My bibliography
Save this item
Allocating Defensive Resources with Private Information about Vulnerability
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Baumann, Florian & Friehe, Tim, 2013.
"Private protection against crime when property value is private information,"
International Review of Law and Economics, Elsevier, vol. 35(C), pages 73-79.
- Florian Baumann & Tim Friehe, 2012. "Private Protection against Crime when Property Value is Private Information," CESifo Working Paper Series 3888, CESifo.
- Baumann, Florian & Friehe, Tim, 2013. "Private protection against crime when property value is private information," DICE Discussion Papers 91, Heinrich Heine University Düsseldorf, Düsseldorf Institute for Competition Economics (DICE).
- Hadi Yektaş & Magnus Hoffmann & Friedhelm Hentschel & Roland Hodler, 2019.
"Wars of Conquest and Independence,"
Journal of Institutional and Theoretical Economics (JITE), Mohr Siebeck, Tübingen, vol. 175(4), pages 617-640.
- Roland Hodler & Hadi Yektas, 2013. "Wars of Conquest and Independence," CESifo Working Paper Series 4282, CESifo.
- Hentschel, Friedhelm & Hodler, Roland & Yektas, Hadi, 2015. "Wars of Conquest and Independence," Economics Working Paper Series 1516, University of St. Gallen, School of Economics and Political Science.
- Thiemo Fetzer & Pedro C. L. Souza & Oliver Vanden Eynde & Austin L. Wright, 2021.
"Security Transitions,"
American Economic Review, American Economic Association, vol. 111(7), pages 2275-2308, July.
- Fetzer, Thiemo & Souza, Pedro CL & Eynde, Oliver Vanden & Wright, Austin L., 2018. "Security Transitions," CAGE Online Working Paper Series 383, Competitive Advantage in the Global Economy (CAGE).
- Thiemo Fetzer & Pedro Cl Souza & Oliver Vanden Eynde & Austin Wright, 2021. "Security Transitions," PSE-Ecole d'économie de Paris (Postprint) halshs-03342741, HAL.
- Thiemo Fetzer & Pedro Cl Souza & Oliver Vanden Eynde & Austin L Wright, 2020. "Security Transitions," Working Papers halshs-02518234, HAL.
- Thiemo Fetzer & Pedro Cl Souza & Oliver Vanden Eynde & Austin L Wright, 2020. "Security Transitions," PSE Working Papers halshs-02518234, HAL.
- Thiemo Fetzer & Pedro CL Souza & Oliver Vanden Eynde & Austin L. Wright, 2020. "Security Transitions," Working Papers 2020-176, Becker Friedman Institute for Research In Economics.
- Fetzer, Thiemo & Vanden Eynde, Oliver & Wright, Austin L., 2018. "Security Transitions," The Warwick Economics Research Paper Series (TWERPS) 1171, University of Warwick, Department of Economics.
- Fetzer, Thiemo & Vanden Eynde, Oliver & Souza, Pedro CL & Wright, Austin L., 2020. "Security Transitions," CEPR Discussion Papers 15527, C.E.P.R. Discussion Papers.
- Thiemo Fetzer & Pedro Cl Souza & Oliver Vanden Eynde & Austin Wright, 2021. "Security Transitions," Post-Print halshs-03342741, HAL.
- Philipp Denter & Dana Sisak, 2015. "The fragility of deterrence in conflicts," Journal of Theoretical Politics, , vol. 27(1), pages 43-57, January.
- Noam Goldberg, 2017. "Non‐zero‐sum nonlinear network path interdiction with an application to inspection in terror networks," Naval Research Logistics (NRL), John Wiley & Sons, vol. 64(2), pages 139-153, March.
- Nakao, Keisuke, 2017. "Denial vs. Punishment: Strategies Shape War, but War Itself Affects Strategies," MPRA Paper 81418, University Library of Munich, Germany.
- Christian Ewerhart & Dan Kovenock, 2019.
"A Class of N-player Colonel Blotto games with multidimensional private information,"
ECON - Working Papers
336, Department of Economics - University of Zurich, revised Feb 2021.
- Christian Ewerhart & Dan Kovenock, 2019. "A Class of N-Player Colonel Blotto Games with Multidimensional Private Information," Working Papers 19-29, Chapman University, Economic Science Institute.
- Christian Ewerhart & Dan Kovenock, 2021. "A Class of N-Player Colonel Blotto Games With Multidimensional Private Information," Working Papers 21-01, Chapman University, Economic Science Institute.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019.
"The attack and defense of weakest-link networks,"
Public Choice, Springer, vol. 179(3), pages 175-194, June.
