{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T14:31:13Z","timestamp":1759847473231},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,5,25]],"date-time":"2014-05-25T00:00:00Z","timestamp":1400976000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1007\/s10207-014-0245-x","type":"journal-article","created":{"date-parts":[[2014,5,24]],"date-time":"2014-05-24T14:56:34Z","timestamp":1400943394000},"page":"61-72","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A multiresolution approach for optimal defense against random attacks"],"prefix":"10.1007","volume":"14","author":[{"given":"Michael","family":"Valenzuela","sequence":"first","affiliation":[]},{"given":"Ferenc","family":"Szidarovszky","sequence":"additional","affiliation":[]},{"given":"Jerzy","family":"Rozenblit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,25]]},"reference":[{"key":"245_CR1","doi-asserted-by":"crossref","unstructured":"Azaiez, M., Bier, V.M.: Optimal resource allocation for security in reliability systems. Eur. J. Oper. Res. 181(2), 773\u2013786 (2007). doi: 10.1016\/j.ejor.2006.03.057 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0377221706004747","DOI":"10.1016\/j.ejor.2006.03.057"},{"key":"245_CR2","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/0-387-35209-0_3","volume-title":"Statistical Methods in Counterterrorism","author":"V Bier","year":"2006","unstructured":"Bier, V.: Game-theoretic and reliability methods in counterterrorism and security. In: Wilson, G.A., Wilson, D.G., Olwell, D.H. (eds.) Statistical Methods in Counterterrorism, pp. 23\u201340. Springer, New York (2006)"},{"issue":"4","key":"245_CR3","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1111\/j.1467-9779.2007.00320.x","volume":"9","author":"V Bier","year":"2007","unstructured":"Bier, V., Oliveros, S., Samuelson, L.: Choosing what to protect: strategic defensive allocation against an unknown attacker. J. Public Econ. Theory 9(4), 563\u2013587 (2007). doi: 10.1111\/j.1467-9779.2007.00320.x","journal-title":"J. Public Econ. Theory"},{"key":"245_CR4","doi-asserted-by":"crossref","unstructured":"Bier, V.M., Nagaraj, A., Abhichandani, V.: Protection of simple series and parallel systems with components of different values. Reliab. Eng. Syst. Saf. 87(3), 315\u2013323 (2005). doi: 10.1016\/j.ress.2004.06.003 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0951832004001309","DOI":"10.1016\/j.ress.2004.06.003"},{"issue":"1","key":"245_CR5","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1137\/110858525","volume":"11","author":"D Brown","year":"2013","unstructured":"Brown, D., Efendiev, Y., Hoang, V.: An efficient hierarchical multiscale finite element method for stokes equations in slowly varying media. Multiscale Model. Simul. 11(1), 30\u201358 (2013). doi: 10.1137\/110858525","journal-title":"Multiscale Model. Simul."},{"issue":"8","key":"245_CR6","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MC.2008.295","volume":"41","author":"L Carin","year":"2008","unstructured":"Carin, L., Cybenko, G., Hughes, J.: Cybersecurity strategies: the queries methodology. Computer 41(8), 20\u201326 (2008). doi: 10.1109\/MC.2008.295","journal-title":"Computer"},{"key":"245_CR7","unstructured":"Drewry, D.T., Reynolds, P.F., Emanuel, W.R.: An optimization-based multi-resolution simulation methodology.In: Winter Simulation Conference. San Diego, California, USA (2002)"},{"key":"245_CR8","first-page":"111","volume-title":"1999 STAR Proc. Eurographics","author":"M Garland","year":"1999","unstructured":"Garland, M.: Multiresolution modeling: survey & future opportunities. In: Seidel, H.P., Coquillart, S. (eds.) 1999 STAR Proc. Eurographics, pp. 111\u2013131. Eurographics Association, Milano, Italy (1999)"},{"key":"245_CR9","volume-title":"Deterrence in American Foreign Policy: Theory and practice, Chap. 