IDEAS home Printed from https://ideas.repec.org/f/c/pzh735.html
   My authors  Follow this author

Jun Zhuang

Citations

Many of the citations below have been collected in an experimental project, CitEc, where a more detailed citation analysis can be found. These are citations from works listed in RePEc that could be analyzed mechanically. So far, only a minority of all works could be analyzed. See under "Corrections" how you can help improve the citation analysis.

Working papers

  1. Zhuang, Jun & Marchant, Mary A. & Nokes, Sue & Strobel, Herbert, 2004. "Economic Analysis of Cellulase Production by Clostridium thermocellum in Solid State and Submerged Fermentation," Staff Papers 31982, University of Kentucky, Department of Agricultural Economics.

    Cited by:

    1. Abiola Ezekiel Taiwo & Andykan Tom-James & Paul Musonge, 2023. "Economic assessment of cellulase production in batch and semi-batch solid-state fermentation processes," International Journal of Low-Carbon Technologies, Oxford University Press, vol. 18, pages 204-211.

  2. Marchant, Mary A. & Murrell, Courtney Paige & Zhuang, Jun, 2004. "Investment Analysis Of Replacing Endophyte-Infected With Endophyte-Free Tall Fescue Pastures," 2004 Annual Meeting, February 14-18, 2004, Tulsa, Oklahoma 34630, Southern Agricultural Economics Association.

    Cited by:

    1. Musshoff, Oliver & Hirschauer, Norbert, 2008. "Investment planning under uncertainty and flexibility: the case of a purchasable sales contract," Australian Journal of Agricultural and Resource Economics, Australian Agricultural and Resource Economics Society, vol. 52(01), pages 1-20.
    2. Tubetov, Dulat & Musshoff, Oliver & Kellner, Ulla, 2012. "Investments in Kazakhstani Dairy Farming: A Comparison of Classical Investment Theory and the Real Options Approach," Quarterly Journal of International Agriculture, Humboldt-Universitaat zu Berlin, vol. 51(3), pages 1-28, August.
    3. Smith, Stephen A. & Caldwell, James D. & Popp, Michael P. & Coffey, Kenneth P. & Jennings, John A. & Savin, Mary C. & Rosenkrans, Charles F., Jr., 2012. "Tall Fescue Toxicosis Mitigation Strategies: Comparisons of Cow-calf Returns," Journal of Agricultural and Applied Economics, Southern Agricultural Economics Association, vol. 44(4), pages 1-16, November.
    4. Oliver Musshoff & Norbert Hirschauer, 2008. "Adoption of organic farming in Germany and Austria: an integrative dynamic investment perspective," Agricultural Economics, International Association of Agricultural Economists, vol. 39(1), pages 135-145, July.

  3. Peng, Xuehua & Marchant, Mary A. & Qin, Xiang Dong & Zhuang, Jun, 2003. "Chinese Consumers' Preferences for Livestock Products," 2003 Annual meeting, July 27-30, Montreal, Canada 22253, American Agricultural Economics Association (New Name 2008: Agricultural and Applied Economics Association).

    Cited by:

    1. Zhao, Jing & Thompson, Wyatt, 2013. "The Effect of Refrigerator Use on Meat Consumption in Rural China," 2013 Annual Meeting, February 2-5, 2013, Orlando, Florida 142931, Southern Agricultural Economics Association.
    2. Xie, Chaoping & Marchant, Mary A., 2015. "Supplying China’s Growing Appetite for Poultry," International Food and Agribusiness Management Review, International Food and Agribusiness Management Association, vol. 18(A), pages 1-22, July.
    3. Zhang, Xiaoyong & Dagevos, Hans & He, Yuna & van der Lans, Ivo & Zhai, Fengying, 2008. "Consumption and corpulence in China: A consumer segmentation study based on the food perspective," Food Policy, Elsevier, vol. 33(1), pages 37-47, February.
    4. Wang, Qingbin & Zhang, Guangxuan, 2012. "China’s small-scale hog production and implications for trade: Evidence from a farmer survey," 2012 Annual Meeting, August 12-14, 2012, Seattle, Washington 125288, Agricultural and Applied Economics Association.

Articles

  1. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

    Cited by:

    1. Magoua, Joseph Jonathan & Li, Nan, 2023. "The human factor in the disaster resilience modeling of critical infrastructure systems," Reliability Engineering and System Safety, Elsevier, vol. 232(C).
    2. Tomáš Loveček & Lenka Straková & Katarína Kampová, 2021. "Modeling and Simulation as Tools to Increase the Protection of Critical Infrastructure and the Sustainability of the Provision of Essential Needs of Citizens," Sustainability, MDPI, vol. 13(11), pages 1-18, May.
    3. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    4. Wang, Jian & Cui, Lei, 2023. "Patrolling games with coordination between monitoring devices and patrols," Reliability Engineering and System Safety, Elsevier, vol. 233(C).
    5. Liu, Yi & Chen, Xia & Zhuang, Jun & Dong, Yucheng, 2024. "Defensive resource allocation in terrorism conflict management based on graph model with relative preferences," Socio-Economic Planning Sciences, Elsevier, vol. 96(C).
    6. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).

  2. Jiang, Meiling & Gao, Qingwu & Zhuang, Jun, 2021. "Reciprocal spreading and debunking processes of online misinformation: A new rumor spreading–debunking model with a case study," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 565(C).

    Cited by:

    1. Zhu, Linhe & Zheng, Wenxin & Shen, Shuling, 2023. "Dynamical analysis of a SI epidemic-like propagation model with non-smooth control," Chaos, Solitons & Fractals, Elsevier, vol. 169(C).
    2. Wang, Chuanbiao & Liu, Ruiying & Wang, Yan, 2023. "The spread dynamics model of the interaction between rumors and derivative rumors in emergencies under the control strategy," Chaos, Solitons & Fractals, Elsevier, vol. 175(P2).
    3. Jamalzadeh, Saeed & Mettenbrink, Lily & Barker, Kash & González, Andrés D. & Radhakrishnan, Sridhar & Johansson, Jonas & Bessarabova, Elena, 2024. "Weaponized disinformation spread and its impact on multi-commodity critical infrastructure networks," Reliability Engineering and System Safety, Elsevier, vol. 243(C).

  3. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    3. Wu, Yipeng & Chen, Zhilong & Gong, Huadong & Feng, Qilin & Chen, Yicun & Tang, Haizhou, 2021. "Defender–attacker–operator: Tri-level game-theoretic interdiction analysis of urban water distribution networks," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    4. Wu, Yipeng & Chen, Zhilong & Dang, Junhu & Chen, Yicun & Zhao, Xudong & Zha, Lvying, 2022. "Allocation of defensive and restorative resources in electric power system against consecutive multi-target attacks," Reliability Engineering and System Safety, Elsevier, vol. 219(C).
    5. Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
    6. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    7. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    8. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    9. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    10. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    11. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    12. Wang, Jian & Cui, Lei, 2023. "Patrolling games with coordination between monitoring devices and patrols," Reliability Engineering and System Safety, Elsevier, vol. 233(C).
    13. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
    14. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).

  4. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.

    Cited by:

    1. Li, Yijia & Hu, Xiaoxiao & Zhao, Peng, 2021. "On the reliability of a voting system under cyber attacks," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    2. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    3. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    4. Zhu, Xiaoning & Yan, Rui & Peng, Rui & Zhang, Zhongxin, 2020. "Optimal routing, loading and aborting of UAVs executing both visiting tasks and transportation tasks," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    5. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    6. Jiaqi Ren & Jin Liu & Yibo Dong & Zhe Li & Weili Li, 2024. "NIGA: A Novel Method for Investigating the Attacker–Defender Model within Critical Infrastructure Networks," Mathematics, MDPI, vol. 12(16), pages 1-24, August.
    7. Chen, Wenhao & Li, Jichao & Jiang, Jiang & Chen, Gang, 2022. "Weighted interdependent network disintegration strategy based on Q-learning," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 586(C).
    8. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    9. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    10. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    11. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).

  5. Shan, Xiaojun Gene & Zhuang, Jun, 2020. "A game-theoretic approach to modeling attacks and defenses of smart grids at three levels," Reliability Engineering and System Safety, Elsevier, vol. 195(C).

    Cited by:

    1. Berghout, Tarek & Benbouzid, Mohamed & Muyeen, S.M., 2022. "Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Oster, Matthew R. & King, Ethan & Bakker, Craig & Bhattacharya, Arnab & Chatterjee, Samrat & Pan, Feng, 2023. "Multi-level optimization with the koopman operator for data-driven, domain-aware, and dynamic system security," Reliability Engineering and System Safety, Elsevier, vol. 237(C).
    5. Wu, Yipeng & Chen, Zhilong & Dang, Junhu & Chen, Yicun & Zhao, Xudong & Zha, Lvying, 2022. "Allocation of defensive and restorative resources in electric power system against consecutive multi-target attacks," Reliability Engineering and System Safety, Elsevier, vol. 219(C).
    6. Fu, Xiuwen & Li, Qing & Li, Wenfeng, 2023. "Modeling and analysis of industrial IoT reliability to cascade failures: An information-service coupling perspective," Reliability Engineering and System Safety, Elsevier, vol. 239(C).
    7. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    8. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    9. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    10. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    11. Ding, Zhetong & Chen, Chunyu & Cui, Mingjian & Bi, Wenjun & Chen, Yang & Li, Fangxing, 2021. "Dynamic game-based defensive primary frequency control system considering intelligent attackers," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    12. Dui, Hongyan & Li, Heyuan & Dong, Xinghui & Wu, Shaomin, 2025. "An energy IoT-driven multi-dimension resilience methodology of smart microgrids," Reliability Engineering and System Safety, Elsevier, vol. 253(C).

  6. Lei Guan & Yongxue Mu & Xiaolin Xu & Lianmin Zhang & Jun Zhuang, 2020. "Keep it or give back? Optimal pricing strategy of reward-based crowdfunding with a hybrid mechanism in the sharing economy," International Journal of Production Research, Taylor & Francis Journals, vol. 58(22), pages 6868-6889, November.

    Cited by:

    1. Ravi Roshan & Krishna Chandra Balodi & Sagnika Datta & Anil Kumar & Arvind Upadhyay, 2024. "Circular economy startups and digital entrepreneurial ecosystems," Business Strategy and the Environment, Wiley Blackwell, vol. 33(5), pages 4843-4860, July.
    2. Xu, Yang & Zhou, Qiang & Wang, Xu, 2023. "Joint price and quality optimization strategy in crowdfunding campaign," International Journal of Production Economics, Elsevier, vol. 263(C).
    3. Leone, Daniele & Cristina Pietronudo, Maria & Gabteni, Heger & Rosaria Carli, Maria, 2023. "Reward-based crowdfunding for building a valuable circular business model," Journal of Business Research, Elsevier, vol. 157(C).

  7. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.

    Cited by:

    1. Christiansen, Jeffrey & Ernst, Andreas T. & Rieger, Janosch, 2024. "A robust optimization approach for a two-player force-design game," European Journal of Operational Research, Elsevier, vol. 318(2), pages 656-669.
    2. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.

  8. Kyle Hunt & Bairong Wang & Jun Zhuang, 2020. "Misinformation debunking and cross-platform information sharing through Twitter during Hurricanes Harvey and Irma: a case study on shelters and ID checks," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 103(1), pages 861-883, August.

    Cited by:

    1. Chang Luo & Juan Liu & Tianjiao Yang & Jinghong Xu, 2023. "Combating Disinformation or Reinforcing Cognitive Bias: Effect of Weibo Poster’s Location Disclosure," Media and Communication, Cogitatio Press, vol. 11(2), pages 88-100.
    2. Jiang, Meiling & Gao, Qingwu & Zhuang, Jun, 2021. "Reciprocal spreading and debunking processes of online misinformation: A new rumor spreading–debunking model with a case study," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 565(C).
    3. Mingyun Gu & Haixiang Guo & Jun Zhuang & Yufei Du & Lijin Qian, 2022. "Social Media User Behavior and Emotions during Crisis Events," IJERPH, MDPI, vol. 19(9), pages 1-21, April.
    4. Rosa Vicari & Nadejda Komendatova, 2023. "Systematic meta-analysis of research on AI tools to deal with misinformation on social media during natural and anthropogenic hazards and disasters," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-14, December.
    5. Agarwal, Puneet & Aziz, Ridwan Al & Zhuang, Jun, 2022. "Interplay of rumor propagation and clarification on social media during crisis events - A game-theoretic approach," European Journal of Operational Research, Elsevier, vol. 298(2), pages 714-733.
    6. Hunt, Kyle & Narayanan, Adithya & Zhuang, Jun, 2022. "Blockchain in humanitarian operations management: A review of research and practice," Socio-Economic Planning Sciences, Elsevier, vol. 80(C).
    7. So-Min Cheong & Matthew Babcock, 2021. "Attention to misleading and contentious tweets in the case of Hurricane Harvey," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 105(3), pages 2883-2906, February.

  9. Puneet Agarwal & Junlin Tang & Adithya Narayanan Lakshmi Narayanan & Jun Zhuang, 2020. "Big Data and Predictive Analytics in Fire Risk Using Weather Data," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1438-1449, July.

    Cited by:

    1. Wang, Ning & Xu, Yan & Wang, Sutong, 2022. "Interpretable boosting tree ensemble method for multisource building fire loss prediction," Reliability Engineering and System Safety, Elsevier, vol. 225(C).
    2. Wang, Ning & Zhao, Shiyue & Wang, Sutong, 2024. "A novel clustering-based resampling with cost-sensitive boosting method to model and map wildfire susceptibility," Reliability Engineering and System Safety, Elsevier, vol. 242(C).
    3. Esther Jose & Puneet Agarwal & Jun Zhuang, 2023. "A data-driven analysis and optimization of the impact of prescribed fire programs on wildfire risk in different regions of the USA," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 118(1), pages 181-207, August.

  10. Song, Cen & Guo, Jingquan & Zhuang, Jun, 2020. "Analyzing passengers’ emotions following flight delays- a 2011–2019 case study on SKYTRAX comments," Journal of Air Transport Management, Elsevier, vol. 89(C).

    Cited by:

    1. Cen Song & Sijia Zhou & Kyle Hunt & Jun Zhuang, 2022. "Comprehensive Evolution Analysis of Public Perceptions Related to Pediatric Care: A Sina Weibo Case Study (2013–2020)," SAGE Open, , vol. 12(1), pages 21582440221, March.
    2. Pereira, Francisco & Costa, Joana Martinho & Ramos, Ricardo & Raimundo, António, 2023. "The impact of the COVID-19 pandemic on airlines’ passenger satisfaction," Journal of Air Transport Management, Elsevier, vol. 112(C).
    3. Bakır, Mahmut & Özdemir, Emircan & Akan, Şahap & Atalık, Özlem, 2022. "A bibliometric analysis of airport service quality," Journal of Air Transport Management, Elsevier, vol. 104(C).

  11. Fei He & Jun Zhuang & Nageswara S. V. Rao, 2020. "Discrete game-theoretic analysis of defense in correlated cyber-physical systems," Annals of Operations Research, Springer, vol. 294(1), pages 741-767, November.

    Cited by:

    1. Dacorogna, Michel & Debbabi, Nehla & Kratz, Marie, 2023. "Building up cyber resilience by better grasping cyber risk via a new algorithm for modelling heavy-tailed data," European Journal of Operational Research, Elsevier, vol. 311(2), pages 708-729.
    2. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    3. Susu Ni & Shuliang Zou & Jiahua Chen, 2022. "Evolutionary Game Model of Internal Threats to Nuclear Security in Spent Fuel Reprocessing Plants Based on RDEU Theory," Sustainability, MDPI, vol. 14(4), pages 1-16, February.

  12. Gao, Qingwu & Zhuang, Jun, 2020. "Stability analysis and control strategies for worm attack in mobile networks via a VEIQS propagation model," Applied Mathematics and Computation, Elsevier, vol. 368(C).

    Cited by:

    1. Rajeev Kumar Shakya & Tadesse Hailu Ayane & Feyissa Debo Diba & Pushpa Mamoria, 2022. "SEIRS model with spatial correlation for analyzing dynamic of virus spreading in event-driven wireless sensor networks," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 13(2), pages 752-760, April.
    2. Jiang, Jiehui & Ma, Jie, 2023. "Dynamic analysis of pandemic cross-regional transmission considering quarantine strategies in the context of limited medical resources," Applied Mathematics and Computation, Elsevier, vol. 450(C).
    3. Piqueira, José Roberto C. & Cabrera, Manuel A.M. & Batistela, Cristiane M., 2021. "Malware propagation in clustered computer networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 573(C).

  13. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.

    Cited by:

    1. Vicki M. Bier, 2020. "From the Editor: Advances in Multi-Agent Decision Making," Decision Analysis, INFORMS, vol. 17(3), pages 187-188, September.
    2. Agarwal, Puneet & Aziz, Ridwan Al & Zhuang, Jun, 2022. "Interplay of rumor propagation and clarification on social media during crisis events - A game-theoretic approach," European Journal of Operational Research, Elsevier, vol. 298(2), pages 714-733.

  14. Wang, Jia & Hu, Jun & Shen, Shifei & Zhuang, Jun & Ni, Shunjiang, 2020. "Crime risk analysis through big data algorithm with urban metrics," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 545(C).

    Cited by:

    1. Ganguly, Prasangsha & Mukherjee, Sayanti, 2021. "A multifaceted risk assessment approach using statistical learning to evaluate socio-environmental factors associated with regional felony and misdemeanor rates," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 574(C).
    2. Feng, Jiajia & Liang, Yuebing & Hao, Qi & Xu, Ke & Qiu, Waishan, 2024. "Comparing effectiveness of point of interest data and land use data in theft crime modelling: A case study in Beijing," Land Use Policy, Elsevier, vol. 147(C).

  15. Qifeng Wan & Xuanhua Xu & Xiaohong Chen & Jun Zhuang, 2020. "A Two-Stage Optimization Model for Large-Scale Group Decision-Making in Disaster Management: Minimizing Group Conflict and Maximizing Individual Satisfaction," Group Decision and Negotiation, Springer, vol. 29(5), pages 901-921, October.

    Cited by:

    1. Jackson, Canek & Pascual, Rodrigo & Mac Cawley, Alejandro & Godoy, Sergio, 2023. "Product–service system negotiation in aircraft lease contracts with option of disagreement," Journal of Air Transport Management, Elsevier, vol. 107(C).
    2. Junliang Du & Sifeng Liu & Yong Liu & Liangyan Tao, 2023. "Multi-criteria Large-Scale Group Decision-Making in Linguistic Contexts: A Perspective of Conflict Analysis and Resolution," Group Decision and Negotiation, Springer, vol. 32(1), pages 177-207, February.
    3. Elisa F. Long & Gilberto Montibeller & Jun Zhuang, 2022. "Health Decision Analysis: Evolution, Trends, and Emerging Topics," Decision Analysis, INFORMS, vol. 19(4), pages 255-264, December.
    4. Tiantian Gai & Mingshuo Cao & Francisco Chiclana & Zhen Zhang & Yucheng Dong & Enrique Herrera-Viedma & Jian Wu, 2023. "Consensus-trust Driven Bidirectional Feedback Mechanism for Improving Consensus in Social Network Large-group Decision Making," Group Decision and Negotiation, Springer, vol. 32(1), pages 45-74, February.
    5. Dacy Câmara Lobosco & Paulo Victor Rodrigues Carvalho, 2023. "Transforming Sensemaking and Perceptions on Meteorological Data to Inform Emergency Decision-Making," Group Decision and Negotiation, Springer, vol. 32(2), pages 469-502, April.
    6. Feifei Jin & Jinpei Liu & Ligang Zhou & Luis Martínez, 2021. "Consensus-Based Linguistic Distribution Large-Scale Group Decision Making Using Statistical Inference and Regret Theory," Group Decision and Negotiation, Springer, vol. 30(4), pages 813-845, August.

  16. Vineet M. Payyappalli & Jun Zhuang, 2019. "A data-driven integer programming model for soccer clubs’ decision making on player transfers," Environment Systems and Decisions, Springer, vol. 39(4), pages 466-481, December.

    Cited by:

    1. Zachary A. Collier & James H. Lambert & Igor Linkov, 2019. "Innovation of risk analytics for technology and society," Environment Systems and Decisions, Springer, vol. 39(4), pages 369-370, December.
    2. G. Pantuso & L. M. Hvattum, 2021. "Maximizing performance with an eye on the finances: a chance-constrained model for football transfer market decisions," TOP: An Official Journal of the Spanish Society of Statistics and Operations Research, Springer;Sociedad de Estadística e Investigación Operativa, vol. 29(2), pages 583-611, July.

  17. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.

