inquiry, Western Economic Association International, vol. 39(4), pages 672-684, October.
    5. Dieter Bös, 2004. "Contests Among Bureaucrats," Public Choice, Springer, vol. 119(3_4), pages 359-380, June.
    6. Dieter Bös, 2002. "Contests Among Bureaucrats," CESifo Working Paper Series 807, CESifo.
    7. Kjell Hausken, 2018. "Janet Tai Landa: Economic success of Chinese merchants in Southeast Asia: identity, ethnic cooperation and conflict: integrating the social sciences with evolutionary biology," Journal of Bioeconomics, Springer, vol. 20(2), pages 251-256, July.
    8. Emerson M. S. Niou & Guofu Tan, 2005. "External Threat and Collective Action," Economic Inquiry, Western Economic Association International, vol. 43(3), pages 519-530, July.
    9. Hausken, Kjell, 2000. "Migration and intergroup conflict," Economics Letters, Elsevier, vol. 69(3), pages 327-331, December.
    10. Kyung Hwan Baik, 2016. "Endogenous Group Formation in Contests: Unobservable Sharing Rules," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 25(2), pages 400-419, April.
    11. Kjell Hausken, 2016. "Gordon Tullock: A Nobel Prize left unbestowed," Journal of Bioeconomics, Springer, vol. 18(2), pages 121-127, July.
    12. Andreas Ortmann & Ralph Hertwig, 2002. "The Costs of Deception: Evidence from Psychology," Experimental Economics, Springer;Economic Science Association, vol. 5(2), pages 111-131, October.
    13. Sherrill Shaffer & Jason Shogren, 2008. "Infinitely repeated contests: How strategic interaction affects the efficiency of governance," Regulation & Governance, John Wiley & Sons, vol. 2(2), pages 234-252, June.
    14. Fenling Feng & Chengguang Liu & Jiaqi Zhang, 2020. "China's Railway Transportation Safety Regulation System Based on Evolutionary Game Theory and System Dynamics," Risk Analysis, John Wiley & Sons, vol. 40(10), pages 1944-1966, October.
    15. Kjell Hausken, 1995. "Intra-Level and Inter-Level Interaction," Rationality and Society, , vol. 7(4), pages 465-488, October.
    16. Baik, Kyung Hwan & Dijkstra, Bouwe R. & Lee, Sanghack & Lee, Shi Young, 2006. "The equivalence of rent-seeking outcomes for competitive-share and strategic groups," European Journal of Political Economy, Elsevier, vol. 22(2), pages 337-342, June.
    17. Sun, Guang-Zhen & Ng, Yew-Kwang, 1999. "The Effect of Number and Size of Interest Groups on Social Rent Dissipation," Public Choice, Springer, vol. 101(3-4), pages 251-265, December.
    18. Baik, Kyung Hwan & Lee, Sanghack, 2007. "Collective rent seeking when sharing rules are private information," European Journal of Political Economy, Elsevier, vol. 23(3), pages 768-776, September.
    19. Anna Gunnthorsdottir & Amnon Rapoport, 2003. "The effect of sharing rules on group competition," Experimental 0307003, University Library of Munich, Germany.
    20. Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
    21. Noh, Suk Jae, 1999. "A General Equilibrium Model of Two Group Conflict with Endogenous Intra-group Sharing Rules," Public Choice, Springer, vol. 98(3-4), pages 251-267, March.
    22. Benndorf, Volker & Martínez-Martínez, Ismael & Normann, Hans-Theo, 2021. "Games with coupled populations: An experiment in continuous time," Journal of Economic Theory, Elsevier, vol. 195(C).
    23. Sherrill Shaffer & Jason F. Shogren, 2008. "Related Contests: A General Parameterization," CAMA Working Papers 2008-27, Centre for Applied Macroeconomic Analysis, Crawford School of Public Policy, The Australian National University.
    24. Kyung Hwan Baik & Dongryul Lee, 2012. "Do Rent‐Seeking Groups Announce Their Sharing Rules?," Economic Inquiry, Western Economic Association International, vol. 50(2), pages 348-363, April.
    25. Hausken, Kjell, 1998. "Collective rent seeking and division of labor1," European Journal of Political Economy, Elsevier, vol. 14(4), pages 739-768, November.
    26. Philippe Grégoire & Arthur Robson, 2003. "Imitation, Group Selection and Cooperation," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 5(03), pages 229-247.