1","author":"AL George","year":"1974","unstructured":"George, A.L., Smoke, R.: Deterrence in American Foreign Policy: Theory and practice, Chap. 1. Columbia University Press, New York (1974)"},{"issue":"1","key":"245_CR10","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1287\/opre.1110.1002","volume":"60","author":"B Golany","year":"2012","unstructured":"Golany, B., Kress, M., Penn, M., Rothblum, U.G.: Network optimization models for resource allocation in developing military countermeasures. Oper. Res. 60(1), 48\u201363 (2012). doi: 10.1287\/opre.1110.1002","journal-title":"Oper. Res."},{"issue":"2","key":"245_CR11","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1002\/nav.21477","volume":"59","author":"B Golany","year":"2012","unstructured":"Golany, B., Kress, M., Penn, M., Rothblum, U.G.: Resource allocation in an asymmetric technology race with temporary advantages. Nav. Res. Logist. (NRL) 59(2), 128\u2013145 (2012). doi: 10.1002\/nav.21477","journal-title":"Nav. Res. Logist. (NRL)"},{"issue":"1","key":"245_CR12","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s00371-012-0675-2","volume":"29","author":"P Goswami","year":"2013","unstructured":"Goswami, P., Erol, F., Mukhi, R., Pajarola, R., Gobbetti, E.: An efficient multi-resolution framework for high quality interactive rendering of massive point clouds using multi-way kd-trees. Vis. Comput. 29(1), 69\u201383 (2013). doi: 10.1007\/s00371-012-0675-2","journal-title":"Vis. Comput."},{"issue":"1","key":"245_CR13","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1111\/0272-4332.t01-1-00002","volume":"22","author":"K Hausken","year":"2002","unstructured":"Hausken, K.: Probabilistic risk analysis and game theory. Risk Anal. 22(1), 17\u201327 (2002). doi: 10.1111\/0272-4332.t01-1-00002","journal-title":"Risk Anal."},{"key":"245_CR14","unstructured":"Hausken, K.: Strategic defense and attack for series and parallel reliability systems: simultaneous moves by defender and attacker. Tech. Rep. 6, University of Stavanger, N-4036 Stavanger, Norway (2007)"},{"key":"245_CR15","doi-asserted-by":"crossref","unstructured":"Hausken, K.: Strategic defense and attack for reliability systems. Reliab. Eng. Syst. Saf. 93(11), 1740\u20131750 (2008). doi: 10.1016\/j.ress.2007.11.002 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0951832007002578","DOI":"10.1016\/j.ress.2007.11.002"},{"key":"245_CR16","doi-asserted-by":"crossref","unstructured":"Hausken, K.: Strategic defense and attack for series and parallel reliability systems. Eur. J. Oper. Res. 186(2), 856\u2013881 (2008). doi: 10.1016\/j.ejor.2007.02.013 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0377221707002214","DOI":"10.1016\/j.ejor.2007.02.013"},{"issue":"1","key":"245_CR17","first-page":"13","volume":"5","author":"K Hausken","year":"2009","unstructured":"Hausken, K.: Strategic defense and attack of complex networks. Int. J. Perform. Eng. 5(1), 13\u201330 (2009)","journal-title":"Int. J. Perform. Eng."},{"key":"245_CR18","doi-asserted-by":"crossref","unstructured":"Hausken, K.: Defense and attack of complex and dependent systems. Reliab. Eng. Syst. Saf. 95(1), 29\u201342 (2010). doi: 10.1016\/j.ress.2009.07.006 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0951832009001914","DOI":"10.1016\/j.ress.2009.07.006"},{"issue":"3","key":"245_CR19","first-page":"205","volume":"7","author":"K Hausken","year":"2011","unstructured":"Hausken, K.: Defense and attack of two-component multi-state systems. Int. J. Perform. Eng. 7(3), 205\u2013216 (2011)","journal-title":"Int. J. Perform. Eng."},{"key":"245_CR20","unstructured":"Hausken, K.: Protecting complex infrastructures against multiple strategic attackers. Int. J. Syst. Sci. 42, 11\u201329 (2011)"},{"issue":"7","key":"245_CR21","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1080\/0740817X.2010.541178","volume":"43","author":"K Hausken","year":"2011","unstructured":"Hausken, K.: Strategic defense and attack of series systems when agents move sequentially. IIE Trans. 