    Cited by:

    1. Christiansen, Jeffrey & Ernst, Andreas T. & Rieger, Janosch, 2024. "A robust optimization approach for a two-player force-design game," European Journal of Operational Research, Elsevier, vol. 318(2), pages 656-669.
    2. Alcantara-Jiménez, Guillermo & Clempner, Julio B., 2020. "Repeated Stackelberg security games: Learning with incomplete state information," Reliability Engineering and System Safety, Elsevier, vol. 195(C).
    3. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    4. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    5. Zhao, Yunfei & Huang, Linan & Smidts, Carol & Zhu, Quanyan, 2020. "Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    6. Wu, Yipeng & Chen, Zhilong & Dang, Junhu & Chen, Yicun & Zhao, Xudong & Zha, Lvying, 2022. "Allocation of defensive and restorative resources in electric power system against consecutive multi-target attacks," Reliability Engineering and System Safety, Elsevier, vol. 219(C).
    7. Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
    8. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    9. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    10. Wang, Shuliang & Sun, Jingya & Zhang, Jianhua & Dong, Qiqi & Gu, Xifeng & Chen, Chen, 2023. "Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes," International Journal of Critical Infrastructure Protection, Elsevier, vol. 40(C).
    11. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    12. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    13. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    14. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    15. Li, Yulong & Lin, Jie & Zhang, Chi & Zhu, Huaxing & Zeng, Saixing & Sun, Chengshaung, 2022. "Joint optimization of structure and protection of interdependent infrastructure networks," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).

  18. Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.

    Cited by:

    1. Esther Jose & Puneet Agarwal & Jun Zhuang, 2023. "A data-driven analysis and optimization of the impact of prescribed fire programs on wildfire risk in different regions of the USA," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 118(1), pages 181-207, August.
    2. Puneet Agarwal & Junlin Tang & Adithya Narayanan Lakshmi Narayanan & Jun Zhuang, 2020. "Big Data and Predictive Analytics in Fire Risk Using Weather Data," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1438-1449, July.

  19. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.

    Cited by:

    1. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    2. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    3. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    4. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    5. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    6. Liu, Yi & Chen, Xia & Zhuang, Jun & Dong, Yucheng, 2024. "Defensive resource allocation in terrorism conflict management based on graph model with relative preferences," Socio-Economic Planning Sciences, Elsevier, vol. 96(C).

  20. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    3. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Wu, Yipeng & Chen, Zhilong & Dang, Junhu & Chen, Yicun & Zhao, Xudong & Zha, Lvying, 2022. "Allocation of defensive and restorative resources in electric power system against consecutive multi-target attacks," Reliability Engineering and System Safety, Elsevier, vol. 219(C).
    5. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    6. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    7. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    8. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    9. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    10. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    11. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    12. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    13. Hsi Tse Wang, 2020. "Discussion of the Competitive Strategies of Telecom Operators and Over-the-Top Service Providers from the Perspective of Evolutionary Game Theory," Decision Analysis, INFORMS, vol. 17(3), pages 260-275, September.
    14. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    15. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    16. Ding, Zhetong & Chen, Chunyu & Cui, Mingjian & Bi, Wenjun & Chen, Yang & Li, Fangxing, 2021. "Dynamic game-based defensive primary frequency control system considering intelligent attackers," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    17. Liu, Yi & Chen, Xia & Zhuang, Jun & Dong, Yucheng, 2024. "Defensive resource allocation in terrorism conflict management based on graph model with relative preferences," Socio-Economic Planning Sciences, Elsevier, vol. 96(C).
    18. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).

  21. Victor Richmond R. Jose & Jun Zhuang, 2018. "Incorporating risk preferences in stochastic noncooperative games," IISE Transactions, Taylor & Francis Journals, vol. 50(1), pages 1-13, January.

    Cited by:

    1. Li, Xiang & Qi, Xiangtong, 2021. "On pricing and quality decisions with risk aversion," Omega, Elsevier, vol. 98(C).
    2. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    3. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.

  22. Feng Li & Qingyuan Zhu & Jun Zhuang, 2018. "Analysis of fire protection efficiency in the United States: a two-stage DEA-based approach," OR Spectrum: Quantitative Approaches in Management, Springer;Gesellschaft für Operations Research e.V., vol. 40(1), pages 23-68, January.

    Cited by:

    1. Li, Yongjun & Wang, Lizheng & Li, Feng, 2021. "A data-driven prediction approach for sports team performance and its application to National Basketball Association," Omega, Elsevier, vol. 98(C).
    2. Feng Li & Qingyuan Zhu & Liang Liang, 2019. "A new data envelopment analysis based approach for fixed cost allocation," Annals of Operations Research, Springer, vol. 274(1), pages 347-372, March.
    3. Svetlana V. Ratner & Andrey V. Lychev & Vladimir E. Krivonozhko, 2024. "Data Envelopment Analysis-Based Approach to Improving of the Budget Allocation System for Decarbonization Targets," Economies, MDPI, vol. 12(7), pages 1-16, June.
    4. Zhao, Linlin & Zhu, Qingyuan & Zhang, Lin, 2021. "Regulation adaptive strategy and bank efficiency: A network slacks-based measure with shared resources," European Journal of Operational Research, Elsevier, vol. 295(1), pages 348-362.
    5. Xiyang Lei & Yongjun Li & Alec Morton, 2022. "Dominance and ranking interval in DEA parallel production systems," OR Spectrum: Quantitative Approaches in Management, Springer;Gesellschaft für Operations Research e.V., vol. 44(2), pages 649-675, June.
    6. Yongjun Li & Feng Li & Ali Emrouznejad & Liang Liang & Qiwei Xie, 2019. "Allocating the fixed cost: an approach based on data envelopment analysis and cooperative game," Annals of Operations Research, Springer, vol. 274(1), pages 373-394, March.
    7. Li, Feng & Zhu, Qingyuan & Chen, Zhi, 2019. "Allocating a fixed cost across the decision making units with two-stage network structures," Omega, Elsevier, vol. 83(C), pages 139-154.

  23. Jie Jin & Jun Zhuang & Qiuhong Zhao, 2018. "Supervision after Certification: An Evolutionary Game Analysis for Chinese Environmental Labeled Enterprises," Sustainability, MDPI, vol. 10(5), pages 1-22, May.

    Cited by:

    1. Bartłomiej Kabaja & Magdalena Wojnarowska & Marek Ćwiklicki & Stefania Claudia Buffagni & Erica Varese, 2023. "Does Environmental Labelling Still Matter? Generation Z’s Purchasing Decisions," Sustainability, MDPI, vol. 15(18), pages 1-19, September.
    2. Bartłomiej Kabaja & Magdalena Wojnarowska & Maria Chiara Cesarani & Erica Varese, 2022. "Recognizability of Ecolabels on E-Commerce Websites: The Case for Younger Consumers in Poland," Sustainability, MDPI, vol. 14(9), pages 1-19, April.
    3. Zhicheng Weng & Pinliang Luo, 2021. "Supervision of the Default Risk of Online Car-Hailing Platform from an Evolutionary Game Perspective," Sustainability, MDPI, vol. 13(2), pages 1-19, January.
    4. Iris Gavish & Abraham Haim & Doron Kliger, 2021. "‘To LED or Not to LED?’: Using Color Priming for Influencing Consumers’ Preferences of Light Bulbs," Sustainability, MDPI, vol. 13(3), pages 1-12, January.
    5. Olimpia Martucci & Gabriella Arcese & Chiara Montauti & Alessia Acampora, 2019. "Social Aspects in the Wine Sector: Comparison between Social Life Cycle Assessment and VIVA Sustainable Wine Project Indicators," Resources, MDPI, vol. 8(2), pages 1-14, April.
    6. Yunpeng Yang & Weixin Yang, 2019. "Does Whistleblowing Work for Air Pollution Control in China? A Study Based on Three-party Evolutionary Game Model under Incomplete Information," Sustainability, MDPI, vol. 11(2), pages 1-20, January.
    7. Juan Wang & Xin Wan & Ruide Tu, 2022. "Game Analysis of the Evolution of Local Government’s River Chief System Implementation Strategy," IJERPH, MDPI, vol. 19(4), pages 1-13, February.
    8. Jie Jin & Qiuhong Zhao & Ernesto DR Santibanez-Gonzalez, 2019. "How Chinese Consumers’ Intentions for Purchasing Eco-Labeled Products Are Influenced by Psychological Factors," IJERPH, MDPI, vol. 17(1), pages 1-17, December.
    9. Jichao Geng & Meiyu Ji & Li Yang, 2022. "Role of Enterprise Alliance in Carbon Emission Reduction Mechanism: An Evolutionary Game Analysis," IJERPH, MDPI, vol. 19(18), pages 1-17, September.

  24. Meilin He & Laura Devine & Jun Zhuang, 2018. "Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 215-225, February.

    Cited by:

    1. Jian Wang & Jin-Chun Huang & Shan-Lin Huang & Gwo-Hshiung Tzeng & Ting Zhu, 2021. "Improvement Path for Resource-Constrained Cities Identified Using an Environmental Co-Governance Assessment Framework Based on BWM-mV Model," IJERPH, MDPI, vol. 18(9), pages 1-30, May.
    2. Tania Wallis & Rafał Leszczyna, 2022. "EE-ISAC—Practical Cybersecurity Solution for the Energy Sector," Energies, MDPI, vol. 15(6), pages 1-23, March.
    3. Natalie M. Scala & Allison C. Reilly & Paul L. Goethals & Michel Cukier, 2019. "Risk and the Five Hard Problems of Cybersecurity," Risk Analysis, John Wiley & Sons, vol. 39(10), pages 2119-2126, October.
    4. María Jesús Ávila-Gutiérrez & Alejandro Martín-Gómez & Francisco Aguayo-González & Antonio Córdoba-Roldán, 2019. "Standardization Framework for Sustainability from Circular Economy 4.0," Sustainability, MDPI, vol. 11(22), pages 1-26, November.
    5. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    6. Lu Xu & Yanhui Li & Jing Fu, 2019. "Cybersecurity Investment Allocation for a Multi-Branch Firm: Modeling and Optimization," Mathematics, MDPI, vol. 7(7), pages 1-20, July.
    7. Gregory Levitin & Liudong Xing & Hong‐Zhong Huang, 2019. "Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 846-858, April.
    8. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.

  25. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.

    Cited by:

    1. M. Hosein Zare & Oleg A. Prokopyev & Denis Sauré, 2020. "On Bilevel Optimization with Inexact Follower," Decision Analysis, INFORMS, vol. 17(1), pages 74-95, March.
    2. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    3. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    4. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    5. Abumoslem Mohammadi & Javad Tayyebi, 2019. "Maximum Capacity Path Interdiction Problem with Fixed Costs," Asia-Pacific Journal of Operational Research (APJOR), World Scientific Publishing Co. Pte. Ltd., vol. 36(04), pages 1-21, August.
    6. Xiaodan Xie & Felipe Aros‐Vera, 2022. "An interdependent network interdiction model for disrupting sex trafficking networks," Production and Operations Management, Production and Operations Management Society, vol. 31(6), pages 2695-2713, June.
    7. Xiang, Yin, 2023. "Minimizing the maximal reliable path with a nodal interdiction model considering resource sharing," Reliability Engineering and System Safety, Elsevier, vol. 239(C).
    8. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    9. Eric DuBois & Ashley Peper & Laura A. Albert, 2023. "Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach," Decision Analysis, INFORMS, vol. 20(3), pages 202-219, September.
    10. Tezcan, Barış & Maass, Kayse Lee, 2023. "Human trafficking interdiction with decision dependent success," Socio-Economic Planning Sciences, Elsevier, vol. 87(PA).

  26. Pala, Ali & Zhuang, Jun, 2018. "Security screening queues with impatient applicants: A new model with a case study," European Journal of Operational Research, Elsevier, vol. 265(3), pages 919-930.

    Cited by:

    1. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    2. Liu, Jian & Chen, Jian & Bo, Rui & Meng, Fanlin & Xu, Yong & Li, Peng, 2023. "Increases or discounts: Price strategies based on customers’ patience times," European Journal of Operational Research, Elsevier, vol. 305(2), pages 722-737.
    3. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    4. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

  27. Bairong Wang & Jun Zhuang, 2018. "Rumor response, debunking response, and decision makings of misinformed Twitter users during disasters," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 93(3), pages 1145-1162, September.

    Cited by:

    1. Gabrielle Turner-McGrievy & Amir Karami & Courtney Monroe & Heather M. Brandt, 2020. "Dietary pattern recognition on Twitter: a case example of before, during, and after four natural disasters," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 103(1), pages 1035-1049, August.
    2. Tiezhong Liu & Huyuan Zhang & Hubo Zhang, 2020. "The Impact of Social Media on Risk Communication of Disasters—A Comparative Study Based on Sina Weibo Blogs Related to Tianjin Explosion and Typhoon Pigeon," IJERPH, MDPI, vol. 17(3), pages 1-17, January.
    3. Mingyun Gu & Haixiang Guo & Jun Zhuang & Yufei Du & Lijin Qian, 2022. "Social Media User Behavior and Emotions during Crisis Events," IJERPH, MDPI, vol. 19(9), pages 1-21, April.
    4. Zhang, Yi & Xu, Jiuping & Nekovee, Maziar & Li, Zongmin, 2022. "The impact of official rumor-refutation information on the dynamics of rumor spread," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 607(C).
    5. Jamalzadeh, Saeed & Mettenbrink, Lily & Barker, Kash & González, Andrés D. & Radhakrishnan, Sridhar & Johansson, Jonas & Bessarabova, Elena, 2024. "Weaponized disinformation spread and its impact on multi-commodity critical infrastructure networks," Reliability Engineering and System Safety, Elsevier, vol. 243(C).
    6. Wu, Chunying & Xiong, Xiong & Gao, Ya & Zhang, Jin, 2022. "Does social media distort price discovery? Evidence from rumor clarifications," Research in International Business and Finance, Elsevier, vol. 62(C).
    7. Sungyoon Kim & Wanyun Shao & Jonghun Kam, 2019. "Spatiotemporal patterns of US drought awareness," Palgrave Communications, Palgrave Macmillan, vol. 5(1), pages 1-9, December.
    8. Zhijie Sasha Dong & Lingyu Meng & Lauren Christenson & Lawrence Fulton, 2021. "Social media information sharing for natural disaster response," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 107(3), pages 2077-2104, July.
    9. Agarwal, Puneet & Aziz, Ridwan Al & Zhuang, Jun, 2022. "Interplay of rumor propagation and clarification on social media during crisis events - A game-theoretic approach," European Journal of Operational Research, Elsevier, vol. 298(2), pages 714-733.
    10. Sabbaghtorkan, Monir & Batta, Rajan & He, Qing, 2020. "Prepositioning of assets and supplies in disaster operations management: Review and research gap identification," European Journal of Operational Research, Elsevier, vol. 284(1), pages 1-19.
    11. Kyle Hunt & Bairong Wang & Jun Zhuang, 2020. "Misinformation debunking and cross-platform information sharing through Twitter during Hurricanes Harvey and Irma: a case study on shelters and ID checks," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 103(1), pages 861-883, August.
    12. Zhang, Xi & Cheng, Yihang & Chen, Aoshuang & Lytras, Miltiadis & de Pablos, Patricia Ordóñez & Zhang, Renyu, 2022. "How rumors diffuse in the infodemic: Evidence from the healthy online social change in China," Technological Forecasting and Social Change, Elsevier, vol. 185(C).
    13. Shalini Upadhyay & Nitin Upadhyay, 2023. "Mapping crisis communication in the communication research: what we know and what we don’t know," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-19, December.
    14. Cui, Yapeng & Ni, Shunjiang & Shen, Shifei & Wang, Zhiru, 2020. "Modeling the dynamics of information dissemination under disaster," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 537(C).
    15. Kathrin Eismann, 2021. "Diffusion and persistence of false rumors in social media networks: implications of searchability on rumor self-correction on Twitter," Journal of Business Economics, Springer, vol. 91(9), pages 1299-1329, November.
    16. Ashley D. Ross & Laura Siebeneck & Hao-Che Wu & Sarah Kopczynski & Samir Nepal & Miranda Sauceda, 2024. "Seven Challenges for Risk Communication in Today’s Digital Era: The Emergency Manager’s Perspective," Sustainability, MDPI, vol. 16(24), pages 1-22, December.

  28. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.

    Cited by:

    1. Liu, Zhongyi & Liu, Jingchen & Zhai, Xin & Wang, Guanying, 2019. "Police staffing and workload assignment in law enforcement using multi-server queueing models," European Journal of Operational Research, Elsevier, vol. 276(2), pages 614-625.
    2. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    3. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    4. Xiang, Yin, 2023. "Minimizing the maximal reliable path with a nodal interdiction model considering resource sharing," Reliability Engineering and System Safety, Elsevier, vol. 239(C).
    5. Yael Deutsch & Boaz Golany, 2019. "Securing Gates of a Protected Area: A Hybrid Game and Queueing Theory Modeling Approach," Decision Analysis, INFORMS, vol. 16(1), pages 31-45, March.
    6. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

  29. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Christiansen, Jeffrey & Ernst, Andreas T. & Rieger, Janosch, 2024. "A robust optimization approach for a two-player force-design game," European Journal of Operational Research, Elsevier, vol. 318(2), pages 656-669.
    3. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    4. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    5. Hannah Lobban & Yasser Almoghathawi & Nazanin Tajik & Kash Barker, 2021. "Community vulnerability perspective on robust protection planning in interdependent infrastructure networks," Journal of Risk and Reliability, , vol. 235(5), pages 798-813, October.
    6. Li, Xiang & Qi, Xiangtong, 2021. "On pricing and quality decisions with risk aversion," Omega, Elsevier, vol. 98(C).
    7. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    8. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    9. Kjell Hausken, 2020. "Governmental combat of migration between competing terrorist organisations," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 30(3), pages 21-46.
    10. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    11. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    12. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    13. Talebiyan, Hesam & Dueñas-Osorio, Leonardo, 2023. "Auctions for resource allocation and decentralized restoration of interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 237(C).
    14. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    15. Wang, Shuliang & Sun, Jingya & Zhang, Jianhua & Dong, Qiqi & Gu, Xifeng & Chen, Chen, 2023. "Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes," International Journal of Critical Infrastructure Protection, Elsevier, vol. 40(C).
    16. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    17. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    18. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    19. Wang, Jian & Cui, Lei, 2023. "Patrolling games with coordination between monitoring devices and patrols," Reliability Engineering and System Safety, Elsevier, vol. 233(C).
    20. Li, Xingyu & Epureanu, Bogdan I., 2020. "AI-based competition of autonomous vehicle fleets with application to fleet modularity," European Journal of Operational Research, Elsevier, vol. 287(3), pages 856-874.
    21. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    22. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).

  30. Nageswara S. V. Rao & Chris Y. T. Ma & Fei He & David K. Y. Yau & Jun Zhuang, 2018. "Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures," Games, MDPI, vol. 9(3), pages 1-24, July.

    Cited by:

    1. Pramod C. Mane & Nagarajan Krishnamurthy & Kapil Ahuja, 2019. "Formation of Stable and Efficient Social Storage Cloud," Games, MDPI, vol. 10(4), pages 1-17, November.
    2. Fei He & Jun Zhuang & Nageswara S. V. Rao, 2020. "Discrete game-theoretic analysis of defense in correlated cyber-physical systems," Annals of Operations Research, Springer, vol. 294(1), pages 741-767, November.

  31. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.

    Cited by:

    1. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    2. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    3. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    4. Liu, Zhongyi & Liu, Jingchen & Zhai, Xin & Wang, Guanying, 2019. "Police staffing and workload assignment in law enforcement using multi-server queueing models," European Journal of Operational Research, Elsevier, vol. 276(2), pages 614-625.
    5. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    6. Yael Deutsch & Boaz Golany, 2019. "Securing Gates of a Protected Area: A Hybrid Game and Queueing Theory Modeling Approach," Decision Analysis, INFORMS, vol. 16(1), pages 31-45, March.
    7. Carr, Amelia & Biswas, Tania & Wheeler, Jane V., 2020. "Airport operations and security screening: An examination of social justice," Journal of Air Transport Management, Elsevier, vol. 85(C).

  32. Niyirora, Jerome & Zhuang, Jun, 2017. "Fluid approximations and control of queues in emergency departments," European Journal of Operational Research, Elsevier, vol. 261(3), pages 1110-1124.

    Cited by:

    1. Morgan, Lucy E. & Barton, Russell R., 2022. "Fourier trajectory analysis for system discrimination," European Journal of Operational Research, Elsevier, vol. 296(1), pages 203-217.
    2. Pei, Zhi & Dai, Xu & Yuan, Yilun & Du, Rui & Liu, Changchun, 2021. "Managing price and fleet size for courier service with shared drones," Omega, Elsevier, vol. 104(C).
    3. Abhishek Abhishek & Benjamin Legros & Jan Fransoo, 2021. "Performance Evaluation of Stochastic Systems with Dedicated Delivery Bays and General On-Street Parking," Post-Print hal-03605434, HAL.
    4. Jaime González & Juan-Carlos Ferrer & Alejandro Cataldo & Luis Rojas, 2019. "A proactive transfer policy for critical patient flow management," Health Care Management Science, Springer, vol. 22(2), pages 287-303, June.
    5. Legros, Benjamin, 2021. "Routing analyses for call centers with human and automated services," International Journal of Production Economics, Elsevier, vol. 240(C).
    6. Abhishek, & Legros, Benjamin & Fransoo, Jan C., 2021. "Performance evaluation of stochastic systems with dedicated delivery bays and general on-street parking," Other publications TiSEM 09ed9572-d59c-4f28-a9c4-b, Tilburg University, School of Economics and Management.
    7. Benjamin Legros, 2021. "Routing analyses for call centers with human and automated services," Post-Print hal-03605426, HAL.
    8. Cao, Ping & Zhong, Zhiheng, 2025. "Asymptotically optimal routing of a many-server parallel queueing system with long-run average criterion," European Journal of Operational Research, Elsevier, vol. 321(2), pages 462-475.
    9. A. Mustafin & A. Kantarbayeva, 2022. "Clearing function in the context of the invariant manifold method," Papers 2206.11205, arXiv.org.

