IDEAS home Printed from https://ideas.repec.org/r/bes/jnlasa/v104i486y2009p841-854.html
   My bibliography  Save this item

Adversarial Risk Analysis

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as


Cited by:

  1. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
  2. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
  3. Jorge González-Ortega & Refik Soyer & David Ríos Insua & Fabrizio Ruggeri, 2021. "An Adversarial Risk Analysis Framework for Batch Acceptance Problems," Decision Analysis, INFORMS, vol. 18(1), pages 25-40, March.
  4. David Banks & Yi Guo, 2022. "Uncommon Knowledge in Multiparty Auctions," Decision Analysis, INFORMS, vol. 19(3), pages 220-228, September.
  5. Guikema, S.D. & Aven, T., 2010. "Is ALARP applicable to the management of terrorist risks?," Reliability Engineering and System Safety, Elsevier, vol. 95(8), pages 823-827.
  6. Si Liu & David Ríos Insua, 2020. "Group Decision Making with Affective Features," Group Decision and Negotiation, Springer, vol. 29(5), pages 843-869, October.
  7. E. S. Levine, 2012. "Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 294-303, February.
  8. Agarwal, Puneet & Aziz, Ridwan Al & Zhuang, Jun, 2022. "Interplay of rumor propagation and clarification on social media during crisis events - A game-theoretic approach," European Journal of Operational Research, Elsevier, vol. 298(2), pages 714-733.
  9. David J. Caswell & Ronald A. Howard & M. Elisabeth Paté-Cornell, 2011. "Analysis of National Strategies to Counter a Country's Nuclear Weapons Program," Decision Analysis, INFORMS, vol. 8(1), pages 30-45, March.
  10. Laura McLay & Casey Rothschild & Seth Guikema, 2012. "Robust Adversarial Risk Analysis: A Level- k Approach," Decision Analysis, INFORMS, vol. 9(1), pages 41-54, March.
  11. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
  12. Javier Cano & Alessandro Pollini & Lorenzo Falciani & Uğur Turhan, 2016. "Modeling current and emerging threats in the airport domain through adversarial risk analysis," Journal of Risk Research, Taylor & Francis Journals, vol. 19(7), pages 894-912, August.
  13. Antonio Pievatolo & Fabrizio Ruggeri & Refik Soyer & Simon Wilson, 2021. "Decisions in Risk and Reliability: An Explanatory Perspective," Stats, MDPI, vol. 4(2), pages 1-23, March.
  14. Caballero, William N. & Lunday, Brian J., 2019. "Influence modeling: Mathematical programming representations of persuasion under either risk or uncertainty," European Journal of Operational Research, Elsevier, vol. 278(1), pages 266-282.
  15. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
  16. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
  17. William M. Kroshl & Shahram Sarkani & Thomas A Mazzuchi, 2015. "Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent‐Based Simulation," Risk Analysis, John Wiley & Sons, vol. 35(9), pages 1690-1705, September.
  18. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
  19. Roponen, Juho & Ríos Insua, David & Salo, Ahti, 2020. "Adversarial risk analysis under partial information," European Journal of Operational Research, Elsevier, vol. 287(1), pages 306-316.
  20. Shouqiang Wang & David Banks, 2011. "Network routing for insurgency: An adversarial risk analysis framework," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(6), pages 595-607, September.
  21. J. S. Busby & B. Green & D. Hutchison, 2017. "Analysis of Affordance, Time, and Adaptation in the Assessment of Industrial Control System Cybersecurity Risk," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1298-1314, July.
  22. Juan Carlos Sevillano & David Rios Insua & Jesus Rios, 2012. "Adversarial Risk Analysis: The Somali Pirates Case," Decision Analysis, INFORMS, vol. 9(2), pages 86-95, June.
  23. Misuri, Alessio & Khakzad, Nima & Reniers, Genserik & Cozzani, Valerio, 2019. "A Bayesian network methodology for optimal security management of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
  24. Miguel A. Lejeune, 2012. "Game Theoretical Approach for Reliable Enhanced Indexation," Decision Analysis, INFORMS, vol. 9(2), pages 146-155, June.
  25. Michael Macgregor Perry & Hadi El-Amine, 2021. "Computational Efficiency in Multivariate Adversarial Risk Analysis Models," Papers 2110.12572, arXiv.org.
  26. Casey Rothschild & Laura McLay & Seth Guikema, 2012. "Adversarial Risk Analysis with Incomplete Information: A Level‐k Approach," Risk Analysis, John Wiley & Sons, vol. 32(7), pages 1219-1231, July.