43(7), 483\u2013504 (2011). doi: 10.1080\/0740817X.2010.541178","journal-title":"IIE Trans."},{"issue":"2","key":"245_CR22","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1016\/j.ejor.2010.12.013","volume":"211","author":"K Hausken","year":"2011","unstructured":"Hausken, K., Bier, V.M.: Defending against multiple different attackers. Eur. J. Oper. Res. 211(2), 370\u2013384 (2011)","journal-title":"Eur. J. Oper. Res."},{"key":"245_CR23","unstructured":"Hausken, K., Bier, V.M., Azaiez, M.N.: Defending against terrorism, natural disaster, and all hazards. In: Bier, V.M., Azaiez, M.N. (eds.) Game Theor. Risk Anal. of Secur. Threats, Int. Ser. Oper. Res. & Manag. Sci. chap. 4, vol. 128, pp. 1\u201333. Springer, New York (2009). doi: 10.1007\/978-0-387-87767-94"},{"issue":"5","key":"245_CR24","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1111\/j.1539-6924.2008.01090.x","volume":"28","author":"K Hausken","year":"2008","unstructured":"Hausken, K., Levitin, G.: Efficiency of even separation of parallel elements with variable contest intensity. Risk Anal. 28(5), 1477\u20131486 (2008). doi: 10.1111\/j.1539-6924.2008.01090.x","journal-title":"Risk Anal."},{"key":"245_CR25","doi-asserted-by":"crossref","unstructured":"Hausken, K., Levitin, G.: Minmax defense strategy for complex multi-state systems. Reliab. Eng. Syst. Saf. 94(2), 577\u2013587 (2009). doi: 10.1016\/j.ress.2008.06.005 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0951832008001841","DOI":"10.1016\/j.ress.2008.06.005"},{"key":"245_CR26","doi-asserted-by":"crossref","unstructured":"Hausken, K., Levitin, G.: Protection vs. false targets in series systems. Reliab. Eng. Syst. Saf. 94(5), 973\u2013981 (2009). doi: 10.1016\/j.ress.2008.11.003 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0951832008002664","DOI":"10.1016\/j.ress.2008.11.003"},{"issue":"1","key":"245_CR27","first-page":"54","volume":"1","author":"K Hausken","year":"2009","unstructured":"Hausken, K., Levitin, G.: Protection vs. separation in parallel non-homogeneous systems. Int. J. Reliab. Qual. Perform. 1(1), 54\u201365 (2009)","journal-title":"Int. J. Reliab. Qual. Perform."},{"issue":"3","key":"245_CR28","first-page":"171","volume":"224","author":"K Hausken","year":"2010","unstructured":"Hausken, K., Levitin, G.: Defence of homogeneous parallel multi-state systems subject to two sequential attacks. Proc. Inst. Mech. Eng. Part O J. Risk Reliab. 224(3), 171\u2013183 (2010)","journal-title":"Proc. Inst. Mech. Eng. Part O J. Risk Reliab."},{"issue":"4","key":"245_CR29","doi-asserted-by":"crossref","first-page":"355","DOI":"10.23940\/ijpe.12.4.p355.mag","volume":"8","author":"K Hausken","year":"2012","unstructured":"Hausken, K., Levitin, G.: Review of systems defense and attack models. Int. J. Perform. Eng. 8(4), 355\u2013366 (2012)","journal-title":"Int. J. Perform. Eng."},{"key":"245_CR30","doi-asserted-by":"crossref","unstructured":"Hausken, K., Zhuang, J.: Defending against a terrorist who accumulates resources. Mil. Oper. Res. 16(1), 21\u201339 (2011). doi: 10.5711\/1082598316121 . http:\/\/www.ingentaconnect.com\/content\/mors\/mor\/2011\/00000016\/00000001\/art00003","DOI":"10.5711\/1082598316121"},{"issue":"1","key":"245_CR31","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1287\/deca.1100.0194","volume":"8","author":"K Hausken","year":"2011","unstructured":"Hausken, K., Zhuang, J.: Governments\u2019 and terrorists\u2019 defense and attack in a t-period game. Decis. Anal. 8(1), 46\u201370 (2011). doi: 10.1287\/deca.1100.0194","journal-title":"Decis. Anal."