  33. Zahiri, Behzad & Zhuang, Jun & Mohammadi, Mehrdad, 2017. "Toward an integrated sustainable-resilient supply chain: A pharmaceutical case study," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 103(C), pages 109-142.

    Cited by:

    1. Shamsi G., N. & Ali Torabi, S. & Shakouri G., H., 2018. "An option contract for vaccine procurement using the SIR epidemic model," European Journal of Operational Research, Elsevier, vol. 267(3), pages 1122-1140.
    2. Kochakkashani, Farid & Kayvanfar, Vahid & Haji, Alireza, 2023. "Supply chain planning of vaccine and pharmaceutical clusters under uncertainty: The case of COVID-19," Socio-Economic Planning Sciences, Elsevier, vol. 87(PB).
    3. Saberi, Sara, 2018. "Sustainable, multiperiod supply chain network model with freight carrier through reduction in pollution stock," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 118(C), pages 421-444.
    4. Mohammadi, Mehrdad & Jula, Payman & Tavakkoli-Moghaddam, Reza, 2019. "Reliable single-allocation hub location problem with disruptions," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 123(C), pages 90-120.
    5. Esteban Ogazón & Neale R. Smith & Angel Ruiz, 2024. "Assessing Different Two-Stage Stochastic Models for Optimizing Food Bank Networks’ Operations During Natural Disasters," Mathematics, MDPI, vol. 12(20), pages 1-24, October.
    6. Cheramin, Meysam & Saha, Apurba Kumar & Cheng, Jianqiang & Paul, Sanjoy Kumar & Jin, Hongyue, 2021. "Resilient NdFeB magnet recycling under the impacts of COVID-19 pandemic: Stochastic programming and Benders decomposition," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 155(C).
    7. Meisam Nasrollahi & Jafar Razmi, 2021. "A mathematical model for designing an integrated pharmaceutical supply chain with maximum expected coverage under uncertainty," Operational Research, Springer, vol. 21(1), pages 525-552, March.
    8. Chih-Hung Hsu & Ming-Ge Li & Ting-Yi Zhang & An-Yuan Chang & Shu-Zhen Shangguan & Wan-Ling Liu, 2022. "Deploying Big Data Enablers to Strengthen Supply Chain Resilience to Mitigate Sustainable Risks Based on Integrated HOQ-MCDM Framework," Mathematics, MDPI, vol. 10(8), pages 1-35, April.
    9. Mahmud, Priom & Ahmed, Mushaer & Janan, Farhatul & Xames, Md Doulotuzzaman & Chowdhury, Naimur Rahman, 2023. "Strategies to develop a sustainable and resilient vaccine supply chain in the context of a developing economy," Socio-Economic Planning Sciences, Elsevier, vol. 87(PB).
    10. Rajabzadeh, Hamed & Rabiee, Meysam & Sarkis, Joseph, 2024. "Sourcing from risky reverse channels: Insights on pricing and resilience strategies in sustainable supply chains," International Journal of Production Economics, Elsevier, vol. 276(C).
    11. Guo, Haidong & Wang, Shengyu & Zhang, Yu, 2021. "Supply interruption supply chain network model with uncertain demand: an application of chance-constrained programming with fuzzy parameters," LSE Research Online Documents on Economics 114936, London School of Economics and Political Science, LSE Library.
    12. Shiva Zandkarimkhani & Hassan Mina & Mehdi Biuki & Kannan Govindan, 2020. "A chance constrained fuzzy goal programming approach for perishable pharmaceutical supply chain network design," Annals of Operations Research, Springer, vol. 295(1), pages 425-452, December.
    13. Suhan Wu & Min Luo & Jingxia Zhang & Daoheng Zhang & Lianmin Zhang, 2022. "Pharmaceutical Supply Chain in China: Pricing and Production Decisions with Price-Sensitive and Uncertain Demand," Sustainability, MDPI, vol. 14(13), pages 1-28, June.
    14. Govindan, Kannan & Gholizadeh, Hadi, 2021. "Robust network design for sustainable-resilient reverse logistics network using big data: A case study of end-of-life vehicles," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 149(C).
    15. Ieva Meidute-Kavaliauskiene & Figen Yıldırım & Shahryar Ghorbani & Renata Činčikaitė, 2022. "The Design of a Multi-Period and Multi-Echelon Perishable Goods Supply Network under Uncertainty," Sustainability, MDPI, vol. 14(4), pages 1-18, February.
    16. Asrat Mekonnen Gobachew & Hans-Dietrich Haasis, 2023. "Scenario-Based Optimization of Supply Chain Performance under Demand Uncertainty," Sustainability, MDPI, vol. 15(13), pages 1-32, July.
    17. Batool Madani & Afef Saihi & Akmal Abdelfatah, 2024. "A Systematic Review of Sustainable Supply Chain Network Design: Optimization Approaches and Research Trends," Sustainability, MDPI, vol. 16(8), pages 1-33, April.
    18. Luis Francisco López-Castro & Elyn L. Solano-Charris, 2021. "Integrating Resilience and Sustainability Criteria in the Supply Chain Network Design. A Systematic Literature Review," Sustainability, MDPI, vol. 13(19), pages 1-26, September.
    19. Zeinab Sazvar & Mahsa Zokaee & Reza Tavakkoli-Moghaddam & Samira Al-sadat Salari & Sina Nayeri, 2022. "Designing a sustainable closed-loop pharmaceutical supply chain in a competitive market considering demand uncertainty, manufacturer’s brand and waste management," Annals of Operations Research, Springer, vol. 315(2), pages 2057-2088, August.
    20. Abdorrrahman Haeri & Seyyed-Mahdi Hosseini-Motlagh & Mohammad Reza Ghatreh Samani & Marziehsadat Rezaei, 2022. "An integrated socially responsible-efficient approach toward health service network design," Annals of Operations Research, Springer, vol. 319(1), pages 463-516, December.
    21. Ming Liu & Hao Tang & Yunfeng Wang & Ruixi Li & Yi Liu & Xin Liu & Yaqian Wang & Yiyang Wu & Yu Wu & Zhijun Sun, 2023. "Enhancing Food Supply Chain in Green Logistics with Multi-Level Processing Strategy under Disruptions," Sustainability, MDPI, vol. 15(2), pages 1-21, January.
    22. Fahimnia, Behnam & Jabbarzadeh, Armin & Sarkis, Joseph, 2018. "Greening versus resilience: A supply chain design perspective," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 119(C), pages 129-148.
    23. Kiyotoshi Kou & Yi Dou & Ichiro Arai, 2024. "Analysis of the Forces Driving Public Hospitals’ Operating Costs Using LMDI Decomposition: The Case of Japan," Sustainability, MDPI, vol. 16(2), pages 1-15, January.
    24. Maiyar, Lohithaksha M & Thakkar, Jitesh J, 2019. "Environmentally conscious logistics planning for food grain industry considering wastages employing multi objective hybrid particle swarm optimization," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 127(C), pages 220-248.
    25. Chávez, Marcela María Morales & Sarache, William & Costa, Yasel, 2018. "Towards a comprehensive model of a biofuel supply chain optimization from coffee crop residues," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 116(C), pages 136-162.
    26. Ata Allah Taleizadeh & Ali Ghavamifar & Amir Khosrojerdi, 2022. "Resilient network design of two supply chains under price competition: game theoretic and decomposition algorithm approach," Operational Research, Springer, vol. 22(1), pages 825-857, March.
    27. João Thiago de G. A. A. Campos & Renato de Castro Vivas & Adonias Magdiel Silva Ferreira & Francisco Gaudêncio Mendonça Freires, 2020. "Operational Decisions and Sustainability: A Brazilian Case of a Drugs Distribution Center," Sustainability, MDPI, vol. 12(21), pages 1-17, October.
    28. Olfati, Marjan & Paydar, Mohammad Mahdi, 2023. "Towards a responsive-sustainable-resilient tea supply chain network design under uncertainty using big data," Socio-Economic Planning Sciences, Elsevier, vol. 88(C).
    29. Lukas Messmann & Lars Wietschel & Andrea Thorenz & Axel Tuma, 2023. "Assessing the social dimension in strategic network optimization for a sustainable development: The case of bioethanol production in the EU," Journal of Industrial Ecology, Yale University, vol. 27(3), pages 760-776, June.
    30. Chaima Ben Abdallah & Adnen El-Amraoui & François Delmotte & Ahmed Frikha, 2024. "A Hybrid Approach for Sustainable and Resilient Farmer Selection in Food Industry: Tunisian Case Study," Sustainability, MDPI, vol. 16(5), pages 1-30, February.
    31. Jahani, Hamed & Abbasi, Babak & Sheu, Jiuh-Biing & Klibi, Walid, 2024. "Supply chain network design with financial considerations: A comprehensive review," European Journal of Operational Research, Elsevier, vol. 312(3), pages 799-839.
    32. Majid Heidari & Masoud Rabbani, 2023. "Leagile sustainable supply chain network design considering disruption risk by C-Var approach: a case study," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 14(3), pages 1062-1088, June.
    33. Diego Pereira Ribeiro & Ualison Rébula de Oliveira & Aldara da Silva César & Vicente Aprigliano Fernandes, 2021. "Evaluation of Medicine Reverse Logistics Practices in Hospitals," Sustainability, MDPI, vol. 13(6), pages 1-14, March.
    34. Gholami-Zanjani, Seyed Mohammad & Klibi, Walid & Jabalameli, Mohammad Saeed & Pishvaee, Mir Saman, 2021. "The design of resilient food supply chain networks prone to epidemic disruptions," International Journal of Production Economics, Elsevier, vol. 233(C).
    35. Marta Negri & Enrico Cagno & Claudia Colicchia & Joseph Sarkis, 2021. "Integrating sustainability and resilience in the supply chain: A systematic literature review and a research agenda," Business Strategy and the Environment, Wiley Blackwell, vol. 30(7), pages 2858-2886, November.
    36. Maureen S. Golan & Laura H. Jernegan & Igor Linkov, 2020. "Trends and applications of resilience analytics in supply chain modeling: systematic literature review in the context of the COVID-19 pandemic," Environment Systems and Decisions, Springer, vol. 40(2), pages 222-243, June.
    37. Sinha, Priyank & Kumar, Sameer & Chandra, Charu, 2023. "Strategies for ensuring required service level for COVID-19 herd immunity in Indian vaccine supply chain," European Journal of Operational Research, Elsevier, vol. 304(1), pages 339-352.
    38. Antonio Zavala-Alcívar & María-José Verdecho & Juan-José Alfaro-Saiz, 2020. "A Conceptual Framework to Manage Resilience and Increase Sustainability in the Supply Chain," Sustainability, MDPI, vol. 12(16), pages 1-38, August.
    39. Kusi-Sarpong, Simonov & Orji, Ifeyinwa Juliet & Gupta, Himanshu & Kunc, Martin, 2021. "Risks associated with the implementation of big data analytics in sustainable supply chains," Omega, Elsevier, vol. 105(C).
    40. Aldrighetti, Riccardo & Battini, Daria & Ivanov, Dmitry & Zennaro, Ilenia, 2021. "Costs of resilience and disruptions in supply chain network design models: A review and future research directions," International Journal of Production Economics, Elsevier, vol. 235(C).
    41. Esmizadeh, Yalda & Bashiri, Mahdi & Jahani, Hamed & Almada-Lobo, Bernardo, 2021. "Cold chain management in hierarchical operational hub networks," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 147(C).
    42. Lin Chen & Ting Dong & Jin Peng & Dan Ralescu, 2023. "Uncertainty Analysis and Optimization Modeling with Application to Supply Chain Management: A Systematic Review," Mathematics, MDPI, vol. 11(11), pages 1-45, May.
    43. Shoufeng Ji & Pengyun Zhao & Tingting Ji, 2023. "A Hybrid Optimization Method for Sustainable and Flexible Design of Supply–Production–Distribution Network in the Physical Internet," Sustainability, MDPI, vol. 15(7), pages 1-34, April.
    44. Chen, Xu & Li, Shanshan & Wang, Xiaojun, 2020. "Evaluating the effects of quality regulations on the pharmaceutical supply chain," International Journal of Production Economics, Elsevier, vol. 230(C).
    45. Habib, Muhammad Salman & Hwang, Seung-June, 2024. "Developing sustainable, resilient, and responsive biofuel production and distribution management system: A neutrosophic fuzzy optimization approach based on artificial intelligence and geographic info," Applied Energy, Elsevier, vol. 372(C).
    46. Nayeri, Sina & Sazvar, Zeinab & Heydari, Jafar, 2022. "A global-responsive supply chain considering sustainability and resiliency: Application in the medical devices industry," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    47. Karimi-Mamaghan, Maryam & Mohammadi, Mehrdad & Jula, Payman & Pirayesh, Amir & Ahmadi, Hadi, 2020. "A learning-based metaheuristic for a multi-objective agile inspection planning model under uncertainty," European Journal of Operational Research, Elsevier, vol. 285(2), pages 513-537.
    48. Ronaldo Brito da Silva & Claudia Aparecida de Mattos, 2019. "Critical Success Factors of a Drug Traceability System for Creating Value in a Pharmaceutical Supply Chain (PSC)," IJERPH, MDPI, vol. 16(11), pages 1-18, June.
    49. Clavijo-Buritica, Nicolás & Triana-Sanchez, Laura & Escobar, John Willmer, 2023. "A hybrid modeling approach for resilient agri-supply network design in emerging countries: Colombian coffee supply chain," Socio-Economic Planning Sciences, Elsevier, vol. 85(C).

  34. Li, Shuying & Zhuang, Jun & Shen, Shifei & Wang, Jia, 2017. "Driving-forces model on individual behavior in scenarios considering moving threat agents," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 481(C), pages 127-140.

    Cited by:

    1. Chen, Changkun & Sun, Huakai & Lei, Peng & Zhao, Dongyue & Shi, Congling, 2021. "An extended model for crowd evacuation considering pedestrian panic in artificial attack," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 571(C).
    2. Li, Lihua & Ding, Ning & Ma, Yaping & Zhang, Hui & Jin, Hua, 2020. "Social Relation Network and group behavior based on evacuation experiments," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 545(C).
    3. Wang, Jia & Ni, Shunjiang & Shen, Shifei & Li, Shuying, 2019. "Empirical study of crowd dynamic in public gathering places during a terrorist attack event," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 523(C), pages 1-9.
    4. Can Liao & Kejun Zhu & Haixiang Guo & Jian Tang, 2019. "Simulation Research on Safe Flow Rate of Bidirectional Crowds Using Bayesian-Nash Equilibrium," Complexity, Hindawi, vol. 2019, pages 1-15, January.
    5. Yu, Hang & Li, Xintong & Song, Weiguo & Zhang, Jun & Li, Xudong & Xu, Han & Jiang, Kechun, 2022. "Pedestrian emergency evacuation model based on risk field under attack event," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 606(C).

  35. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.

    Cited by:

    1. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    2. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    3. Li, Xiang & Qi, Xiangtong, 2021. "On pricing and quality decisions with risk aversion," Omega, Elsevier, vol. 98(C).
    4. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    5. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    6. Agarwal, Puneet & Aziz, Ridwan Al & Zhuang, Jun, 2022. "Interplay of rumor propagation and clarification on social media during crisis events - A game-theoretic approach," European Journal of Operational Research, Elsevier, vol. 298(2), pages 714-733.
    7. Amitai Gilad & Asher Tishler, 2024. "Measuring and Mitigating the Risk of Advanced Cyberattackers," Decision Analysis, INFORMS, vol. 21(4), pages 215-234, December.
    8. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    9. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    10. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    11. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    12. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).

  36. Bairong Wang & Jun Zhuang, 2017. "Crisis information distribution on Twitter: a content analysis of tweets during Hurricane Sandy," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(1), pages 161-181, October.

    Cited by:

    1. Bairong Wang & Jun Zhuang, 2018. "Rumor response, debunking response, and decision makings of misinformed Twitter users during disasters," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 93(3), pages 1145-1162, September.
    2. Jiang, Meiling & Gao, Qingwu & Zhuang, Jun, 2021. "Reciprocal spreading and debunking processes of online misinformation: A new rumor spreading–debunking model with a case study," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 565(C).
    3. Shan-e-hyder Soomro & Muhammad Waseem Boota & Xiaotao Shi & Gul-e-Zehra Soomro & Yinghai Li & Muhammad Tayyab & Caihong Hu & Chengshuai Liu & Yuanyang Wang & Junaid Abdul Wahid & Mairaj Hyder Alias Aa, 2024. "Appraisal of Urban Waterlogging and Extent Damage Situation after the Devastating Flood," Water Resources Management: An International Journal, Published for the European Water Resources Association (EWRA), Springer;European Water Resources Association (EWRA), vol. 38(12), pages 4911-4931, September.
    4. Gabrielle Turner-McGrievy & Amir Karami & Courtney Monroe & Heather M. Brandt, 2020. "Dietary pattern recognition on Twitter: a case example of before, during, and after four natural disasters," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 103(1), pages 1035-1049, August.
    5. Nicole Olynk Widmar & Kendra Rash & Courtney Bir & Benjamin Bir & Jinho Jung, 2022. "The anatomy of natural disasters on online media: hurricanes and wildfires," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 110(2), pages 961-998, January.
    6. Türkay Dereli & Nazmiye Eligüzel & Cihan Çetinkaya, 2021. "Content analyses of the international federation of red cross and red crescent societies (ifrc) based on machine learning techniques through twitter," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 106(3), pages 2025-2045, April.
    7. Mingyun Gu & Haixiang Guo & Jun Zhuang & Yufei Du & Lijin Qian, 2022. "Social Media User Behavior and Emotions during Crisis Events," IJERPH, MDPI, vol. 19(9), pages 1-21, April.
    8. Sarah Gardiner & Jinyan Chen & Margarida Abreu Novais & Karine Dupré & J. Guy Castley, 2023. "Analyzing and Leveraging Social Media Disaster Communication of Natural Hazards: Community Sentiment and Messaging Regarding the Australian 2019/20 Bushfires," Societies, MDPI, vol. 13(6), pages 1-20, May.
    9. Carine Dominguez-Péry & Rana Tassabehji & Lakshmi Narasimha Raju Vuddaraju & Vikhram Kofi Duffour, 2021. "Improving emergency response operations in maritime accidents using social media with big data analytics: a case study of the MV Wakashio disaster," Post-Print hal-04021179, HAL.
    10. Martínez-Rojas, María & Pardo-Ferreira, María del Carmen & Rubio-Romero, Juan Carlos, 2018. "Twitter as a tool for the management and analysis of emergency situations: A systematic literature review," International Journal of Information Management, Elsevier, vol. 43(C), pages 196-208.
    11. Wu, Chunying & Xiong, Xiong & Gao, Ya & Zhang, Jin, 2022. "Does social media distort price discovery? Evidence from rumor clarifications," Research in International Business and Finance, Elsevier, vol. 62(C).
    12. Sungyoon Kim & Wanyun Shao & Jonghun Kam, 2019. "Spatiotemporal patterns of US drought awareness," Palgrave Communications, Palgrave Macmillan, vol. 5(1), pages 1-9, December.
    13. Agarwal, Puneet & Aziz, Ridwan Al & Zhuang, Jun, 2022. "Interplay of rumor propagation and clarification on social media during crisis events - A game-theoretic approach," European Journal of Operational Research, Elsevier, vol. 298(2), pages 714-733.
    14. Yan Wang & John E. Taylor, 2018. "Coupling sentiment and human mobility in natural disasters: a Twitter-based study of the 2014 South Napa Earthquake," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 92(2), pages 907-925, June.
    15. Bairong Wang & Bin Liu & Qi Zhang, 2021. "An empirical study on Twitter’s use and crisis retweeting dynamics amid Covid-19," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 107(3), pages 2319-2336, July.
    16. Alekh Gour & Shikha Aggarwal & Subodha Kumar, 2022. "Lending ears to unheard voices: An empirical analysis of user‐generated content on social media," Production and Operations Management, Production and Operations Management Society, vol. 31(6), pages 2457-2476, June.
    17. Kyle Hunt & Bairong Wang & Jun Zhuang, 2020. "Misinformation debunking and cross-platform information sharing through Twitter during Hurricanes Harvey and Irma: a case study on shelters and ID checks," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 103(1), pages 861-883, August.
    18. Cole Vaughn & Kathleen Sherman-Morris & Philip Poe, 2023. "Factors influencing retweeting of local news media tweets during Hurricane Irma," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 119(1), pages 583-611, October.
    19. Seungil Yum, 2021. "The effects of Hurricane Dorian on spatial reactions and mobility," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 105(3), pages 2481-2497, February.
    20. Seungil Yum, 2023. "Analyses of human responses to Winter storm Kai using the GWR model," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 116(2), pages 1805-1821, March.
    21. Paul M. Johnson & Corey E. Brady & Craig Philip & Hiba Baroud & Janey V. Camp & Mark Abkowitz, 2020. "A Factor Analysis Approach Toward Reconciling Community Vulnerability and Resilience Indices for Natural Hazards," Risk Analysis, John Wiley & Sons, vol. 40(9), pages 1795-1810, September.