Chapters

  1. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.

    Cited by:

    1. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    2. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.

  2. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.

    Cited by:

    1. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    2. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    3. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    4. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.
    5. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    6. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    7. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    8. Chen, Chao & Yang, Ming & Reniers, Genserik, 2021. "A dynamic stochastic methodology for quantifying HAZMAT storage resilience," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
    9. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    10. Daniel Seaberg & Laura Devine & Jun Zhuang, 2017. "A review of game theory applications in natural disaster management research," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(3), pages 1461-1483, December.
    11. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    12. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    13. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    14. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    15. Yao Zhang & Hoang Pham, 2016. "Reliability and Maintenance of the Surveillance Systems Considering Two Dependent Processes," Springer Series in Reliability Engineering, in: Hoang Pham (ed.), Quality and Reliability Management and Its Applications, pages 277-306, Springer.
    16. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    17. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    18. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    19. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    20. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    21. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    22. Subhayu Bandyopadhyay & Todd Sandler, 2022. "Voluntary participation in a terror group and counterterrorism policy," Working Papers 2022-023, Federal Reserve Bank of St. Louis.
    23. Subhayu Bandyopadhyay & Todd Sandler, 2020. "Counterterrorism Policy: Spillovers, Regime Stability, and Corner Solutions," Working Papers 2020-015, Federal Reserve Bank of St. Louis.
    24. David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
    25. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    26. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    27. Yang Yang & Adam R. Pah & Brian Uzzi, 2019. "Quantifying the future lethality of terror organizations," Proceedings of the National Academy of Sciences, Proceedings of the National Academy of Sciences, vol. 116(43), pages 21463-21468, October.
    28. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    29. Amanda Melendez & David Caballero-Russi & Mariantonieta Gutierrez Soto & Luis Felipe Giraldo, 2022. "Computational models of community resilience," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 111(2), pages 1121-1152, March.
    30. Oded Berman & Arieh Gavious & Rongbing Huang, 2011. "Location of response facilities: a simultaneous game between state and terrorist," International Journal of Operational Research, Inderscience Enterprises Ltd, vol. 10(1), pages 102-120.
    31. Ha Hwang & JiYoung Park, 2019. "The Game-Theoretic National Interstate Economic Model: Economically Optimizing U.S. Aviation Security Policies Against Terrorist Attacks," Advances in Spatial Science, in: Yasuhide Okuyama & Adam Rose (ed.), Advances in Spatial and Economic Modeling of Disaster Impacts, chapter 0, pages 399-421, Springer.
    32. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    33. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    34. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    35. Gregory Levitin & Kjell Hausken, 2012. "Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 304-318, February.
    36. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    37. Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
    38. Yupo Chan, 2015. "Network Throughput and Reliability: Preventing Hazards and Attacks Through Gaming—Part I: Modeling," Springer Series in Reliability Engineering, in: Kjell Hausken & Jun Zhuang (ed.), Game Theoretic Analysis of Congestion, Safety and Security, edition 127, pages 113-139, Springer.
    39. Chen, Chao & Reniers, Genserik & Khakzad, Nima, 2019. "Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: A dynamic graph approach," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    40. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    41. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    42. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    43. Yupo Chan, 2015. "Network Throughput and Reliability: Preventing Hazards and Attacks Through Gaming—Part 2: A Research Agenda," Springer Series in Reliability Engineering, in: Kjell Hausken & Jun Zhuang (ed.), Game Theoretic Analysis of Congestion, Safety and Security, edition 127, pages 141-172, Springer.
    44. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
    45. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    46. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    47. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    48. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    49. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    50. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).

Books

  1. Kjell Hausken & Jun Zhuang (ed.), 2015. "Game Theoretic Analysis of Congestion, Safety and Security," Springer Series in Reliability Engineering, Springer, edition 127, number 978-3-319-11674-7, February.

    Cited by:

    1. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    2. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.
    3. R. Piccinelli & G. Sansavini & R. Lucchetti & E. Zio, 2017. "A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2182-2190, November.
    4. Nogal, Maria & O'Connor, Alan & Caulfield, Brian & Martinez-Pastor, Beatriz, 2016. "Resilience of traffic networks: From perturbation to recovery via a dynamic restricted equilibrium model," Reliability Engineering and System Safety, Elsevier, vol. 156(C), pages 84-96.
    5. Hansen, Mark & Liu, Yi, 2015. "Airline competition and market frequency: A comparison of the s-curve and schedule delay models," Transportation Research Part B: Methodological, Elsevier, vol. 78(C), pages 301-317.
    6. Li, Yongli & Gao, Xin & Xu, Zhiwei & Zhou, Xuanrui, 2018. "Network-based queuing model for simulating passenger throughput at an airport security checkpoint," Journal of Air Transport Management, Elsevier, vol. 66(C), pages 13-24.
    7. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.