- Dan Kovenock J. & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," CESifo Working Paper Series 3211, CESifo.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2017. "The Attack and Defense of Weakest-Link Networks," Working Papers 17-19, Chapman University, Economic Science Institute.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
- Kovenock, Dan & Roberson, Brian & Sheremeta, Roman, 2018. "The attack and defense of weakest-link networks," MPRA Paper 89292, University Library of Munich, Germany.
- Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
- Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
- Baumann, Florian & Denter, Philipp & Friehe, Tim, 2013. "Hide or show? Endogenous observability of private precautions against crime when property value is private information," DICE Discussion Papers 115, Heinrich Heine University Düsseldorf, Düsseldorf Institute for Competition Economics (DICE).
- Dziubiński, Marcin & Goyal, Sanjeev, 2013. "Network design and defence," Games and Economic Behavior, Elsevier, vol. 79(C), pages 30-43.
- Dan Kovenock & Brian Roberson, 2015.
"The Optimal Defense of Network Connectivity,"
Working Papers
15-24, Chapman University, Economic Science Institute.
- Dan J. Kovenock & Brian Roberson, 2015. "The Optimal Defense of Network Connectivity," CESifo Working Paper Series 5653, CESifo.
- Timothy Mathews & Aniruddha Bagchi & João Ricardo Faria, 2019. "Simple analytics of the impact of terror generation on attacker–defender interactions," Public Choice, Springer, vol. 179(3), pages 287-299, June.
- Dan Kovenock & Brian Roberson, 2018.
"The Optimal Defense Of Networks Of Targets,"
Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Dan Kovenock & Brian Roberson, 2017. "The Optimal Defense of Networks of Targets," Working Papers 17-18, Chapman University, Economic Science Institute.
- Sanghoon Lee, 2010. "Dynamic Inconsistency in Counterterrorism," Conflict Management and Peace Science, Peace Science Society (International), vol. 27(4), pages 369-385, September.
- Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
- Jie Xu & Jun Zhuang, 2016.
"Modeling costly learning and counter-learning in a defender-attacker game with private defender information,"
Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
- Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
- Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
- Thomas Gries & Claus-Jochen Haake, 2016. "An Economic Theory of 'Destabilization War'," Working Papers CIE 95, Paderborn University, CIE Center for International Economics.
- Deutsch, Yael, 2021. "A polynomial-time method to compute all Nash equilibria solutions of a general two-person inspection game," European Journal of Operational Research, Elsevier, vol. 288(3), pages 1036-1052.
- Gries, Thomas & Haake, Claus-Jochen, 2016. "An Economic Theory of 'Destabilization War' '- Compromise for Peace versus Conventional, Guerilla, or Terrorist Warfare," VfS Annual Conference 2016 (Augsburg): Demographic Change 145617, Verein für Socialpolitik / German Economic Association.
- Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
- Denter, Philipp, 2013. "A theory of communication in political campaigns," Economics Working Paper Series 1302, University of St. Gallen, School of Economics and Political Science.
- Eric D. Gould & Esteban F. Klor, 2010.
"Does Terrorism Work?,"
The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 125(4), pages 1459-1510.
- Eric D. Gould & Esteban F. Klor, 2009. "Does Terrorism Work?," Economics of Security Working Paper Series 12, DIW Berlin, German Institute for Economic Research.
- Eric D. Gould & Esteban F. Klor, 2009. "Does Terrorism Work?," HiCN Working Papers 67, Households in Conflict Network.
- Gould, Eric & Klor, Esteban, 2009. "Does Terrorism Work?," CEPR Discussion Papers 7589, C.E.P.R. Discussion Papers.
- Thomas Jensen, 2012. "National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision," Discussion Papers 12-22, University of Copenhagen. Department of Economics.
- Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
- Tiberiu Dragu & Mattias Polborn, 2009. "Terrorism Prevention and Electoral Accountability," CESifo Working Paper Series 2864, CESifo.
- Jenelius, Erik & Westin, Jonas & Holmgren, Åke J., 2010. "Critical infrastructure protection under imperfect attacker perception," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 16-26.
- Jun Zhuang & Vicki M. Bier, 2010. "Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1737-1743, December.
- Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
- Meyer Sunniva F., 2011. "Preventing Mass Killings: Determining the Optimal Allocation of Security Resources between Crowded Targets," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 17(1), pages 1-37, September.
- Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Jaspersen, Johannes G. & Montibeller, Gilberto, 2020. "On the learning patterns and adaptive behavior of terrorist organizations," European Journal of Operational Research, Elsevier, vol. 282(1), pages 221-234.
- Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
- Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
- Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
- Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
- Nakao, Keisuke, 2019. "Modeling Deterrence by Denial and by Punishment," MPRA Paper 95100, University Library of Munich, Germany.
- Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.