  37. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.

    Cited by:

    1. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    2. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    3. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    4. Liu, Zhongyi & Liu, Jingchen & Zhai, Xin & Wang, Guanying, 2019. "Police staffing and workload assignment in law enforcement using multi-server queueing models," European Journal of Operational Research, Elsevier, vol. 276(2), pages 614-625.
    5. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    6. Yael Deutsch & Boaz Golany, 2019. "Securing Gates of a Protected Area: A Hybrid Game and Queueing Theory Modeling Approach," Decision Analysis, INFORMS, vol. 16(1), pages 31-45, March.
    7. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    8. Carr, Amelia & Biswas, Tania & Wheeler, Jane V., 2020. "Airport operations and security screening: An examination of social justice," Journal of Air Transport Management, Elsevier, vol. 85(C).
    9. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).

  38. Daniel Seaberg & Laura Devine & Jun Zhuang, 2017. "A review of game theory applications in natural disaster management research," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(3), pages 1461-1483, December.

    Cited by:

    1. Jun Su & Yilin Chen & Dongyu Zhang, 2024. "Game Model of Stable Cooperation During Resource Distribution in Self-Organized Emergency Management System," Group Decision and Negotiation, Springer, vol. 33(6), pages 1325-1353, December.
    2. Adhami, Maryam & Sadeghi, Seyed Hamidreza & Sheikhmohammady, Majid, 2018. "Making competent land use policy using a co-management framework," Land Use Policy, Elsevier, vol. 72(C), pages 171-180.
    3. Álvarez, Xana & Gómez-Rúa, María & Vidal-Puga, Juan, 2019. "Risk prevention of land flood: A cooperative game theory approach," MPRA Paper 91515, University Library of Munich, Germany.
    4. Jimei Yang & Hanping Hou & Hanqing Hu, 2024. "Exploring the Intelligent Emergency Management Mode of Rural Natural Disasters in the Era of Digital Technology," Sustainability, MDPI, vol. 16(6), pages 1-21, March.
    5. Ali Nasiri Khiavi & Seyed Hamidreza Sadeghi & Mehdi Vafakhah, 2024. "Comparative Prioritization of Sub-Watersheds in Flood Generation Using Co-Management Best-Worst Method and Game Theory Algorithm," Water Resources Management: An International Journal, Published for the European Water Resources Association (EWRA), Springer;European Water Resources Association (EWRA), vol. 38(12), pages 4431-4453, September.
    6. Yue Dou & Muhammad Shahbaz & Kangyin Dong & Xiucheng Dong, 2022. "How natural disasters affect carbon emissions: the global case," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 113(3), pages 1875-1901, September.
    7. Nagurney, Anna & Salarpour, Mojtaba & Daniele, Patrizia, 2019. "An integrated financial and logistical game theory model for humanitarian organizations with purchasing costs, multiple freight service providers, and budget, capacity, and demand constraints," International Journal of Production Economics, Elsevier, vol. 212(C), pages 212-226.
    8. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    9. Abdolmajid Yolmeh & Melike Baykal-Gürsoy & Vicki Bier, 2023. "A decomposable resource allocation model with generalized overarching protections," Annals of Operations Research, Springer, vol. 320(1), pages 493-507, January.
    10. Shandong Mou & Kexin Zhong & Yamin Ma, 2023. "Regulating the Big Data-Based Discriminatory Pricing in Platform Retailing: A Tripartite Evolutionary Game Theory Analysis," Mathematics, MDPI, vol. 11(11), pages 1-21, June.
    11. Chun-Min Zhang, 2020. "Seismic risk-coping behavior in rural ethnic minority communities in Dali, China," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 103(3), pages 3499-3522, September.
    12. Hunt, Kyle & Narayanan, Adithya & Zhuang, Jun, 2022. "Blockchain in humanitarian operations management: A review of research and practice," Socio-Economic Planning Sciences, Elsevier, vol. 80(C).
    13. Lydia Novoszel & Tina Wakolbinger, 2022. "Meta-analysis of Supply Chain Disruption Research," SN Operations Research Forum, Springer, vol. 3(1), pages 1-25, March.
    14. Shaoqing Geng & Yu Gong & Hanping Hou & Jianliang Yang & Bhakti Stephan Onggo, 2024. "Resource management in disaster relief: a bibliometric and content-analysis-based literature review," Annals of Operations Research, Springer, vol. 343(1), pages 263-292, December.
    15. Anna Nagurney & Mojtaba Salarpour & June Dong & Ladimer S. Nagurney, 2020. "A Stochastic Disaster Relief Game Theory Network Model," SN Operations Research Forum, Springer, vol. 1(2), pages 1-33, June.
    16. Oscar Rodríguez-Espíndola, 2023. "Two-stage stochastic formulation for relief operations with multiple agencies in simultaneous disasters," OR Spectrum: Quantitative Approaches in Management, Springer;Gesellschaft für Operations Research e.V., vol. 45(2), pages 477-523, June.
    17. Ali Nasiri Khiavi & Mehdi Vafakhah & Seyed Hamidreza Sadeghi, 2022. "Comparative prioritization of sub-watersheds based on Flood Generation potential using physical, hydrological and co-managerial approaches," Water Resources Management: An International Journal, Published for the European Water Resources Association (EWRA), Springer;European Water Resources Association (EWRA), vol. 36(6), pages 1897-1917, April.
    18. Amanda Melendez & David Caballero-Russi & Mariantonieta Gutierrez Soto & Luis Felipe Giraldo, 2022. "Computational models of community resilience," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 111(2), pages 1121-1152, March.
    19. Vicki M. Bier & Yuqun Zhou & Hongru Du, 2020. "Game-theoretic modeling of pre-disaster relocation," The Engineering Economist, Taylor & Francis Journals, vol. 65(2), pages 89-113, April.

  39. Gary A. Ackerman & Jun Zhuang & Sitara Weerasuriya, 2017. "Cross‐Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 342-371, February.

    Cited by:

    1. Aditya Bhan & Tarun Kabiraj, 2020. "Terrorist Inter-Group Cooperation and Terror Activity," Group Decision and Negotiation, Springer, vol. 29(6), pages 1085-1106, December.
    2. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    3. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.

  40. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Dennis Fok & André Stel & Andrew Burke & Roy Thurik, 2019. "How entry crowds and grows markets: the gradual disaster management view of market dynamics in the retail industry," Annals of Operations Research, Springer, vol. 283(1), pages 1111-1138, December.
    3. Kyle H. Goldschmidt & Sameer Kumar, 2019. "Reducing the cost of humanitarian operations through disaster preparation and preparedness," Annals of Operations Research, Springer, vol. 283(1), pages 1139-1152, December.
    4. Shitao Gong & Xin Gao & Zhou Li & Linyan Chen, 2021. "Developing a Dynamic Supervision Mechanism to Improve Construction Safety Investment Supervision Efficiency in China: Theoretical Simulation of Evolutionary Game Process," IJERPH, MDPI, vol. 18(7), pages 1-29, March.
    5. Zongjie Pi & Xin Gao & Linyan Chen & Jinghua Liu, 2019. "The New Path to Improve Construction Safety Performance in China: An Evolutionary Game Theoretic Approach," IJERPH, MDPI, vol. 16(13), pages 1-24, July.
    6. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    7. Wenxin Su & Xin Gao & Yukun Jiang & Jinrong Li, 2021. "Developing a Construction Safety Standard System to Enhance Safety Supervision Efficiency in China: A Theoretical Simulation of the Evolutionary Game Process," Sustainability, MDPI, vol. 13(23), pages 1-22, December.
    8. Liangdong Lu & Hong Huang & Jiuchang Wei & Jia Xu, 2020. "Safety Regulations and the Uncertainty of Work‐Related Road Accident Loss: The Triple Identity of Chinese Local Governments Under Principal–Agent Framework," Risk Analysis, John Wiley & Sons, vol. 40(6), pages 1168-1182, June.
    9. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    10. Wen Li & Tong Zhou & Qiang Mei & Xiangyang Liu & Muhammad Imran, 2023. "Evolution of micro and small enterprises’ work safety behavior in high-risk industries," Small Business Economics, Springer, vol. 60(1), pages 85-104, January.
    11. John B. Coles & Jing Zhang & Jun Zhuang, 2022. "Bridging the research-practice gap in disaster relief: using the IFRC Code of Conduct to develop an aid model," Annals of Operations Research, Springer, vol. 312(2), pages 1337-1357, May.
    12. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Niki Matinrad, 2016. "Disaster Management from a POM Perspective: Mapping a New Domain," Production and Operations Management, Production and Operations Management Society, vol. 25(10), pages 1611-1637, October.
    13. Bo Shao & Zhigen Hu & Dawei Liu, 2019. "Using Improved Principal Component Analysis to Explore Construction Accident Situations from the Multi-Dimensional Perspective: A Chinese Study," IJERPH, MDPI, vol. 16(18), pages 1-18, September.
    14. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    15. Vicki M. Bier & Yuqun Zhou & Hongru Du, 2020. "Game-theoretic modeling of pre-disaster relocation," The Engineering Economist, Taylor & Francis Journals, vol. 65(2), pages 89-113, April.
    16. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

  41. Ning, Manxiu & Gong, Jinquan & Zheng, Xuhui & Zhuang, Jun, 2016. "Does New Rural Pension Scheme decrease elderly labor supply? Evidence from CHARLS," China Economic Review, Elsevier, vol. 41(C), pages 315-330.

    Cited by:

    1. Liu, Ziming & Li, Jia & Rommel, Jens & Feng, Shuyi, 2020. "Health impacts of cooking fuel choice in rural China," Energy Economics, Elsevier, vol. 89(C).
    2. Lin, Yujie, 2018. "The Impact of China's New Rural Pension Scheme on Family Labor Supply: Does the Beneficiary's Gender Matter?," 2018 Annual Meeting, August 5-7, Washington, D.C. 274181, Agricultural and Applied Economics Association.
    3. Myerson, Rebecca & Lu, Tianyi & Yuan, Yong & Liu, Gordon, 2020. "The impact of government income transfers on tobacco and alcohol use: Evidence from China," Economics Letters, Elsevier, vol. 186(C).
    4. Zhu, Alex Yue Feng & Ku, Inhoe & Chan, Wai Sum & Chou, Kee Lee, 2023. "Social pension reform and poverty among older people in Hong Kong: Triple difference estimations," Journal of Behavioral and Experimental Economics (formerly The Journal of Socio-Economics), Elsevier, vol. 105(C).
    5. Limin Wen & Shufang Sun, 2023. "Can China's new rural pension scheme alleviate the relative poverty of rural households? An empirical analysis based on the PSM‐DID method," Australian Economic Papers, Wiley Blackwell, vol. 62(3), pages 396-429, September.
    6. Chen, Xi & Eggleston, Karen & Sun, Ang, 2017. "The Impact of Social Pensions on Intergenerational Relationships: Comparative Evidence from China," IZA Discussion Papers 10731, Institute of Labor Economics (IZA).
    7. Lingguo Cheng & Hong Liu & Ye Zhang & Zhong Zhao, 2018. "The heterogeneous impact of pension income on elderly living arrangements: evidence from China’s new rural pension scheme," Journal of Population Economics, Springer;European Society for Population Economics, vol. 31(1), pages 155-192, January.
    8. Juan Carlos Caro & Marcela Parada‐Contzen, 2022. "Pension Incentives and Retirement Planning in Rural China: Evidence for the New Rural Pension Scheme," The Developing Economies, Institute of Developing Economies, vol. 60(1), pages 3-29, March.
    9. Victor Lyashok, 2019. "The Effect Of Pension Growth On The Labor Force Participation Of Pensioners In Russia," HSE Working papers WP BRP 22/PSP/2019, National Research University Higher School of Economics.
    10. Benxi Lin & Zongjian Lin & Yu Yvette Zhang & Weiping Liu, 2018. "The Impact of the New Rural Pension Scheme on Retirement Sustainability in China: Evidence of Regional Differences in Formal and Informal Labor Supply," Sustainability, MDPI, vol. 10(12), pages 1-7, November.
    11. Ren, Yanjun & Liu, Weigang & Huo, Xuexi & Glauben, Thomas, 2023. "The impact of old‐age pension on nutritional outcomes: Evidence from Kyrgyzstan," EconStor Open Access Articles and Book Chapters, ZBW - Leibniz Information Centre for Economics, vol. 39(S1), pages 1358-1381.
    12. Zhaohua Zhang & Yuxi Luo & Derrick Robinson, 2018. "Reducing Food Poverty and Vulnerability among the Rural Elderly with Chronic Diseases: The Role of the New Rural Pension Scheme in China," IJERPH, MDPI, vol. 15(6), pages 1-20, June.
    13. Seungho LeeMA & Inhoe KuPhD & Byongdon ShonPhD, 2019. "The Effects of Old-Age Public Transfer on the Well-Being of Older Adults: The Case of Social Pension in South Korea," The Journals of Gerontology: Series B, The Gerontological Society of America, vol. 74(3), pages 506-515.
    14. Zhaohua Zhang & Yuxi Luo & Derrick Robinson, 2019. "Who Are the Beneficiaries of China’s New Rural Pension Scheme? Sons, Daughters, or Parents?," IJERPH, MDPI, vol. 16(17), pages 1-16, August.
    15. Xing Ji & Jingwen Xu & Hongxiao Zhang, 2022. "How Does China’s New Rural Pension Scheme Affect Agricultural Production?," Agriculture, MDPI, vol. 12(8), pages 1-23, July.
    16. Zhaohua Zhang & Yuxi Luo & Derrick Robinson, 2020. "Do Social Pensions Help People Living on the Edge? Assessing Determinants of Vulnerability to Food Poverty Among the Rural Elderly," The European Journal of Development Research, Palgrave Macmillan;European Association of Development Research and Training Institutes (EADI), vol. 32(1), pages 198-219, January.
    17. Fang Wang & Haitao Zheng, 2021. "Do Public Pensions Improve Mental Wellbeing? Evidence from the New Rural Society Pension Insurance Program," IJERPH, MDPI, vol. 18(5), pages 1-14, March.
    18. Unnikrishnan, Vidhya & Imai, Katsushi S., 2020. "Does the old-age pension scheme improve household welfare? Evidence from India," World Development, Elsevier, vol. 134(C).
    19. Li, Jingrong & Mi, Xinyu & Zhang, Chenlei & Qin, Yanran, 2024. "Social pension insurance and household risky asset investment: Evidence from China," The Quarterly Review of Economics and Finance, Elsevier, vol. 95(C), pages 219-233.
    20. Yang, Jinyang & Chen, Xi, 2024. "Grandfathers and Grandsons: Social Security Expansion and Child Health in China," GLO Discussion Paper Series 1503, Global Labor Organization (GLO).
    21. Li, Zhigang & Wu, Mingqin, 2018. "Education and welfare program compliance: Firm-level evidence from a pension reform in China," China Economic Review, Elsevier, vol. 48(C), pages 1-13.
    22. Peng Nie & Yan Li & Lanlin Ding & Alfonso Sousa-Poza, 2021. "Housing Poverty and Healthy Aging in China: Evidence from the China Health and Retirement Longitudinal Study," IJERPH, MDPI, vol. 18(18), pages 1-20, September.
    23. Shu Wu, 2021. "The Health Impact of Household Cooking Fuel Choice on Women: Evidence from China," Sustainability, MDPI, vol. 13(21), pages 1-18, November.
    24. Li, Jianglong & Gao, Jinfeng & Liu, Hongxun, 2024. "Reducing energy poverty by nearly universal pension coverage of rural China," World Development, Elsevier, vol. 176(C).
    25. Xiaodong Zheng & Shuangyue Shangguan & Zheng Shen & Hualei Yang, 2023. "Social Pensions and Children’s Educational Outcomes: The Case of New Rural Pension Scheme in China," Journal of Family and Economic Issues, Springer, vol. 44(2), pages 502-521, June.
    26. Xin Gao & Tieying Feng, 2020. "Public Pension, Labor Force Participation, and Depressive Symptoms across Gender among Older Adults in Rural China: A Moderated Mediation Analysis," IJERPH, MDPI, vol. 17(9), pages 1-13, May.
    27. Yunke Deng & Haixin Tao & Bolun Yao & Xuezhu Shi, 2025. "The Impact of Digital Infrastructure on Rural Household Financial Vulnerability: A Quasi-Natural Experiment from the Broadband China Strategy," Sustainability, MDPI, vol. 17(5), pages 1-25, February.
    28. Qiaolong Huang & Yu Yvette Zhang & Qin Chen & Manxiu Ning, 2021. "Does Air Pollution Decrease Labor Supply of the Rural Middle-Aged and Elderly?," Sustainability, MDPI, vol. 13(5), pages 1-17, March.

  42. Zhujie Chu & Wenna Wang & Bairong Wang & Jun Zhuang, 2016. "Research on Factors Influencing Municipal Household Solid Waste Separate Collection: Bayesian Belief Networks," Sustainability, MDPI, vol. 8(2), pages 1-14, February.

    Cited by:

    1. Hongyun Han & Zhijian Zhang & Sheng Xia, 2016. "The Crowding-Out Effects of Garbage Fees and Voluntary Source Separation Programs on Waste Reduction: Evidence from China," Sustainability, MDPI, vol. 8(7), pages 1-17, July.
    2. Fu Chen & Xiaoxiao Li & Jing Ma & Yongjun Yang & Gang-Jun Liu, 2018. "An Exploration of the Impacts of Compulsory Source-Separated Policy in Improving Household Solid Waste-Sorting in Pilot Megacities, China: A Case Study of Nanjing," Sustainability, MDPI, vol. 10(5), pages 1-14, April.
    3. Xueliang Yuan & Xiaohan Fan & Jiaxin Liang & Mengyue Liu & Yuqiang Teng & Qiao Ma & Qingsong Wang & Ruimin Mu & Jian Zuo, 2019. "Public Perception towards Waste-to-Energy as a Waste Management Strategy: A Case from Shandong, China," IJERPH, MDPI, vol. 16(16), pages 1-15, August.
    4. Navarro Ferronato & Carolina D’Avino & Marco Ragazzi & Vincenzo Torretta & Giovanni De Feo, 2017. "Social Surveys about Solid Waste Management within Higher Education Institutes: A Comparison," Sustainability, MDPI, vol. 9(3), pages 1-17, March.
    5. Rongchen Zhu & Xin Li & Xiaofeng Hu & Deshui Hu, 2019. "Risk Analysis of Chemical Plant Explosion Accidents Based on Bayesian Network," Sustainability, MDPI, vol. 12(1), pages 1-20, December.
    6. Eglė Baltranaitė & Loreta Kelpšaitė-Rimkienė & Ramūnas Povilanskas & Ilona Šakurova & Vitalijus Kondrat, 2021. "Measuring the Impact of Physical Geographical Factors on the Use of Coastal Zones Based on Bayesian Networks," Sustainability, MDPI, vol. 13(13), pages 1-18, June.

  43. Sabbaghi, Mostafa & Behdad, Sara & Zhuang, Jun, 2016. "Managing consumer behavior toward on-time return of the waste electrical and electronic equipment: A game theoretic approach," International Journal of Production Economics, Elsevier, vol. 182(C), pages 545-563.