  2. Kjell Hausken & Jun Zhuang (ed.), 2015. "Game Theoretic Analysis of Congestion, Safety and Security," Springer Series in Reliability Engineering, Springer, edition 127, number 978-3-319-13009-5, February.

    Cited by:

    1. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    2. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.
    3. R. Piccinelli & G. Sansavini & R. Lucchetti & E. Zio, 2017. "A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2182-2190, November.
    4. Nogal, Maria & O'Connor, Alan & Caulfield, Brian & Martinez-Pastor, Beatriz, 2016. "Resilience of traffic networks: From perturbation to recovery via a dynamic restricted equilibrium model," Reliability Engineering and System Safety, Elsevier, vol. 156(C), pages 84-96.
    5. Hansen, Mark & Liu, Yi, 2015. "Airline competition and market frequency: A comparison of the s-curve and schedule delay models," Transportation Research Part B: Methodological, Elsevier, vol. 78(C), pages 301-317.
    6. Li, Yongli & Gao, Xin & Xu, Zhiwei & Zhou, Xuanrui, 2018. "Network-based queuing model for simulating passenger throughput at an airport security checkpoint," Journal of Air Transport Management, Elsevier, vol. 66(C), pages 13-24.
    7. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.

  3. Kjell Hausken & Mthuli Ncube, 2013. "Quantitative Easing and Its Impact in the US, Japan, the UK and Europe," SpringerBriefs in Economics, Springer, edition 127, number 978-1-4614-9646-5, October.

    Cited by:

    1. Fabo, Brian & Jančoková, Martina & Kempf, Elisabeth & Pástor, Ľuboš, 2024. "Fifty shades of QE: Robust evidence," Journal of Banking & Finance, Elsevier, vol. 159(C).
    2. Grahame Johnson & Sharon Kozicki & Romanos Priftis & Lena Suchanek & Jonathan Witmer & Jing Yang, 2020. "Implementation and Effectiveness of Extended Monetary Policy Tools: Lessons from the Literature," Discussion Papers 2020-16, Bank of Canada.
    3. Engelbert Stockhammer & Collin Constantine & Severin Reissl, 2016. "Explaining the Euro crisis: Current account imbalances, credit booms and economic policy in different economic paradigms," Working Papers PKWP1617, Post Keynesian Economics Society (PKES).
    4. Fabo, Brian & Jančoková, Martina & Kempf, Elisabeth & Pástor, Ľuboš, 2021. "Fifty shades of QE: Comparing findings of central bankers and academics," Journal of Monetary Economics, Elsevier, vol. 120(C), pages 1-20.
    5. Marie‐Helene Gagnon & Celine Gimet, 2020. "Unconventional economic policies and sentiment: An international assessment," The World Economy, Wiley Blackwell, vol. 43(6), pages 1544-1591, June.
    6. Cohen, Lior, 2023. "The effects of the BoJ's ETF purchases on equities and corporate investment," Economic Modelling, Elsevier, vol. 129(C).
    7. Dana Kiseľáková & Paulina Filip & Erika Onuferová & Tomáš Valentiny, 2020. "The Impact of Monetary Policies on the Sustainable Economic and Financial Development in the Euro Area Countries," Sustainability, MDPI, vol. 12(22), pages 1-21, November.
    8. Aleksandra Nocoń, 2020. "Sustainable Approach to the Normalization Process of the UK’s Monetary Policy," Sustainability, MDPI, vol. 12(21), pages 1-14, November.
    9. Gibran Watfe, 2015. "The Impact of the ECB's Asset Purchase Programmes on Sovereign Bond Spreads in the Euro Area," Bruges European Economic Research Papers 35, European Economic Studies Department, College of Europe.
    10. Jakub Jakl, 2020. "Outreach and Effects of the ECB Corporate Sector Purchase Programme," Prague Economic Papers, Prague University of Economics and Business, vol. 2020(3), pages 291-314.

IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.