  27. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
  28. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
  29. Fabrizio Baiardi & Daniele Sgandurra, 2013. "Assessing ICT risk through a Monte Carlo method," Environment Systems and Decisions, Springer, vol. 33(4), pages 486-499, December.
  30. Michael Perry & Hadi El-Amine, 2019. "Computational Efficiency in Multivariate Adversarial Risk Analysis Models," Decision Analysis, INFORMS, vol. 16(4), pages 314-332, December.
  31. Fabrizio Baiardi & Federico Tonelli & Alessandro Bertolini, 2015. "Iterative selection of countermeasures for intelligent threat agents," International Journal of Network Management, John Wiley & Sons, vol. 25(5), pages 340-354, September.
  32. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
  33. César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
  34. Velu, C. & Iyer, S. & Gair, J.R., 2010. "A Reason for Unreason: Returns-Based Beliefs in Game Theory," Cambridge Working Papers in Economics 1058, Faculty of Economics, University of Cambridge.
  35. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
  36. David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
  37. Muhammad Ejaz & Nisho Rani & Muhammad Ramzan Sheikh, 2023. "First Price Sealed-Bid Auctions with Bidders’ Heterogeneous Risk Behavior: An Adversarial Risk Analysis Approach," Decision Analysis, INFORMS, vol. 20(3), pages 231-241, September.
  38. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
  39. Yaghlane, Asma Ben & Azaiez, M. Naceur & Mrad, Mehdi, 2019. "System survivability in the context of interdiction networks," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 362-371.
  40. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
  41. David Rios Insua & Roi Naveiro & Victor Gallego, 2020. "Perspectives on Adversarial Classification," Mathematics, MDPI, vol. 8(11), pages 1-21, November.
  42. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
  43. Zhengqiu Zhu & Bin Chen & Sihang Qiu & Rongxiao Wang & Feiran Chen & Yiping Wang & Xiaogang Qiu, 2018. "An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries," IJERPH, MDPI, vol. 15(4), pages 1-20, March.
  44. William N. Caballero & Ethan Gharst & David Banks & Jeffery D. Weir, 2023. "Multipolar Security Cooperation Planning: A Multiobjective, Adversarial-Risk-Analysis Approach," Decision Analysis, INFORMS, vol. 20(1), pages 16-39, March.
  45. González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
  46. Ríos Insua, David & Ruggeri, Fabrizio & Soyer, Refik & Rasines, Daniel G., 2018. "Adversarial issues in reliability," European Journal of Operational Research, Elsevier, vol. 266(3), pages 1113-1119.
  47. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
  48. G. Quijano, Eduardo & Ríos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
  49. Salo, Ahti & Andelmin, Juho & Oliveira, Fabricio, 2022. "Decision programming for mixed-integer multi-stage optimization under uncertainty," European Journal of Operational Research, Elsevier, vol. 299(2), pages 550-565.
  50. Jasmin Wachter & Stefan Rass & Sandra König, 2018. "Security from the Adversary’s Inertia–Controlling Convergence Speed When Playing Mixed Strategy Equilibria," Games, MDPI, vol. 9(3), pages 1-15, August.
  51. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
  52. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
  53. Muhammad Ejaz & Stephen Joe & Chaitanya Joshi, 2021. "Adversarial Risk Analysis for Auctions Using Mirror Equilibrium and Bayes Nash Equilibrium," Decision Analysis, INFORMS, vol. 18(3), pages 185-202, September.
  54. Stefan Rass & Sandra König & Stefan Schauer, 2017. "Defending Against Advanced Persistent Threats Using Game-Theory," PLOS ONE, Public Library of Science, vol. 12(1), pages 1-43, January.
  55. Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
  56. Javier Cano & David Ríos Insua & Alessandra Tedeschi & Ug̃ur Turhan, 2016. "Security economics: an adversarial risk analysis approach to airport protection," Annals of Operations Research, Springer, vol. 245(1), pages 359-378, October.
  57. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
  58. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
  59. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.