    Cited by:

    1. Xiuqi Jiang & Yini Zheng, 2023. "Pricing decisions and remanufacturing strategies considering consumer recycling behavior," Annals of Operations Research, Springer, vol. 322(2), pages 755-792, March.
    2. Oh, Yosep & Behdad, Sara, 2017. "Simultaneous reassembly and procurement planning in assemble-to-order remanufacturing systems," International Journal of Production Economics, Elsevier, vol. 184(C), pages 168-178.
    3. Ehsan Shekarian & Simme Douwe Flapper, 2021. "Analyzing the Structure of Closed-Loop Supply Chains: A Game Theory Perspective," Sustainability, MDPI, vol. 13(3), pages 1-32, January.
    4. Zajko Katja & Bradač Hojnik Barbara, 2019. "Demand and Characteristics of Customers of Reusable Products in Slovenia," Naše gospodarstvo/Our economy, Sciendo, vol. 65(3), pages 63-72, September.
    5. Md Shah Newaz & Andrea Appolloni, 2024. "Evolution of behavioral research on E‐waste management: Conceptual frameworks and future research directions," Business Strategy and the Environment, Wiley Blackwell, vol. 33(2), pages 477-503, February.
    6. Uşar, Damla Durak & Denizel, Meltem & Soytaş, Mehmet Ali, 2019. "Corporate sustainability interactions: A game theoretical approach to sustainability actions," International Journal of Production Economics, Elsevier, vol. 218(C), pages 196-211.
    7. Karina Cecilia Arredondo-Soto & Alejandro Jiménez-Zaragoza & Marco Augusto Miranda-Ackerman & Julio Blanco-Fernández & Alejandra García-Lechuga & Guadalupe Hernández-Escobedo & Jorge Luis García-Alcar, 2022. "Design and Repair Strategies Based on Product–Service System and Remanufacturing for Value Preservation," Sustainability, MDPI, vol. 14(14), pages 1-19, July.
    8. Taghikhah, Firouzeh & Voinov, Alexey & Shukla, Nagesh & Filatova, Tatiana & Anufriev, Mikhail, 2021. "Integrated modeling of extended agro-food supply chains: A systems approach," European Journal of Operational Research, Elsevier, vol. 288(3), pages 852-868.
    9. Paul Taboada-González & Quetzalli Aguilar-Virgen & Liliana Márquez-Benavides, 2017. "Recyclables Valorisation as the Best Strategy for Achieving Landfill CO 2 e Emissions Abatement from Domestic Waste: Game Theory," Sustainability, MDPI, vol. 9(7), pages 1-10, July.
    10. Filippo Corsini & Natalia Marzia Gusmerotti & Marco Frey, 2020. "Consumer’s Circular Behaviors in Relation to the Purchase, Extension of Life, and End of Life Management of Electrical and Electronic Products: A Review," Sustainability, MDPI, vol. 12(24), pages 1-16, December.
    11. Fontecha, John E. & Nikolaev, Alexander & Walteros, Jose L. & Zhu, Zhenduo, 2022. "Scientists wanted? A literature review on incentive programs that promote pro-environmental consumer behavior: Energy, waste, and water," Socio-Economic Planning Sciences, Elsevier, vol. 82(PA).
    12. Nughthoh Arfawi Kurdhi & Shaunak S. Dabadghao & Jan C. Fransoo, 2024. "Should I endorse a third party? Authorization strategies for brand manufacturers in a refurbishing market," Flexible Services and Manufacturing Journal, Springer, vol. 36(4), pages 1253-1291, December.
    13. Patricia Guarnieri & Lucio Camara e Silva & Bárbara de Oliveira Vieira, 2020. "How to Assess Reverse Logistics of e-Waste Considering a Multicriteria Perspective? A Model Proposition," Logistics, MDPI, vol. 4(4), pages 1-31, October.
    14. Fernando Tobal Berssaneti & Simone Berger & Ana Maria Saut & Rosangela Maria Vanalle & José Carlos Curvelo Santana, 2019. "Value Generation of Remanufactured Products: Multi-Case Study of Third-Party Companies," Sustainability, MDPI, vol. 11(3), pages 1-21, January.

  44. Yisha Xiang & Jun Zhuang, 2016. "A medical resource allocation model for serving emergency victims with deteriorating health conditions," Annals of Operations Research, Springer, vol. 236(1), pages 177-196, January.

    Cited by:

    1. Niyirora, Jerome & Zhuang, Jun, 2017. "Fluid approximations and control of queues in emergency departments," European Journal of Operational Research, Elsevier, vol. 261(3), pages 1110-1124.
    2. Santini, Alberto, 2021. "Optimising the assignment of swabs and reagent for PCR testing during a viral epidemic," Omega, Elsevier, vol. 102(C).
    3. Shuihua Han & Hu Huang & Zongwei Luo & Cyril Foropon, 2019. "Harnessing the power of crowdsourcing and Internet of Things in disaster response," Annals of Operations Research, Springer, vol. 283(1), pages 1175-1190, December.
    4. Emre Çankaya & Ali Ekici & Okan Örsan Özener, 2019. "Humanitarian relief supplies distribution: an application of inventory routing problem," Annals of Operations Research, Springer, vol. 283(1), pages 119-141, December.
    5. Sanjay Mehrotra & Hamed Rahimian & Masoud Barah & Fengqiao Luo & Karolina Schantz, 2020. "A model of supply‐chain decisions for resource sharing with an application to ventilator allocation to combat COVID‐19," Naval Research Logistics (NRL), John Wiley & Sons, vol. 67(5), pages 303-320, August.
    6. Soheyl Khalilpourazari & Alireza Arshadi Khamseh, 2019. "Bi-objective emergency blood supply chain network design in earthquake considering earthquake magnitude: a comprehensive study with real world application," Annals of Operations Research, Springer, vol. 283(1), pages 355-393, December.
    7. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    8. Emmett J. Lodree & Nezih Altay & Robert A. Cook, 2019. "Staff assignment policies for a mass casualty event queuing network," Annals of Operations Research, Springer, vol. 283(1), pages 411-442, December.
    9. John B. Coles & Jing Zhang & Jun Zhuang, 2022. "Bridging the research-practice gap in disaster relief: using the IFRC Code of Conduct to develop an aid model," Annals of Operations Research, Springer, vol. 312(2), pages 1337-1357, May.
    10. Tao Ning & Xiaodong Duan & Lu An, 2021. "Study on the strategy of multimodal transportation of medical aid materials for public health emergencies: a case study basing on COVID-19 [Modeling carbon emission intensity: application of artifi," International Journal of Low-Carbon Technologies, Oxford University Press, vol. 16(4), pages 1244-1253.
    11. Zhong-Ping Li & Jian-Jun Wang & Ai-Chih Chang & Jim Shi, 2021. "Capacity reallocation via sinking high-quality resource in a hierarchical healthcare system," Annals of Operations Research, Springer, vol. 300(1), pages 97-135, May.
    12. Steven Yin & Shatian Wang & Lingyi Zhang & Christian Kroer, 2020. "Dominant Resource Fairness with Meta-Types," Papers 2007.11961, arXiv.org, revised Aug 2021.
    13. Ghazaleh Ahmadi & Reza Tavakkoli-Moghaddam & Armand Baboli & Mehdi Najafi, 2022. "A decision support model for robust allocation and routing of search and rescue resources after earthquake: a case study," Operational Research, Springer, vol. 22(2), pages 1039-1081, April.
    14. Sachin Modgil & Rohit Kumar Singh & Cyril Foropon, 2022. "Quality management in humanitarian operations and disaster relief management: a review and future research directions," Annals of Operations Research, Springer, vol. 319(1), pages 1045-1098, December.
    15. Tippong, Danuphon & Petrovic, Sanja & Akbari, Vahid, 2022. "A review of applications of operational research in healthcare coordination in disaster management," European Journal of Operational Research, Elsevier, vol. 301(1), pages 1-17.
    16. Shuwan Zhu & Wenjuan Fan & Shanlin Yang & Panos M. Pardalos, 2023. "Scheduling operating rooms of multiple hospitals considering transportation and deterioration in mass-casualty incidents," Annals of Operations Research, Springer, vol. 321(1), pages 717-753, February.
    17. Hanif Malekpoor & Konstantinos Chalvatzis & Nishikant Mishra & Amar Ramudhin, 2019. "A hybrid approach of VIKOR and bi-objective integer linear programming for electrification planning in a disaster relief camp," Annals of Operations Research, Springer, vol. 283(1), pages 443-469, December.
    18. Azrah A. Anparasan & Miguel A. Lejeune, 2018. "Data laboratory for supply chain response models during epidemic outbreaks," Annals of Operations Research, Springer, vol. 270(1), pages 53-64, November.
    19. Katherine A. Daniell & Alec Morton & David Ríos Insua, 2016. "Policy analysis and policy analytics," Annals of Operations Research, Springer, vol. 236(1), pages 1-13, January.
    20. Yang Cao & Feng Zhen & Hao Wu, 2019. "Public Transportation Environment and Medical Choice for Chronic Disease: A Case Study of Gaoyou, China," IJERPH, MDPI, vol. 16(9), pages 1-21, May.

  45. He, Fei & Zhuang, Jun, 2016. "Balancing pre-disaster preparedness and post-disaster relief," European Journal of Operational Research, Elsevier, vol. 252(1), pages 246-256.

    Cited by:

    1. Zhiying Wang & Xiaodi Liu & Shitao Zhang, 2019. "A New Decision Method for Public Opinion Crisis with the Intervention of Risk Perception of the Public," Complexity, Hindawi, vol. 2019, pages 1-14, July.
    2. Jamal Al Qundus & Kosai Dabbour & Shivam Gupta & Régis Meissonier & Adrian Paschke, 2022. "Wireless sensor network for AI-based flood disaster detection," Annals of Operations Research, Springer, vol. 319(1), pages 697-719, December.
    3. Homa Bahmani & Wei Zhang, 2022. "A conceptual framework for integrated management of disasters recovery projects," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 113(2), pages 859-885, September.
    4. Noham, Reut & Tzur, Michal, 2018. "Designing humanitarian supply chains by incorporating actual post-disaster decisions," European Journal of Operational Research, Elsevier, vol. 265(3), pages 1064-1077.
    5. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.
    6. Sperling, Martina & Schryen, Guido, 2022. "Decision support for disaster relief: Coordinating spontaneous volunteers," European Journal of Operational Research, Elsevier, vol. 299(2), pages 690-705.
    7. Konstantinos Nikolopoulos & Fotios Petropoulos & Vasco Sanchez Rodrigues & Stephen Pettit & Anthony Beresford, 2019. "A risk-mitigation model driven from the level of forecastability of Black Swans: prepare and respond to major Earthquakes through a dynamic Temporal and Spatial Aggregation forecasting framework," Working Papers 19017, Bangor Business School, Prifysgol Bangor University (Cymru / Wales).
    8. Yumashev, Dmitry & Johnson, Paul, 2017. "Flexible decision making in the wake of large scale nuclear emergencies: Long-term response," European Journal of Operational Research, Elsevier, vol. 261(1), pages 368-389.
    9. Mishra, Dillip Kumar & Ghadi, Mojtaba Jabbari & Azizivahed, Ali & Li, Li & Zhang, Jiangfeng, 2021. "A review on resilience studies in active distribution systems," Renewable and Sustainable Energy Reviews, Elsevier, vol. 135(C).
    10. Malin Song & Qianqian Du, 2019. "Analysis and exploration of damage-reduction measures for flood disasters in China," Annals of Operations Research, Springer, vol. 283(1), pages 795-810, December.
    11. Maass, Kayse Lee & Trapp, Andrew C. & Konrad, Renata, 2020. "Optimizing placement of residential shelters for human trafficking survivors," Socio-Economic Planning Sciences, Elsevier, vol. 70(C).
    12. Fang, Yi-Ping & Zio, Enrico, 2019. "An adaptive robust framework for the optimization of the resilience of interdependent infrastructures under natural hazards," European Journal of Operational Research, Elsevier, vol. 276(3), pages 1119-1136.
    13. Feng Li & Qingyuan Zhu & Jun Zhuang, 2018. "Analysis of fire protection efficiency in the United States: a two-stage DEA-based approach," OR Spectrum: Quantitative Approaches in Management, Springer;Gesellschaft für Operations Research e.V., vol. 40(1), pages 23-68, January.
    14. V. G. Venkatesh & Abraham Zhang & Eric Deakins & Sunil Luthra & S. Mangla, 2019. "A fuzzy AHP-TOPSIS approach to supply partner selection in continuous aid humanitarian supply chains," Annals of Operations Research, Springer, vol. 283(1), pages 1517-1550, December.
    15. Homa Bahmani & Wei Zhang, 2021. "Application of System Thinking and Factors Interrelationship Analysis to Identify Primary Success Factors of Post-Natural Disaster Recovery Projects," Sustainability, MDPI, vol. 13(6), pages 1-24, March.
    16. Anna Nagurney & Mojtaba Salarpour & June Dong & Ladimer S. Nagurney, 2020. "A Stochastic Disaster Relief Game Theory Network Model," SN Operations Research Forum, Springer, vol. 1(2), pages 1-33, June.
    17. Hasti Seraji & Reza Tavakkoli-Moghaddam & Sobhan Asian & Harpreet Kaur, 2022. "An integrative location-allocation model for humanitarian logistics with distributive injustice and dissatisfaction under uncertainty," Annals of Operations Research, Springer, vol. 319(1), pages 211-257, December.
    18. Karakoc, Deniz Berfin & Barker, Kash & González, Andrés D., 2023. "Analyzing the tradeoff between vulnerability and recoverability investments for interdependent infrastructure networks," Socio-Economic Planning Sciences, Elsevier, vol. 87(PA).

  46. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    3. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).

  47. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.

    Cited by:

    1. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    2. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    3. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    4. Liu, Yi & Chen, Xia & Zhuang, Jun & Dong, Yucheng, 2024. "Defensive resource allocation in terrorism conflict management based on graph model with relative preferences," Socio-Economic Planning Sciences, Elsevier, vol. 96(C).

  48. Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.

    Cited by:

    1. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    2. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    3. Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
    4. Agarwal, Puneet & Aziz, Ridwan Al & Zhuang, Jun, 2022. "Interplay of rumor propagation and clarification on social media during crisis events - A game-theoretic approach," European Journal of Operational Research, Elsevier, vol. 298(2), pages 714-733.
    5. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    6. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    7. Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
    8. Alberto Redondo & David Ríos Insua, 2020. "Protecting From Malware Obfuscation Attacks Through Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 40(12), pages 2598-2609, December.

  49. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.

    Cited by:

    1. Marvin L. King & David R. Galbreath & Alexandra M. Newman & Amanda S. Hering, 2020. "Combining regression and mixed-integer programming to model counterinsurgency," Annals of Operations Research, Springer, vol. 292(1), pages 287-320, September.
    2. Issam Laguir & Sachin Modgil & Indranil Bose & Shivam Gupta & Rebecca Stekelorum, 2023. "Performance effects of analytics capability, disruption orientation, and resilience in the supply chain under environmental uncertainty," Annals of Operations Research, Springer, vol. 324(1), pages 1269-1293, May.
    3. Scott DuHadway & Steven Carnovale & Benjamin Hazen, 2019. "Understanding risk management for intentional supply chain disruptions: risk detection, risk mitigation, and risk recovery," Annals of Operations Research, Springer, vol. 283(1), pages 179-198, December.
    4. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    5. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    6. John B. Coles & Jing Zhang & Jun Zhuang, 2022. "Bridging the research-practice gap in disaster relief: using the IFRC Code of Conduct to develop an aid model," Annals of Operations Research, Springer, vol. 312(2), pages 1337-1357, May.
    7. Nafisa Mahbub & Anh Le & Jun Zhuang, 2022. "Online crowd-funding strategy: a game-theoretical approach to a Kickstarter case study," Annals of Operations Research, Springer, vol. 315(2), pages 1019-1036, August.
    8. Sanjoy Kumar Paul & Ruhul Sarker & Daryl Essam & Paul Tae-Woo Lee, 2019. "A mathematical modelling approach for managing sudden disturbances in a three-tier manufacturing supply chain," Annals of Operations Research, Springer, vol. 280(1), pages 299-335, September.
    9. Li, Xingyu & Epureanu, Bogdan I., 2020. "AI-based competition of autonomous vehicle fleets with application to fleet modularity," European Journal of Operational Research, Elsevier, vol. 287(3), pages 856-874.
    10. Daniel Seaberg & Laura Devine & Jun Zhuang, 2017. "A review of game theory applications in natural disaster management research," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(3), pages 1461-1483, December.

  50. Jun Zhuang & Vicki Bier & Seth Guikema, 2016. "Introductions to Adversary Behavior: Validating the Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 650-652, April.

    Cited by:

    1. Edouard Kujawski, 2016. "A Probabilistic Game‐Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems," Systems Engineering, John Wiley & Sons, vol. 19(6), pages 549-566, November.
    2. Stef Janssen & Alexei Sharpanskykh & Richard Curran, 2019. "AbSRiM: An Agent‐Based Security Risk Management Approach for Airport Operations," Risk Analysis, John Wiley & Sons, vol. 39(7), pages 1582-1596, July.

  51. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.

    Cited by:

    1. Christiansen, Jeffrey & Ernst, Andreas T. & Rieger, Janosch, 2024. "A robust optimization approach for a two-player force-design game," European Journal of Operational Research, Elsevier, vol. 318(2), pages 656-669.
    2. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
    3. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    4. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    5. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    6. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    7. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    8. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    9. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    10. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    11. John B. Coles & Jing Zhang & Jun Zhuang, 2022. "Bridging the research-practice gap in disaster relief: using the IFRC Code of Conduct to develop an aid model," Annals of Operations Research, Springer, vol. 312(2), pages 1337-1357, May.
    12. Roponen, Juho & Ríos Insua, David & Salo, Ahti, 2020. "Adversarial risk analysis under partial information," European Journal of Operational Research, Elsevier, vol. 287(1), pages 306-316.
    13. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    14. Jing Yang & Juan S. Borrero & Oleg A. Prokopyev & Denis Sauré, 2021. "Sequential Shortest Path Interdiction with Incomplete Information and Limited Feedback," Decision Analysis, INFORMS, vol. 18(3), pages 218-244, September.
    15. Katherine A. Daniell & Alec Morton & David Ríos Insua, 2016. "Policy analysis and policy analytics," Annals of Operations Research, Springer, vol. 236(1), pages 1-13, January.

  52. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Tania Wallis & Rafał Leszczyna, 2022. "EE-ISAC—Practical Cybersecurity Solution for the Energy Sector," Energies, MDPI, vol. 15(6), pages 1-23, March.
    3. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    4. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    5. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    6. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    7. M. Hosein Zare & Oleg A. Prokopyev & Denis Sauré, 2020. "On Bilevel Optimization with Inexact Follower," Decision Analysis, INFORMS, vol. 17(1), pages 74-95, March.
    8. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    9. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    10. Meilin He & Laura Devine & Jun Zhuang, 2018. "Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 215-225, February.
    11. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    12. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    13. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    14. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    15. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    16. Roponen, Juho & Ríos Insua, David & Salo, Ahti, 2020. "Adversarial risk analysis under partial information," European Journal of Operational Research, Elsevier, vol. 287(1), pages 306-316.
    17. Beck, Yasmine & Ljubić, Ivana & Schmidt, Martin, 2023. "A survey on bilevel optimization under uncertainty," European Journal of Operational Research, Elsevier, vol. 311(2), pages 401-426.
    18. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    19. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    20. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    21. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.

  53. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.

    Cited by:

    1. Bei Yan & Feng Mai & Chaojiang Wu & Rui Chen & Xiaolin Li, 2024. "A Computational Framework for Understanding Firm Communication During Disasters," Information Systems Research, INFORMS, vol. 35(2), pages 590-608, June.
    2. Andrew M. Smith & Andrés D. González & Leonardo Dueñas‐Osorio & Raissa M. D'Souza, 2020. "Interdependent Network Recovery Games," Risk Analysis, John Wiley & Sons, vol. 40(1), pages 134-152, January.
    3. Peiqiu Guan & Jing Zhang & Vineet M. Payyappalli & Jun Zhuang, 2018. "Modeling and Validating Public–Private Partnerships in Disaster Management," Decision Analysis, INFORMS, vol. 15(2), pages 55-71, June.
    4. E.R. Akhmetshina & G.T. Guzelbaeva & D.K. Rakhmatullina, 2017. "Special Economic Zone as a Local Area of Public-Private Parthership Implementation," European Research Studies Journal, European Research Studies Journal, vol. 0(2A), pages 346-354.
    5. Elisa F. Long & Gilberto Montibeller & Jun Zhuang, 2022. "Health Decision Analysis: Evolution, Trends, and Emerging Topics," Decision Analysis, INFORMS, vol. 19(4), pages 255-264, December.
    6. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    7. Vicki M. Bier & Yuqun Zhou & Hongru Du, 2020. "Game-theoretic modeling of pre-disaster relocation," The Engineering Economist, Taylor & Francis Journals, vol. 65(2), pages 89-113, April.

  54. Xiaojun Shan & Jun Zhuang, 2014. "Subsidizing to disrupt a terrorism supply chain—a four-player game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(7), pages 1108-1119, July.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
    4. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    5. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    6. G. Quijano, Eduardo & Ríos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
    7. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    8. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    9. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    10. Afshan Naseem & Shoab Ahmed Khan & Asad Waqar Malik, 2017. "A real-time man-in-loop threat evaluation and resource assignment in defense," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(6), pages 725-738, June.
    11. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.

  55. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
    3. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    4. Ederlina Ganatuin‐Nocon & Tyrone Ang, 2020. "Revisiting inspection game and inspector leadership through reaction networks," Naval Research Logistics (NRL), John Wiley & Sons, vol. 67(6), pages 438-452, September.
    5. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    6. Agarwal, Puneet & Aziz, Ridwan Al & Zhuang, Jun, 2022. "Interplay of rumor propagation and clarification on social media during crisis events - A game-theoretic approach," European Journal of Operational Research, Elsevier, vol. 298(2), pages 714-733.
    7. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    8. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.
    9. Huijie Li & Deqing Tan, 2024. "How to Control Waste Incineration Pollution? Cost-Sharing or Penalty Mechanism—Based on Two Differential Game Models," Decision Analysis, INFORMS, vol. 21(2), pages 91-109, June.
    10. Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
    11. César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
    12. Sabbaghi, Mostafa & Behdad, Sara & Zhuang, Jun, 2016. "Managing consumer behavior toward on-time return of the waste electrical and electronic equipment: A game theoretic approach," International Journal of Production Economics, Elsevier, vol. 182(C), pages 545-563.
    13. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    14. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.

  56. Jun Zhuang & Gregory Saxton & Han Wu, 2014. "Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors," Annals of Operations Research, Springer, vol. 221(1), pages 469-491, October.

    Cited by:

    1. Shuyang Wang & Xiaoyu Wu & Zhilin Li & Jing-Hua Zhang, 2021. "Tax-Exempt Status and Associated Factors among Charitable Foundations in China," Sustainability, MDPI, vol. 13(8), pages 1-15, April.
    2. Liu, Yang & Cui, Na & Zhang, Jianghua, 2019. "Integrated temporary facility location and casualty allocation planning for post-disaster humanitarian medical service," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 128(C), pages 1-16.
    3. Cristina Ortega-Rodríguez & Ana Licerán-Gutiérrez & Antonio Luis Moreno-Albarracín, 2020. "Transparency as a Key Element in Accountability in Non-Profit Organizations: A Systematic Literature Review," Sustainability, MDPI, vol. 12(14), pages 1-22, July.
    4. Kamran, Mehdi A. & Kia, Reza & Goodarzian, Fariba & Ghasemi, Peiman, 2023. "A new vaccine supply chain network under COVID-19 conditions considering system dynamic: Artificial intelligence algorithms," Socio-Economic Planning Sciences, Elsevier, vol. 85(C).
    5. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
    6. Iman Parsa & Mahyar Eftekhar & Charles J Corbett, 2022. "Does governance ease the overhead squeeze experienced by nonprofits?," Production and Operations Management, Production and Operations Management Society, vol. 31(8), pages 3288-3303, August.
    7. Nagurney, Anna & Flores, Emilio Alvarez & Soylu, Ceren, 2016. "A Generalized Nash Equilibrium network model for post-disaster humanitarian relief," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 95(C), pages 1-18.
    8. Nagurney, Anna & Salarpour, Mojtaba & Daniele, Patrizia, 2019. "An integrated financial and logistical game theory model for humanitarian organizations with purchasing costs, multiple freight service providers, and budget, capacity, and demand constraints," International Journal of Production Economics, Elsevier, vol. 212(C), pages 212-226.
    9. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    10. John B. Coles & Jing Zhang & Jun Zhuang, 2022. "Bridging the research-practice gap in disaster relief: using the IFRC Code of Conduct to develop an aid model," Annals of Operations Research, Springer, vol. 312(2), pages 1337-1357, May.
    11. Nafisa Mahbub & Anh Le & Jun Zhuang, 2022. "Online crowd-funding strategy: a game-theoretical approach to a Kickstarter case study," Annals of Operations Research, Springer, vol. 315(2), pages 1019-1036, August.
    12. Anna Nagurney & Mojtaba Salarpour & June Dong & Ladimer S. Nagurney, 2020. "A Stochastic Disaster Relief Game Theory Network Model," SN Operations Research Forum, Springer, vol. 1(2), pages 1-33, June.
    13. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    14. Anna Nagurney & Pritha Dutta, 2021. "A Multiclass, Multiproduct Covid-19 Convalescent Plasma Donor Equilibrium Model," SN Operations Research Forum, Springer, vol. 2(3), pages 1-30, September.

  57. Liya Guo & Shan Huang & Jun Zhuang & Adel Sadek, 2013. "Modeling Parking Behavior Under Uncertainty: A Static Game Theoretic versus a Sequential Neo-additive Capacity Modeling Approach," Networks and Spatial Economics, Springer, vol. 13(3), pages 327-350, September.

    Cited by:

    1. Pel, Adam J. & Chaniotakis, Emmanouil, 2017. "Stochastic user equilibrium traffic assignment with equilibrated parking search routes," Transportation Research Part B: Methodological, Elsevier, vol. 101(C), pages 123-139.
    2. Xiao, Jun & Lou, Yingyan & Frisby, Joshua, 2018. "How likely am I to find parking? – A practical model-based framework for predicting parking availability," Transportation Research Part B: Methodological, Elsevier, vol. 112(C), pages 19-39.
    3. Zhibin Chen & Stephen Spana & Yafeng Yin & Yuchuan Du, 2019. "An Advanced Parking Navigation System for Downtown Parking," Networks and Spatial Economics, Springer, vol. 19(3), pages 953-968, September.
    4. Bergantino, Angela Stefania & De Carlo, Angela & Morone, Andrea, 2015. "Individuals’ behaviour with respect to parking alternatives: a laboratory experiment," MPRA Paper 63815, University Library of Munich, Germany.
    5. Du, Lili & Gong, Siyuan, 2016. "Stochastic Poisson game for an online decentralized and coordinated parking mechanism," Transportation Research Part B: Methodological, Elsevier, vol. 87(C), pages 44-63.
    6. Semeneh Hunachew Bayih & Surafel Luleseged Tilahun, 2024. "Dynamic vehicle parking pricing. A review," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 34(1), pages 35-59.
    7. Sayarshad, Hamid R. & Sattar, Shahram & Oliver Gao, H., 2020. "A scalable non-myopic atomic game for a smart parking mechanism," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 140(C).
    8. Chaniotakis, Emmanouil & Pel, Adam J., 2015. "Drivers’ parking location choice under uncertain parking availability and search times: A stated preference experiment," Transportation Research Part A: Policy and Practice, Elsevier, vol. 82(C), pages 228-239.
    9. He, Fang & Yin, Yafeng & Chen, Zhibin & Zhou, Jing, 2015. "Pricing of parking games with atomic players," Transportation Research Part B: Methodological, Elsevier, vol. 73(C), pages 1-12.

  58. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    3. Shitao Gong & Xin Gao & Zhou Li & Linyan Chen, 2021. "Developing a Dynamic Supervision Mechanism to Improve Construction Safety Investment Supervision Efficiency in China: Theoretical Simulation of Evolutionary Game Process," IJERPH, MDPI, vol. 18(7), pages 1-29, March.
    4. Liu, Yang & Cui, Na & Zhang, Jianghua, 2019. "Integrated temporary facility location and casualty allocation planning for post-disaster humanitarian medical service," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 128(C), pages 1-16.
    5. Chunlin Xin & Jianwen Zhang & Chia-Huei Wu & Sang-Bing Tsai, 2020. "Safety Investment Decision Problem without Probability Distribution: A Robust Optimization Approach," Mathematical Problems in Engineering, Hindawi, vol. 2020, pages 1-10, November.
    6. Cameron A. MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    7. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    8. Zongjie Pi & Xin Gao & Linyan Chen & Jinghua Liu, 2019. "The New Path to Improve Construction Safety Performance in China: An Evolutionary Game Theoretic Approach," IJERPH, MDPI, vol. 16(13), pages 1-24, July.
    9. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    10. Cameron MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    11. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    12. Wenxin Su & Xin Gao & Yukun Jiang & Jinrong Li, 2021. "Developing a Construction Safety Standard System to Enhance Safety Supervision Efficiency in China: A Theoretical Simulation of the Evolutionary Game Process," Sustainability, MDPI, vol. 13(23), pages 1-22, December.
    13. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.
    14. Liangdong Lu & Hong Huang & Jiuchang Wei & Jia Xu, 2020. "Safety Regulations and the Uncertainty of Work‐Related Road Accident Loss: The Triple Identity of Chinese Local Governments Under Principal–Agent Framework," Risk Analysis, John Wiley & Sons, vol. 40(6), pages 1168-1182, June.
    15. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Niki Matinrad, 2016. "Disaster Management from a POM Perspective: Mapping a New Domain," Production and Operations Management, Production and Operations Management Society, vol. 25(10), pages 1611-1637, October.
    16. Yisha Xiang & Jun Zhuang, 2016. "A medical resource allocation model for serving emergency victims with deteriorating health conditions," Annals of Operations Research, Springer, vol. 236(1), pages 177-196, January.
    17. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    18. Daniel Seaberg & Laura Devine & Jun Zhuang, 2017. "A review of game theory applications in natural disaster management research," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(3), pages 1461-1483, December.
    19. Vicki M. Bier & Yuqun Zhou & Hongru Du, 2020. "Game-theoretic modeling of pre-disaster relocation," The Engineering Economist, Taylor & Francis Journals, vol. 65(2), pages 89-113, April.
    20. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    21. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

  59. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Olga Špačková & Daniel Straub, 2015. "Cost‐Benefit Analysis for Optimization of Risk Protection Under Budget Constraints," Risk Analysis, John Wiley & Sons, vol. 35(5), pages 941-959, May.
    3. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
    4. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    5. Mohammad R. Zolfaghari & Elnaz Peyghaleh, 2015. "Implementation of Equity in Resource Allocation for Regional Earthquake Risk Mitigation Using Two‐Stage Stochastic Programming," Risk Analysis, John Wiley & Sons, vol. 35(3), pages 434-458, March.
    6. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    7. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    8. Gary A. Ackerman & Jun Zhuang & Sitara Weerasuriya, 2017. "Cross‐Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 342-371, February.
    9. Cameron MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    10. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    11. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    12. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    13. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    14. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    15. Ederlina Ganatuin‐Nocon & Tyrone Ang, 2020. "Revisiting inspection game and inspector leadership through reaction networks," Naval Research Logistics (NRL), John Wiley & Sons, vol. 67(6), pages 438-452, September.
    16. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    17. Yijun Shi & Guofang Zhai & Lihua Xu & Quan Zhu & Jinyang Deng, 2019. "Planning Emergency Shelters for Urban Disasters: A Multi-Level Location–Allocation Modeling Approach," Sustainability, MDPI, vol. 11(16), pages 1-19, August.
    18. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    19. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    20. Doan, Xuan Vinh & Shaw, Duncan, 2019. "Resource allocation when planning for simultaneous disasters," European Journal of Operational Research, Elsevier, vol. 274(2), pages 687-709.
    21. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    22. Nageswara S. V. Rao & Chris Y. T. Ma & Fei He & David K. Y. Yau & Jun Zhuang, 2018. "Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures," Games, MDPI, vol. 9(3), pages 1-24, July.
    23. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    24. Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
    25. Oscar Rodríguez-Espíndola, 2023. "Two-stage stochastic formulation for relief operations with multiple agencies in simultaneous disasters," OR Spectrum: Quantitative Approaches in Management, Springer;Gesellschaft für Operations Research e.V., vol. 45(2), pages 477-523, June.
    26. César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
    27. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    28. Olive Emil Wetter & Valentino Wüthrich, 2015. "“What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism," Defense & Security Analysis, Taylor & Francis Journals, vol. 31(3), pages 185-198, September.
    29. Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.
    30. Yanyan Wang & Vicki M. Bier & Baiqing Sun, 2019. "Measuring and Achieving Equity in Multiperiod Emergency Material Allocation," Risk Analysis, John Wiley & Sons, vol. 39(11), pages 2408-2426, November.
    31. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.
    32. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.

  60. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.

    Cited by:

    1. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
    4. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    5. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    6. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    7. M. Hosein Zare & Oleg A. Prokopyev & Denis Sauré, 2020. "On Bilevel Optimization with Inexact Follower," Decision Analysis, INFORMS, vol. 17(1), pages 74-95, March.
    8. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    9. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    10. Cameron A. MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    11. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
    12. Wu, Yipeng & Chen, Zhilong & Dang, Junhu & Chen, Yicun & Zhao, Xudong & Zha, Lvying, 2022. "Allocation of defensive and restorative resources in electric power system against consecutive multi-target attacks," Reliability Engineering and System Safety, Elsevier, vol. 219(C).
    13. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    14. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    15. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    16. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    17. Cameron MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    18. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    19. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    20. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    21. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    22. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.
    23. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    24. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    25. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    26. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    27. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    28. Afshan Naseem & Shoab Ahmed Khan & Asad Waqar Malik, 2017. "A real-time man-in-loop threat evaluation and resource assignment in defense," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(6), pages 725-738, June.
    29. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    30. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    31. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    32. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    33. Nageswara S. V. Rao & Chris Y. T. Ma & Fei He & David K. Y. Yau & Jun Zhuang, 2018. "Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures," Games, MDPI, vol. 9(3), pages 1-24, July.
    34. Sakai, Kazuki & Hohzaki, Ryusuke & Fukuda, Emiko & Sakuma, Yutaka, 2018. "Risk evaluation and games in mine warfare considering shipcounter effects," European Journal of Operational Research, Elsevier, vol. 268(1), pages 300-313.
    35. Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
    36. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    37. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
    38. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    39. Barry C. Ezell & R. Michael Robinson & Peter Foytik & Craig Jordan & David Flanagan, 2013. "Cyber risk to transportation, industrial control systems, and traffic signal controllers," Environment Systems and Decisions, Springer, vol. 33(4), pages 508-516, December.
    40. César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
    41. Afshan Naseem & Yasir Ahmad, 2020. "Critical Success Factors for Neutralization of Airborne Threats," SAGE Open, , vol. 10(3), pages 21582440209, September.
    42. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    43. Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.
    44. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.
    45. Edouard Kujawski, 2015. "Accounting for Terrorist Behavior in Allocating Defensive Counterterrorism Resources," Systems Engineering, John Wiley & Sons, vol. 18(4), pages 365-376, July.
    46. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.

  61. May Cheung & Jun Zhuang, 2012. "Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters," Decision Analysis, INFORMS, vol. 9(2), pages 156-164, June.

    Cited by:

    1. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    2. Jason R. W. Merrick & Fabrizio Ruggeri & Refik Soyer & L. Robin Keller, 2012. "From the Editors---Games and Decisions in Reliability and Risk," Decision Analysis, INFORMS, vol. 9(2), pages 81-85, June.
    3. Shitao Gong & Xin Gao & Zhou Li & Linyan Chen, 2021. "Developing a Dynamic Supervision Mechanism to Improve Construction Safety Investment Supervision Efficiency in China: Theoretical Simulation of Evolutionary Game Process," IJERPH, MDPI, vol. 18(7), pages 1-29, March.
    4. Cameron A. MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    5. Kumar, Sourabh & Kumar Barua, Mukesh, 2022. "Modeling and investigating the interaction among risk factors of the sustainable petroleum supply chain," Resources Policy, Elsevier, vol. 79(C).
    6. Cameron MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    7. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    8. Agarwal, Puneet & Aziz, Ridwan Al & Zhuang, Jun, 2022. "Interplay of rumor propagation and clarification on social media during crisis events - A game-theoretic approach," European Journal of Operational Research, Elsevier, vol. 298(2), pages 714-733.
    9. Shandong Mou & Kexin Zhong & Yamin Ma, 2023. "Regulating the Big Data-Based Discriminatory Pricing in Platform Retailing: A Tripartite Evolutionary Game Theory Analysis," Mathematics, MDPI, vol. 11(11), pages 1-21, June.
    10. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    11. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.
    12. Huijie Li & Deqing Tan, 2024. "How to Control Waste Incineration Pollution? Cost-Sharing or Penalty Mechanism—Based on Two Differential Game Models," Decision Analysis, INFORMS, vol. 21(2), pages 91-109, June.
    13. Daniel Seaberg & Laura Devine & Jun Zhuang, 2017. "A review of game theory applications in natural disaster management research," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(3), pages 1461-1483, December.
    14. Vicki M. Bier & Yuqun Zhou & Hongru Du, 2020. "Game-theoretic modeling of pre-disaster relocation," The Engineering Economist, Taylor & Francis Journals, vol. 65(2), pages 89-113, April.
    15. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.
    16. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

  62. Coles, John B. & Zhuang, Jun & Yates, Justin, 2012. "Case study in disaster relief: A descriptive analysis of agency partnerships in the aftermath of the January 12th, 2010 Haitian earthquake," Socio-Economic Planning Sciences, Elsevier, vol. 46(1), pages 67-77.

    Cited by:

    1. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.
    2. Dillenburger, Steven P. & Cochran, Jeffery K. & Cammarano, Vincent R., 2013. "Minimizing supply airdrop collateral damage risk," Socio-Economic Planning Sciences, Elsevier, vol. 47(1), pages 9-19.
    3. Yisha Xiang & Jun Zhuang, 2016. "A medical resource allocation model for serving emergency victims with deteriorating health conditions," Annals of Operations Research, Springer, vol. 236(1), pages 177-196, January.
    4. John Coles & Jing Zhang & Jun Zhuang, 2016. "Partnership behavior in disaster relief operations: a case study comparison of the responses to the tornado in Joplin, Missouri and Hurricane Sandy along the Jersey Coast," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 84(1), pages 625-647, October.
    5. Shira Daskal & Adar Ben-Eliyahu & Gal Levy & Yakov Ben-Haim & Ronnen Avny, 2022. "Earthquake Vulnerability Reduction by Building a Robust Social-Emotional Preparedness Program," Sustainability, MDPI, vol. 14(10), pages 1-22, May.

  63. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.

    Cited by:

    1. Martina de Gramatica & Fabio Massacci & Woohyun Shim & Uğur Turhan & Julian Williams, 2017. "Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 372-395, February.
    2. M. Hosein Zare & Oleg A. Prokopyev & Denis Sauré, 2020. "On Bilevel Optimization with Inexact Follower," Decision Analysis, INFORMS, vol. 17(1), pages 74-95, March.
    3. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    4. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    5. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    6. Zhang, Laobing & Reniers, Genserik & Qiu, Xiaogang, 2019. "Playing chemical plant protection game with distribution-free uncertainties," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    7. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    8. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
    9. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    10. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    11. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    12. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    13. Vicki Bier, 2020. "The Role of Decision Analysis in Risk Analysis: A Retrospective," Risk Analysis, John Wiley & Sons, vol. 40(S1), pages 2207-2217, November.
    14. William B. Haskell & Wenjie Huang & Huifu Xu, 2018. "Preference Elicitation and Robust Optimization with Multi-Attribute Quasi-Concave Choice Functions," Papers 1805.06632, arXiv.org.
    15. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    16. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    17. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    18. Wu, Yipeng & Chen, Zhilong & Zhao, Xudong & Liu, Ying & Zhang, Ping & Liu, Yajiao, 2021. "Robust analysis of cascading failures in complex networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 583(C).
    19. Nageswara S. V. Rao & Chris Y. T. Ma & Fei He & David K. Y. Yau & Jun Zhuang, 2018. "Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures," Games, MDPI, vol. 9(3), pages 1-24, July.
    20. Liu, Yi & Chen, Xia & Zhuang, Jun & Dong, Yucheng, 2024. "Defensive resource allocation in terrorism conflict management based on graph model with relative preferences," Socio-Economic Planning Sciences, Elsevier, vol. 96(C).
    21. Timothy N. Cason & Daniel Woods & Mustafa Abdallah & Saurabh Bagechi & Shreyas Sundaram, 2021. "Network Defense and Behavior Biases: An Experimental Study," Purdue University Economics Working Papers 1328, Purdue University, Department of Economics.
    22. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    23. César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
    24. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    25. Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.
    26. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.
    27. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.

  64. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.

    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    4. Afshan Naseem & Shoab Ahmed Khan & Asad Waqar Malik, 2017. "A real-time man-in-loop threat evaluation and resource assignment in defense," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(6), pages 725-738, June.
    5. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    6. Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.

  65. K Hausken & J Zhuang, 2012. "The timing and deterrence of terrorist attacks due to exogenous dynamics," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 726-735, June.

    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Kjell Hausken, 2020. "Additive multi-effort contests," Theory and Decision, Springer, vol. 89(2), pages 203-248, September.
    3. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    4. Xiaojun Shan & Jun Zhuang, 2014. "Subsidizing to disrupt a terrorism supply chain—a four-player game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(7), pages 1108-1119, July.
    5. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    6. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    7. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    8. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    9. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    10. Dong, Mingxin & Zhang, Zhen & Liu, Yi & Zhao, Dong Feng & Meng, Yifei & Shi, Jihao, 2023. "Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
    11. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    12. Song, Yu & Chen, Bo & Hou, Na & Yang, Yi, 2022. "Terrorist attacks and oil prices: A time-varying causal relationship analysis," Energy, Elsevier, vol. 246(C).
    13. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    14. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    15. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    16. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    17. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    18. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    19. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    20. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    21. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    22. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    23. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Niki Matinrad, 2016. "Disaster Management from a POM Perspective: Mapping a New Domain," Production and Operations Management, Production and Operations Management Society, vol. 25(10), pages 1611-1637, October.
    24. Afshan Naseem & Shoab Ahmed Khan & Asad Waqar Malik, 2017. "A real-time man-in-loop threat evaluation and resource assignment in defense," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(6), pages 725-738, June.
    25. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    26. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    27. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    28. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    29. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    30. Hausken, Kjell, 2016. "Axiomatization of Group Contest Success Functions," UiS Working Papers in Economics and Finance 2016/8, University of Stavanger.
    31. Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
    32. Afshan Naseem & Yasir Ahmad, 2020. "Critical Success Factors for Neutralization of Airborne Threats," SAGE Open, , vol. 10(3), pages 21582440209, September.
    33. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    34. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    35. Yanling Chang & Alan Erera & Chelsea White, 2015. "A leader–follower partially observed, multiobjective Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 103-128, December.

  66. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.

    Cited by:

    1. Wu, Yipeng & Chen, Zhilong & Dang, Junhu & Chen, Yicun & Zhao, Xudong & Zha, Lvying, 2022. "Allocation of defensive and restorative resources in electric power system against consecutive multi-target attacks," Reliability Engineering and System Safety, Elsevier, vol. 219(C).
    2. Peiqiu Guan & Jing Zhang & Vineet M. Payyappalli & Jun Zhuang, 2018. "Modeling and Validating Public–Private Partnerships in Disaster Management," Decision Analysis, INFORMS, vol. 15(2), pages 55-71, June.
    3. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    4. Gary A. Ackerman & Jun Zhuang & Sitara Weerasuriya, 2017. "Cross‐Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 342-371, February.
    5. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    6. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    7. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    8. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    9. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    10. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    11. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    12. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    13. Wu, Yipeng & Chen, Zhilong & Zhao, Xudong & Liu, Ying & Zhang, Ping & Liu, Yajiao, 2021. "Robust analysis of cascading failures in complex networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 583(C).
    14. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    15. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
    16. César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
    17. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.

  67. Coles John & Zhuang Jun, 2011. "Decisions in Disaster Recovery Operations: A Game Theoretic Perspective on Organization Cooperation," Journal of Homeland Security and Emergency Management, De Gruyter, vol. 8(1), pages 1-16, July.

    Cited by:

    1. Magoua, Joseph Jonathan & Li, Nan, 2023. "The human factor in the disaster resilience modeling of critical infrastructure systems," Reliability Engineering and System Safety, Elsevier, vol. 232(C).
    2. Amanda Melendez & David Caballero-Russi & Mariantonieta Gutierrez Soto & Luis Felipe Giraldo, 2022. "Computational models of community resilience," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 111(2), pages 1121-1152, March.
    3. Roozbeh, Iman & Hearne, John & Abbasi, Babak & Ozlen, Melih, 2021. "Decision support for wildfire asset protection: A two-stage stochastic programming approach," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 155(C).

  68. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.

    Cited by:

    1. Ni, Guanqun & Xu, Yinfeng & Dong, Yucheng, 2013. "Price and speed decisions in customer-intensive services with two classes of customers," European Journal of Operational Research, Elsevier, vol. 228(2), pages 427-436.
    2. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    3. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    4. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    5. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
    6. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    7. Liya Guo & Shan Huang & Jun Zhuang & Adel Sadek, 2013. "Modeling Parking Behavior Under Uncertainty: A Static Game Theoretic versus a Sequential Neo-additive Capacity Modeling Approach," Networks and Spatial Economics, Springer, vol. 13(3), pages 327-350, September.
    8. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    9. Liu, Zhongyi & Liu, Jingchen & Zhai, Xin & Wang, Guanying, 2019. "Police staffing and workload assignment in law enforcement using multi-server queueing models," European Journal of Operational Research, Elsevier, vol. 276(2), pages 614-625.
    10. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
    11. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.
    12. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    13. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    14. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    15. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    16. Lee, Sangjae & Costello, Francis Joseph & Lee, Kun Chang, 2021. "Hierarchical balanced scorecard-based organizational goals and the efficiency of controls processes," Journal of Business Research, Elsevier, vol. 132(C), pages 270-288.
    17. Jalili Marand, Ata & Tang, Ou & Li, Hongyan, 2019. "Quandary of service logistics: Fast or reliable?," European Journal of Operational Research, Elsevier, vol. 275(3), pages 983-996.
    18. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    19. Naraphorn Haphuriwat & Vicki M. Bier & Henry H. Willis, 2011. "Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation," Decision Analysis, INFORMS, vol. 8(2), pages 88-102, June.
    20. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.
    21. Yael Deutsch & Boaz Golany, 2019. "Securing Gates of a Protected Area: A Hybrid Game and Queueing Theory Modeling Approach," Decision Analysis, INFORMS, vol. 16(1), pages 31-45, March.
    22. Pala, Ali & Zhuang, Jun, 2018. "Security screening queues with impatient applicants: A new model with a case study," European Journal of Operational Research, Elsevier, vol. 265(3), pages 919-930.
    23. Gallice, Andrea, 2017. "An approximate solution to rent-seeking contests with private information," European Journal of Operational Research, Elsevier, vol. 256(2), pages 673-684.
    24. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.
    25. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.

  69. Jun Zhuang & Vicki Bier, 2011. "Secrecy And Deception At Equilibrium, With Applications To Anti-Terrorism Resource Allocation," Defence and Peace Economics, Taylor & Francis Journals, vol. 22(1), pages 43-61.

    Cited by:

    1. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    4. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    5. Kathryn Merrick & Medria Hardhienata & Kamran Shafi & Jiankun Hu, 2016. "A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios," Future Internet, MDPI, vol. 8(3), pages 1-29, July.
    6. Nakao, Keisuke, 2017. "Denial vs. Punishment: Strategies Shape War, but War Itself Affects Strategies," MPRA Paper 81418, University Library of Munich, Germany.
    7. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    8. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    9. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    10. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    11. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    12. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    13. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    14. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    15. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    16. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    17. Christopher Cotton & Chang Liu, 2011. "100 Horsemen and the empty city: A game theoretic examination of deception in Chinese military legend," Journal of Peace Research, Peace Research Institute Oslo, vol. 48(2), pages 217-223, March.
    18. Shan, Xiaojun Gene & Zhuang, Jun, 2020. "A game-theoretic approach to modeling attacks and defenses of smart grids at three levels," Reliability Engineering and System Safety, Elsevier, vol. 195(C).
    19. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    20. Grant, Matthew J. & Stewart, Mark G., 2017. "Modelling improvised explosive device attacks in the West – Assessing the hazard," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 345-354.
    21. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
    22. Santing He & Mingchu Li & Runfa Zhang, 2024. "Signaling Security Games with Attack Planner Deception," Mathematics, MDPI, vol. 12(16), pages 1-28, August.
    23. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    24. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
    25. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    26. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    27. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    28. Jun Zhuang & Gregory Saxton & Han Wu, 2014. "Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors," Annals of Operations Research, Springer, vol. 221(1), pages 469-491, October.
    29. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    30. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    31. Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.
    32. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.

  70. Urschel John D & Zhuang Jun, 2011. "Are NFL Coaches Risk and Loss Averse? Evidence from Their Use of Kickoff Strategies," Journal of Quantitative Analysis in Sports, De Gruyter, vol. 7(3), pages 1-17, July.

    Cited by:

    1. Lefgren, Lars J. & Platt, Brennan & Price, Joseph & Higbee, Samuel, 2019. "Outcome based accountability: Theory and evidence," Journal of Economic Behavior & Organization, Elsevier, vol. 160(C), pages 121-137.
    2. Brian Goff & Stephen L. Locke, 2019. "Revisiting Romer: Digging Deeper Into Influences on NFL Managerial Decisions," Journal of Sports Economics, , vol. 20(5), pages 671-689, June.
    3. Ryan Elmore & Andrew Urbaczewski, 2021. "Loss Aversion in Professional Golf," Journal of Sports Economics, , vol. 22(2), pages 202-217, February.

  71. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.

    Cited by:

    1. Kevin S. Ni & Daniel Faissol & Thomas Edmunds & Richard Wheeler, 2013. "Exploitation of Ambiguous Cues to Infer Terrorist Activity," Decision Analysis, INFORMS, vol. 10(1), pages 42-62, March.
    2. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    3. L. Robin Keller & Kelly M. Kophazi, 2011. "From the Editors---Deterrence, Multiattribute Utility, and Probability and Bayes' Updating," Decision Analysis, INFORMS, vol. 8(2), pages 83-87, June.
    4. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    5. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    6. Liles, Joseph M. & Robbins, Matthew J. & Lunday, Brian J., 2023. "Improving defensive air battle management by solving a stochastic dynamic assignment problem via approximate dynamic programming," European Journal of Operational Research, Elsevier, vol. 305(3), pages 1435-1449.
    7. Rakesh K. Sarin & L. Robin Keller, 2013. "From the Editors: Probability Approximations, Anti-Terrorism Strategy, and Bull's-Eye Display for Performance Feedback," Decision Analysis, INFORMS, vol. 10(1), pages 1-5, March.
    8. Jason R. W. Merrick & Fabrizio Ruggeri & Refik Soyer & L. Robin Keller, 2012. "From the Editors---Games and Decisions in Reliability and Risk," Decision Analysis, INFORMS, vol. 9(2), pages 81-85, June.
    9. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    10. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    11. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    12. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    13. Song, Yu & Chen, Bo & Hou, Na & Yang, Yi, 2022. "Terrorist attacks and oil prices: A time-varying causal relationship analysis," Energy, Elsevier, vol. 246(C).
    14. Kjell Hausken, 2019. "Principal–Agent Theory, Game Theory, and the Precautionary Principle," Decision Analysis, INFORMS, vol. 16(2), pages 105-127, June.
    15. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    16. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    17. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    18. Hausken, Kjell, 2019. "Governmental combat of the dynamics of multiple competing terrorist organizations," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 166(C), pages 33-55.
    19. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    20. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    21. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    22. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    23. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    24. G. Quijano, Eduardo & Ríos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
    25. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    26. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    27. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    28. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    29. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    30. Fei He & Jun Zhuang & Nageswara S. V. Rao, 2020. "Discrete game-theoretic analysis of defense in correlated cyber-physical systems," Annals of Operations Research, Springer, vol. 294(1), pages 741-767, November.
    31. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    32. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    33. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    34. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    35. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    36. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    37. Liu, Yi & Chen, Xia & Zhuang, Jun & Dong, Yucheng, 2024. "Defensive resource allocation in terrorism conflict management based on graph model with relative preferences," Socio-Economic Planning Sciences, Elsevier, vol. 96(C).
    38. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    39. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    40. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    41. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    42. Yanling Chang & Alan Erera & Chelsea White, 2015. "A leader–follower partially observed, multiobjective Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 103-128, December.
    43. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.

  72. Kjell Hausken & Jun Zhuang, 2011. "Defending Against a Stockpiling Terrorist," The Engineering Economist, Taylor & Francis Journals, vol. 56(4), pages 321-353.

    Cited by:

    1. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    2. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    3. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    4. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    5. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    6. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    7. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    8. Xing Gao & Weijun Zhong & Shue Mei, 2014. "A game-theoretic analysis of information sharing and security investment for complementary firms," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(11), pages 1682-1691, November.
    9. João Ricardo Faria & Daniel Arce, 2021. "The Path of Terror Attacks," Games, MDPI, vol. 12(2), pages 1-11, April.
    10. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    11. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.

  73. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.

    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    3. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    4. Tania Wallis & Rafał Leszczyna, 2022. "EE-ISAC—Practical Cybersecurity Solution for the Energy Sector," Energies, MDPI, vol. 15(6), pages 1-23, March.
    5. Jorge González-Ortega & Refik Soyer & David Ríos Insua & Fabrizio Ruggeri, 2021. "An Adversarial Risk Analysis Framework for Batch Acceptance Problems," Decision Analysis, INFORMS, vol. 18(1), pages 25-40, March.
    6. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    7. Thanh Hong Nguyen & Amulya Yadav, 2022. "A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty," Games, MDPI, vol. 13(6), pages 1-24, December.
    8. Seidl, Andrea & Kaplan, Edward H. & Caulkins, Jonathan P. & Wrzaczek, Stefan & Feichtinger, Gustav, 2016. "Optimal control of a terror queue," European Journal of Operational Research, Elsevier, vol. 248(1), pages 246-256.
    9. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    10. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    11. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    12. Baykal-Gürsoy, Melike & Duan, Zhe & Poor, H. Vincent & Garnaev, Andrey, 2014. "Infrastructure security games," European Journal of Operational Research, Elsevier, vol. 239(2), pages 469-478.
    13. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    14. Yanling Chang & Alan Erera & Chelsea White, 2015. "Value of information for a leader–follower partially observed Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 129-153, December.
    15. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    16. Deck, Cary & Sheremeta, Roman, 2015. "Tug-of-War in the Laboratory," MPRA Paper 67521, University Library of Munich, Germany.
    17. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    18. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    19. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    20. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    21. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    22. Welburn, Jonathan & Grana, Justin & Schwindt, Karen, 2023. "Cyber deterrence with imperfect attribution and unverifiable signaling," European Journal of Operational Research, Elsevier, vol. 306(3), pages 1399-1416.
    23. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    24. González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
    25. Jun Zhuang & Vicki M. Bier, 2010. "Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1737-1743, December.
    26. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    27. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    28. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    29. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    30. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    31. Meilin He & Laura Devine & Jun Zhuang, 2018. "Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 215-225, February.
    32. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    33. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    34. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    35. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    36. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    37. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    38. Chen Wang & Vicki M. Bier, 2011. "Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility," Decision Analysis, INFORMS, vol. 8(4), pages 286-302, December.
    39. Christopher Cotton & Chang Liu, 2011. "100 Horsemen and the empty city: A game theoretic examination of deception in Chinese military legend," Journal of Peace Research, Peace Research Institute Oslo, vol. 48(2), pages 217-223, March.
    40. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    41. Mohammed Ahmed Ahmed Al-Jaoufi & Yun Liu & Zhenjiang Zhang, 2018. "An Active Defense Model with Low Power Consumption and Deviation for Wireless Sensor Networks Utilizing Evolutionary Game Theory," Energies, MDPI, vol. 11(5), pages 1-16, May.
    42. Fei He & Jun Zhuang & Nageswara S. V. Rao, 2020. "Discrete game-theoretic analysis of defense in correlated cyber-physical systems," Annals of Operations Research, Springer, vol. 294(1), pages 741-767, November.
    43. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    44. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
    45. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    46. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    47. Laura McLay & Casey Rothschild & Seth Guikema, 2012. "Robust Adversarial Risk Analysis: A Level- k Approach," Decision Analysis, INFORMS, vol. 9(1), pages 41-54, March.
    48. Bagchi, Aniruddha & Paul, Jomon A., 2021. "National security vs. human rights: A game theoretic analysis of the tension between these objectives," European Journal of Operational Research, Elsevier, vol. 290(2), pages 790-805.
    49. Santing He & Mingchu Li & Runfa Zhang, 2024. "Signaling Security Games with Attack Planner Deception," Mathematics, MDPI, vol. 12(16), pages 1-28, August.
    50. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    51. Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
    52. Sakai, Kazuki & Hohzaki, Ryusuke & Fukuda, Emiko & Sakuma, Yutaka, 2018. "Risk evaluation and games in mine warfare considering shipcounter effects," European Journal of Operational Research, Elsevier, vol. 268(1), pages 300-313.
    53. Jing Yang & Juan S. Borrero & Oleg A. Prokopyev & Denis Sauré, 2021. "Sequential Shortest Path Interdiction with Incomplete Information and Limited Feedback," Decision Analysis, INFORMS, vol. 18(3), pages 218-244, September.
    54. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    55. Liu, Yi & Chen, Xia & Zhuang, Jun & Dong, Yucheng, 2024. "Defensive resource allocation in terrorism conflict management based on graph model with relative preferences," Socio-Economic Planning Sciences, Elsevier, vol. 96(C).
    56. Li, Xingyu & Epureanu, Bogdan I., 2020. "AI-based competition of autonomous vehicle fleets with application to fleet modularity," European Journal of Operational Research, Elsevier, vol. 287(3), pages 856-874.
    57. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    58. Gallice, Andrea, 2017. "An approximate solution to rent-seeking contests with private information," European Journal of Operational Research, Elsevier, vol. 256(2), pages 673-684.
    59. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    60. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    61. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    62. Jun Zhuang & Gregory Saxton & Han Wu, 2014. "Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors," Annals of Operations Research, Springer, vol. 221(1), pages 469-491, October.
    63. Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
    64. Ratul Lahkar & Rezina Sultana, 2023. "Rent dissipation in large population Tullock contests," Public Choice, Springer, vol. 197(1), pages 253-282, October.
    65. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
    66. Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
    67. Andrew Samuel & Seth D. Guikema, 2012. "Resource Allocation for Homeland Defense: Dealing with the Team Effect," Decision Analysis, INFORMS, vol. 9(3), pages 238-252, September.
    68. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    69. Asma Ben Yaghlane & Mohamed Naceur Azaiez, 2019. "System survivability to continuous attacks: A game theoretic setting for constant attack rate processes," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(8), pages 1308-1320, August.
    70. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    71. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    72. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    73. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    74. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.

  74. Jun Zhuang & Vicki M. Bier, 2010. "Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1737-1743, December.

    Cited by:

    1. David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
    2. Tania Wallis & Rafał Leszczyna, 2022. "EE-ISAC—Practical Cybersecurity Solution for the Energy Sector," Energies, MDPI, vol. 15(6), pages 1-23, March.
    3. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    4. Brian A Jackson & David R Frelinger & Jennifer Kavanagh & Brett A Wallace, 2021. "Adaptation by intelligent adversaries to defensive measures: framing adaptation options and demonstrating assessment of attacker preferences using proxy intelligence data," The Journal of Defense Modeling and Simulation, , vol. 18(2), pages 61-85, April.
    5. Natalie M. Scala & Allison C. Reilly & Paul L. Goethals & Michel Cukier, 2019. "Risk and the Five Hard Problems of Cybersecurity," Risk Analysis, John Wiley & Sons, vol. 39(10), pages 2119-2126, October.
    6. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    7. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    8. Yanling Chang & Alan Erera & Chelsea White, 2015. "Value of information for a leader–follower partially observed Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 129-153, December.
    9. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    10. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    11. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    12. González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
    13. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    14. Meilin He & Laura Devine & Jun Zhuang, 2018. "Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 215-225, February.
    15. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    16. Santing He & Mingchu Li & Runfa Zhang, 2024. "Signaling Security Games with Attack Planner Deception," Mathematics, MDPI, vol. 12(16), pages 1-28, August.
    17. Michael Greenberg & Karen Lowrie, 2019. "Vicki Bier: A More Sensible Way to View Risk," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 744-748, April.
    18. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
    19. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    20. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
    21. Olive Emil Wetter & Valentino Wüthrich, 2015. "“What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism," Defense & Security Analysis, Taylor & Francis Journals, vol. 31(3), pages 185-198, September.
    22. Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.

  75. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. Michael Macgregor Perry & Hadi El-Amine, 2021. "Computational Efficiency in Multivariate Adversarial Risk Analysis Models," Papers 2110.12572, arXiv.org.
    3. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    4. Smith, J. Cole & Song, Yongjia, 2020. "A survey of network interdiction models and algorithms," European Journal of Operational Research, Elsevier, vol. 283(3), pages 797-811.
    5. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    6. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
    7. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    8. Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
    9. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    10. Yaghlane, Asma Ben & Azaiez, M. Naceur & Mrad, Mehdi, 2019. "System survivability in the context of interdiction networks," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 362-371.
    11. Maria Paola Scaparra & Richard Church, 2012. "Protecting Supply Systems to Mitigate Potential Disaster," International Regional Science Review, , vol. 35(2), pages 188-210, April.
    12. Xiaoxiong Zhang & Keith W. Hipel & Bingfeng Ge & Yuejin Tan, 2019. "A game‐theoretic model for resource allocation with deception and defense efforts," Systems Engineering, John Wiley & Sons, vol. 22(3), pages 282-291, May.
    13. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    14. Seidl, Andrea & Kaplan, Edward H. & Caulkins, Jonathan P. & Wrzaczek, Stefan & Feichtinger, Gustav, 2016. "Optimal control of a terror queue," European Journal of Operational Research, Elsevier, vol. 248(1), pages 246-256.
    15. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    16. David Simchi-Levi & Nikolaos Trichakis & Peter Yun Zhang, 2019. "Designing Response Supply Chain Against Bioattacks," Operations Research, INFORMS, vol. 67(5), pages 1246-1268, September.
    17. Nakao, Keisuke, 2017. "Denial vs. Punishment: Strategies Shape War, but War Itself Affects Strategies," MPRA Paper 81418, University Library of Munich, Germany.
    18. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    19. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    20. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    21. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    22. Catherine C. Langlois & Jean-Pierre P. Langlois, 2017. "Rational deterrence by proxy: designing cooperative security agreements," Defence and Peace Economics, Taylor & Francis Journals, vol. 28(1), pages 1-33, January.
    23. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    24. Laobing Zhang & Genserik Reniers, 2016. "A Game‐Theoretical Model to Improve Process Plant Protection from Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 36(12), pages 2285-2297, December.
    25. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    26. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
    27. Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
    28. Liu, Yang & Cui, Na & Zhang, Jianghua, 2019. "Integrated temporary facility location and casualty allocation planning for post-disaster humanitarian medical service," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 128(C), pages 1-16.
    29. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    30. Baykal-Gürsoy, Melike & Duan, Zhe & Poor, H. Vincent & Garnaev, Andrey, 2014. "Infrastructure security games," European Journal of Operational Research, Elsevier, vol. 239(2), pages 469-478.
    31. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    32. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    33. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    34. Khusrav Gaibulloev & Todd Sandler, 2023. "Common myths of terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 37(2), pages 271-301, April.
    35. Niyazi Bakır, 2011. "A Stackelberg game model for resource allocation in cargo container security," Annals of Operations Research, Springer, vol. 187(1), pages 5-22, July.
    36. Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    37. Michael Perry & Hadi El-Amine, 2019. "Computational Efficiency in Multivariate Adversarial Risk Analysis Models," Decision Analysis, INFORMS, vol. 16(4), pages 314-332, December.
    38. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    39. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    40. Jeffrey Schavland & Yupo Chan & Richard A. Raines, 2009. "Information security: Designing a stochastic‐network for throughput and reliability," Naval Research Logistics (NRL), John Wiley & Sons, vol. 56(7), pages 625-641, October.
    41. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    42. Dong, Mingxin & Zhang, Zhen & Liu, Yi & Zhao, Dong Feng & Meng, Yifei & Shi, Jihao, 2023. "Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
    43. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    44. Cameron A. MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    45. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
    46. Peiqiu Guan & Jing Zhang & Vineet M. Payyappalli & Jun Zhuang, 2018. "Modeling and Validating Public–Private Partnerships in Disaster Management," Decision Analysis, INFORMS, vol. 15(2), pages 55-71, June.
    47. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    48. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    49. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    50. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    51. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    52. Liberatore, Federico & Scaparra, Maria P. & Daskin, Mark S., 2012. "Hedging against disruptions with ripple effects in location analysis," Omega, Elsevier, vol. 40(1), pages 21-30, January.
    53. Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
    54. Zhang, Laobing & Reniers, Genserik & Qiu, Xiaogang, 2019. "Playing chemical plant protection game with distribution-free uncertainties," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    55. Terje Aven & Seth Guikema, 2015. "On the Concept and Definition of Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 35(12), pages 2162-2171, December.
    56. González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
    57. Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
    58. Lv, Wei & Li, Hongyi & Tang, Jiafu, 2017. "Bargaining model of labor disputes considering social mediation and bounded rationalityAuthor-Name: Liu, Dehai," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1064-1071.
    59. Bernhardt, Dan & Polborn, Mattias K., 2010. "Non-convexities and the gains from concealing defenses from committed terrorists," Economics Letters, Elsevier, vol. 107(1), pages 52-54, April.
    60. May Cheung & Jun Zhuang, 2012. "Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters," Decision Analysis, INFORMS, vol. 9(2), pages 156-164, June.
    61. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.
    62. Jun Zhuang & Vicki M. Bier, 2010. "Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1737-1743, December.
    63. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    64. Cameron MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    65. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    66. Kjell Hausken & Gregory Levitin, 2011. "Shield versus sword resource distribution in K-round duels," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 19(4), pages 589-603, December.
    67. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    68. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    69. Peng, Rui & Wu, Di & Xiao, Hui & Xing, Liudong & Gao, Kaiye, 2019. "Redundancy versus protection for a non-reparable phased-mission system subject to external impacts," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    70. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    71. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    72. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    73. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
    74. Paan Jindapon & William S. Neilson, 2009. "The Impact Of Societal Risk Attitudes On Terrorism And Counterterrorism," Economics and Politics, Wiley Blackwell, vol. 21(3), pages 433-451, November.
    75. Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
    76. Peren Arin, K. & Lorz, Oliver & Reich, Otto F.M. & Spagnolo, Nicola, 2011. "Exploring the dynamics between terrorism and anti-terror spending: Theory and UK-evidence," Journal of Economic Behavior & Organization, Elsevier, vol. 77(2), pages 189-202, February.
    77. Sarhadi, Hassan & Tulett, David M. & Verma, Manish, 2017. "An analytical approach to the protection planning of a rail intermodal terminal network," European Journal of Operational Research, Elsevier, vol. 257(2), pages 511-525.
    78. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    79. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    80. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.
    81. Angelo Antoci & Alessandro Fiori Maccioni & Pier Luigi Sacco & Mauro Sodini, 2017. "Self-protection, Psychological Externalities, and the Social Dynamics of Fear," Journal of Conflict Resolution, Peace Science Society (International), vol. 61(2), pages 349-371, February.
    82. Ruiz Estrada, Mario Arturo & Koutronas, Evangelos, 2016. "Terrorist attack assessment: Paris November 2015 and Brussels March 2016," Journal of Policy Modeling, Elsevier, vol. 38(3), pages 553-571.
    83. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    84. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    85. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    86. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    87. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    88. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    89. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    90. Agarwal, Puneet & Aziz, Ridwan Al & Zhuang, Jun, 2022. "Interplay of rumor propagation and clarification on social media during crisis events - A game-theoretic approach," European Journal of Operational Research, Elsevier, vol. 298(2), pages 714-733.
    91. Saed Alizamir & Francis de Véricourt & Shouqiang Wang, 2020. "Warning Against Recurring Risks: An Information Design Approach," Management Science, INFORMS, vol. 66(10), pages 4612-4629, October.
    92. Chen Wang & Vicki M. Bier, 2011. "Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility," Decision Analysis, INFORMS, vol. 8(4), pages 286-302, December.
    93. Guozhen Xiong & Chi Zhang & Fei Zhou, 2017. "A robust reliability redundancy allocation problem under abnormal external failures guided by a new importance measure," Journal of Risk and Reliability, , vol. 231(2), pages 180-199, April.
    94. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    95. Paola Cappanera & Maria Paola Scaparra, 2011. "Optimal Allocation of Protective Resources in Shortest-Path Networks," Transportation Science, INFORMS, vol. 45(1), pages 64-80, February.
    96. David J. Caswell & Ronald A. Howard & M. Elisabeth Paté-Cornell, 2011. "Analysis of National Strategies to Counter a Country's Nuclear Weapons Program," Decision Analysis, INFORMS, vol. 8(1), pages 30-45, March.
    97. Abdolmajid Yolmeh & Melike Baykal-Gürsoy & Vicki Bier, 2023. "A decomposable resource allocation model with generalized overarching protections," Annals of Operations Research, Springer, vol. 320(1), pages 493-507, January.
    98. Roponen, Juho & Ríos Insua, David & Salo, Ahti, 2020. "Adversarial risk analysis under partial information," European Journal of Operational Research, Elsevier, vol. 287(1), pages 306-316.
    99. Xiao, Hui & Shi, Daimin & Ding, Yi & Peng, Rui, 2016. "Optimal loading and protection of multi-state systems considering performance sharing mechanism," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 88-95.
    100. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    101. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    102. Zare Moayedi, Behzad & Azgomi, Mohammad Abdollahi, 2012. "A game theoretic framework for evaluation of the impacts of hackers diversity on security measures," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 45-54.
    103. Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.
    104. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    105. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    106. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
    107. Ekin, Tahir & Naveiro, Roi & Ríos Insua, David & Torres-Barrán, Alberto, 2023. "Augmented probability simulation methods for sequential games," European Journal of Operational Research, Elsevier, vol. 306(1), pages 418-430.
    108. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    109. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    110. Opher Baron & Oded Berman & Arieh Gavious, 2018. "A Game Between a Terrorist and a Passive Defender," Production and Operations Management, Production and Operations Management Society, vol. 27(3), pages 433-457, March.
    111. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    112. Jaspersen, Johannes G. & Montibeller, Gilberto, 2020. "On the learning patterns and adaptive behavior of terrorist organizations," European Journal of Operational Research, Elsevier, vol. 282(1), pages 221-234.
    113. James T. Bang & Atin Basuchoudhary & Aniruddha Mitra, 2021. "Validating Game-Theoretic Models of Terrorism: Insights from Machine Learning," Games, MDPI, vol. 12(3), pages 1-20, June.
    114. Andres F. Jola-Sanchez & Juan Camilo Serpa, 2021. "Inventory in Times of War," Management Science, INFORMS, vol. 67(10), pages 6457-6479, October.
    115. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    116. Michael R. Greenberg & Karen Lowrie & Henry Mayer & Tayfur Altiok, 2011. "Risk‐Based Decision Support Tools: Protecting Rail‐Centered Transit Corridors from Cascading Effects," Risk Analysis, John Wiley & Sons, vol. 31(12), pages 1849-1858, December.
    117. Yisha Xiang & Jun Zhuang, 2016. "A medical resource allocation model for serving emergency victims with deteriorating health conditions," Annals of Operations Research, Springer, vol. 236(1), pages 177-196, January.
    118. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    119. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    120. Catherine C. Langlois & Jean-Pierre P. Langlois, 2011. "The Escalation of Terror: Hate and the Demise of Terrorist Organizations," Conflict Management and Peace Science, Peace Science Society (International), vol. 28(5), pages 497-521, November.
    121. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    122. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    123. Yupo Chan, 2015. "Network Throughput and Reliability: Preventing Hazards and Attacks Through Gaming—Part I: Modeling," Springer Series in Reliability Engineering, in: Kjell Hausken & Jun Zhuang (ed.), Game Theoretic Analysis of Congestion, Safety and Security, edition 127, pages 113-139, Springer.
    124. K Hausken & G Levitin, 2009. "Parallel systems with different types of defence resource expenditure under two sequential attacks," Journal of Risk and Reliability, , vol. 223(1), pages 71-85, March.
    125. Michael Greenberg & Karen Lowrie, 2019. "Vicki Bier: A More Sensible Way to View Risk," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 744-748, April.
    126. Liu, Yi & Chen, Xia & Zhuang, Jun & Dong, Yucheng, 2024. "Defensive resource allocation in terrorism conflict management based on graph model with relative preferences," Socio-Economic Planning Sciences, Elsevier, vol. 96(C).
    127. Eric DuBois & Ashley Peper & Laura A. Albert, 2023. "Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach," Decision Analysis, INFORMS, vol. 20(3), pages 202-219, September.
    128. Liu, Dehai & Xiao, Xingzhi & Li, Hongyi & Wang, Weiguo, 2015. "Historical evolution and benefit–cost explanation of periodical fluctuation in coal mine safety supervision: An evolutionary game analysis framework," European Journal of Operational Research, Elsevier, vol. 243(3), pages 974-984.
    129. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
    130. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    131. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    132. Hamid Mohtadi & Bryan S. Weber, 2021. "Catastrophe And Rational Policy: Case Of National Security," Economic Inquiry, Western Economic Association International, vol. 59(1), pages 140-161, January.
    133. Scott Farrow, 2015. "A comparison of key benefit estimation issues for natural hazards and terrorism: ex ante/ex post valuation and endogenous risk," Chapters, in: Carol Mansfield & V. K. Smith (ed.), Benefit–Cost Analyses for Security Policies, chapter 6, pages 140-154, Edward Elgar Publishing.
    134. Edward H. Kaplan & Moshe Kress & Roberto Szechtman, 2010. "Confronting Entrenched Insurgents," Operations Research, INFORMS, vol. 58(2), pages 329-341, April.
    135. Askeland, Tore & Flage, Roger & Aven, Terje, 2017. "Moving beyond probabilities – Strength of knowledge characterisations applied to security," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 196-205.
    136. Daniel Seaberg & Laura Devine & Jun Zhuang, 2017. "A review of game theory applications in natural disaster management research," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(3), pages 1461-1483, December.
    137. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    138. Amanda Melendez & David Caballero-Russi & Mariantonieta Gutierrez Soto & Luis Felipe Giraldo, 2022. "Computational models of community resilience," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 111(2), pages 1121-1152, March.
    139. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    140. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    141. Jun Zhuang & Gregory Saxton & Han Wu, 2014. "Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors," Annals of Operations Research, Springer, vol. 221(1), pages 469-491, October.
    142. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
    143. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    144. W. Matthew Carlyle & Shane G. Henderson & Roberto Szechtman, 2011. "Allocating capacity in parallel queues to improve their resilience to deliberate attack," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(8), pages 731-742, December.
    145. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    146. David L. Alderson & Gerald G. Brown & W. Matthew Carlyle, 2015. "Operational Models of Infrastructure Resilience," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 562-586, April.
    147. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
    148. Losada, Chaya & Scaparra, M. Paola & O’Hanley, Jesse R., 2012. "Optimizing system resilience: A facility protection model with recovery time," European Journal of Operational Research, Elsevier, vol. 217(3), pages 519-530.
    149. Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
    150. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    151. Andrew Samuel & Seth D. Guikema, 2012. "Resource Allocation for Homeland Defense: Dealing with the Team Effect," Decision Analysis, INFORMS, vol. 9(3), pages 238-252, September.
    152. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
    153. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    154. Asma Ben Yaghlane & Mohamed Naceur Azaiez, 2019. "System survivability to continuous attacks: A game theoretic setting for constant attack rate processes," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(8), pages 1308-1320, August.
    155. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    156. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    157. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
    158. Yanling Chang & Alan Erera & Chelsea White, 2015. "A leader–follower partially observed, multiobjective Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 103-128, December.
    159. Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.
    160. Andres F. Jola‐Sanchez, 2022. "How does warfare affect firms' productivity?," Production and Operations Management, Production and Operations Management Society, vol. 31(5), pages 1940-1962, May.
    161. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    162. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    163. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    164. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

  76. Peng, Xuehua & Marchant, Mary A. & Qin, Xiang Dong & Zhuang, Jun, 2005. "Chinese Consumers' Preferences for Livestock Products," International Food and Agribusiness Management Review, International Food and Agribusiness Management Association, vol. 8(4), pages 1-15.
    See citations under working paper version above.

Chapters

  1. Xiaowen Wang & Cen Song & Jun Zhuang, 2015. "Simulating a Multi-Stage Screening Network: A Queueing Theory and Game Theory Application," Springer Series in Reliability Engineering, in: Kjell Hausken & Jun Zhuang (ed.), Game Theoretic Analysis of Congestion, Safety and Security, edition 127, pages 55-80, Springer.

    Cited by:

    1. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.

  2. Kjell Hausken & Vicki M. Bier & Jun Zhuang, 2009. "Defending Against Terrorism, Natural Disaster, and All Hazards," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 4, pages 65-97, Springer.

    Cited by:

    1. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    2. David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
    3. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    4. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    5. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    6. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    7. David Iliaev & Sigal Oren & Ella Segev, 2023. "A Tullock-contest-based approach for cyber security investments," Annals of Operations Research, Springer, vol. 320(1), pages 61-84, January.
    8. Mohsen Golalikhani & Jun Zhuang, 2011. "Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers," Risk Analysis, John Wiley & Sons, vol. 31(4), pages 533-547, April.
    9. Yao Zhang & Hoang Pham, 2016. "Reliability and Maintenance of the Surveillance Systems Considering Two Dependent Processes," Springer Series in Reliability Engineering, in: Hoang Pham (ed.), Quality and Reliability Management and Its Applications, pages 277-306, Springer.
    10. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    11. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    12. Ha Hwang & JiYoung Park, 2019. "The Game-Theoretic National Interstate Economic Model: Economically Optimizing U.S. Aviation Security Policies Against Terrorist Attacks," Advances in Spatial Science, in: Yasuhide Okuyama & Adam Rose (ed.), Advances in Spatial and Economic Modeling of Disaster Impacts, chapter 0, pages 399-421, Springer.
    13. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    14. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    15. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    16. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    17. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    18. Ridwan Al Aziz & Meilin He & Jun Zhuang, 2020. "An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1481-1506, July.
    19. Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
    20. Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
    21. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    22. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    23. Yang Yang & Adam R. Pah & Brian Uzzi, 2019. "Quantifying the future lethality of terror organizations," Proceedings of the National Academy of Sciences, Proceedings of the National Academy of Sciences, vol. 116(43), pages 21463-21468, October.
    24. Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
    25. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    26. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    27. Di Wu & Xiangbin Yan & Rui Peng & Shaomin Wu, 2020. "Optimal defence-attack strategies between one defender and two attackers," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 71(11), pages 1830-1846, November.
    28. Subhayu Bandyopadhyay & Todd Sandler, 2020. "Counterterrorism Policy: Spillovers, Regime Stability, and Corner Solutions," Working Papers 2020-015, Federal Reserve Bank of St. Louis.
    29. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    30. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    31. Chen, Chao & Yang, Ming & Reniers, Genserik, 2021. "A dynamic stochastic methodology for quantifying HAZMAT storage resilience," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
    32. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    33. Yupo Chan, 2015. "Network Throughput and Reliability: Preventing Hazards and Attacks Through Gaming—Part 2: A Research Agenda," Springer Series in Reliability Engineering, in: Kjell Hausken & Jun Zhuang (ed.), Game Theoretic Analysis of Congestion, Safety and Security, edition 127, pages 141-172, Springer.
    34. Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
    35. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    36. Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
    37. Yupo Chan, 2015. "Network Throughput and Reliability: Preventing Hazards and Attacks Through Gaming—Part I: Modeling," Springer Series in Reliability Engineering, in: Kjell Hausken & Jun Zhuang (ed.), Game Theoretic Analysis of Congestion, Safety and Security, edition 127, pages 113-139, Springer.
    38. Chen, Chao & Reniers, Genserik & Khakzad, Nima, 2019. "Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: A dynamic graph approach," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    39. Gregory Levitin & Kjell Hausken, 2012. "Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 304-318, February.
    40. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    41. Gregory Levitin & Kjell Hausken, 2010. "Resource Distribution in Multiple Attacks Against a Single Target," Risk Analysis, John Wiley & Sons, vol. 30(8), pages 1231-1239, August.
    42. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    43. Daniel Seaberg & Laura Devine & Jun Zhuang, 2017. "A review of game theory applications in natural disaster management research," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(3), pages 1461-1483, December.
    44. Amanda Melendez & David Caballero-Russi & Mariantonieta Gutierrez Soto & Luis Felipe Giraldo, 2022. "Computational models of community resilience," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 111(2), pages 1121-1152, March.
    45. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    46. Chen Wang & Vicki M. Bier, 2016. "Quantifying Adversary Capabilities to Inform Defensive Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 756-775, April.
    47. Oded Berman & Arieh Gavious & Rongbing Huang, 2011. "Location of response facilities: a simultaneous game between state and terrorist," International Journal of Operational Research, Inderscience Enterprises Ltd, vol. 10(1), pages 102-120.
    48. Bricha, Naji & Nourelfath, Mustapha, 2013. "Critical supply network protection against intentional attacks: A game-theoretical model," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 1-10.
    49. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    50. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.

Books

  1. Kjell Hausken & Jun Zhuang (ed.), 2015. "Game Theoretic Analysis of Congestion, Safety and Security," Springer Series in Reliability Engineering, Springer, edition 127, number 978-3-319-11674-7, February.

    Cited by:

    1. Nogal, Maria & O'Connor, Alan & Caulfield, Brian & Martinez-Pastor, Beatriz, 2016. "Resilience of traffic networks: From perturbation to recovery via a dynamic restricted equilibrium model," Reliability Engineering and System Safety, Elsevier, vol. 156(C), pages 84-96.
    2. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    3. R. Piccinelli & G. Sansavini & R. Lucchetti & E. Zio, 2017. "A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2182-2190, November.
    4. Li, Yongli & Gao, Xin & Xu, Zhiwei & Zhou, Xuanrui, 2018. "Network-based queuing model for simulating passenger throughput at an airport security checkpoint," Journal of Air Transport Management, Elsevier, vol. 66(C), pages 13-24.
    5. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    6. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.
    7. Hansen, Mark & Liu, Yi, 2015. "Airline competition and market frequency: A comparison of the s-curve and schedule delay models," Transportation Research Part B: Methodological, Elsevier, vol. 78(C), pages 301-317.

  2. Kjell Hausken & Jun Zhuang (ed.), 2015. "Game Theoretic Analysis of Congestion, Safety and Security," Springer Series in Reliability Engineering, Springer, edition 127, number 978-3-319-13009-5, February.

    Cited by:

    1. Nogal, Maria & O'Connor, Alan & Caulfield, Brian & Martinez-Pastor, Beatriz, 2016. "Resilience of traffic networks: From perturbation to recovery via a dynamic restricted equilibrium model," Reliability Engineering and System Safety, Elsevier, vol. 156(C), pages 84-96.
    2. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    3. R. Piccinelli & G. Sansavini & R. Lucchetti & E. Zio, 2017. "A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2182-2190, November.
    4. Li, Yongli & Gao, Xin & Xu, Zhiwei & Zhou, Xuanrui, 2018. "Network-based queuing model for simulating passenger throughput at an airport security checkpoint," Journal of Air Transport Management, Elsevier, vol. 66(C), pages 13-24.
    5. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    6. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.
    7. Hansen, Mark & Liu, Yi, 2015. "Airline competition and market frequency: A comparison of the s-curve and schedule delay models," Transportation Research Part B: Methodological, Elsevier, vol. 78(C), pages 301-317.

IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.