},{"issue":"6","key":"245_CR32","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1057\/jors.2011.79","volume":"63","author":"K Hausken","year":"2012","unstructured":"Hausken, K., Zhuang, J.: The timing and deterrence of terrorist attacks due to exogenous dynamics. J. Oper. Res. Soc. 63(6), 725\u2013726 (2012). doi: 10.1057\/jors.2011.79","journal-title":"J. Oper. Res. Soc."},{"key":"245_CR33","doi-asserted-by":"crossref","unstructured":"Hsu, S.P., Arapostathis, A.: Competitive markov decision processes with partial observation. In: 2004 IEEE Int. Conf. Syst. Man & Cybern., vol. 1, pp. 236\u2013241. The Hague, The Netherlands (2004). doi: 10.1109\/ICSMC.2004.1398303","DOI":"10.1109\/ICSMC.2004.1398303"},{"key":"245_CR34","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/0-387-25486-2_2","volume-title":"Column Generation","author":"S Irnich","year":"2005","unstructured":"Irnich, S., Desaulniers, G.: Shortest path problems with resource constraints. In: Desaulniers, G., Desrosiers, J., Solomon, M. (eds.) Column Generation, pp. 33\u201365. Springer, US (2005). doi: 10.1007\/0-387-25486-22"},{"key":"245_CR35","doi-asserted-by":"crossref","unstructured":"Jia, H., Skaperdas, S., Vaidya, S.: Contest functions: theoretical foundations and issues in estimation. Int. J. Ind. Organ. 31(3), 211\u2013222 (2013). doi: 10.1016\/j.ijindorg.2012.06.007 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167718712000811","DOI":"10.1016\/j.ijindorg.2012.06.007"},{"key":"245_CR36","doi-asserted-by":"crossref","unstructured":"Kobbelt, L., Campagna, S., Vorsatz, J., Seidel, H.P.: Interactive multi-resolution modeling on arbitrary meshes. In: Proc. the 25th Annual Conf. on Comput. Graph. and Interact. tech., SIGGRAPH \u201998, pp. 105\u2013114. ACM, New York (1998). doi: 10.1145\/280814.280831","DOI":"10.1145\/280814.280831"},{"issue":"1","key":"245_CR37","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/TR.2006.884599","volume":"56","author":"G Levitin","year":"2007","unstructured":"Levitin, G.: Optimal defense strategy against intentional attacks. IEEE Trans. Reliab. 56(1), 148\u2013157 (2007). doi: 10.1109\/TR.2006.884599","journal-title":"IEEE Trans. Reliab."},{"issue":"5","key":"245_CR38","first-page":"433","volume":"5","author":"G Levitin","year":"2009","unstructured":"Levitin, G.: False targets in defence strategies against intentional attacks. Int. J. Perform. Eng. 5(5), 433\u2013446 (2009)","journal-title":"Int. J. Perform. Eng."},{"issue":"1","key":"245_CR39","first-page":"45","volume":"5","author":"G Levitin","year":"2009","unstructured":"Levitin, G.: Optimal distribution of constrained resources in bi-contest detection-impact game. Int. J. Perform. Eng. 5(1), 45\u201354 (2009)","journal-title":"Int. J. Perform. Eng."},{"key":"245_CR40","first-page":"1","volume-title":"Game Theoretic Risk Analysis of Security Threats, International Series in Operations Research & Management Science","author":"G Levitin","year":"2009","unstructured":"Levitin, G.: Optimizing defense strategies for complex multi-state systems. In: Bier, V.M., Azaiez, M.N. (eds.) Game Theoretic Risk Analysis of Security Threats, International Series in Operations Research & Management Science, vol. 128, pp. 1\u201332. Springer, US (2009). doi: 10.1007\/978-0-387-87767-93"},{"key":"245_CR41","doi-asserted-by":"crossref","unstructured":"Levitin, G., Ben-Haim, H.: Importance of protections against intentional attacks. Reliab. Eng. Syst. Saf. 93(4), 639\u2013646 (2008). doi: 10.1016\/j.ress.2007.03.016 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0951832007001160","DOI":"10.1016\/j.ress.2007.03.016"},{"key":"245_CR42","doi-asserted-by":"crossref","unstructured":"Levitin, G., Hausken, K.: Protection vs. redundancy in homogeneous parallel systems. Reliab. Eng. Syst. Saf. 93(10), 1444\u20131451 (2008). doi: 10.1016\/j.ress.2007.10.007 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0951832007002530","DOI":"10.1016\/j.ress.2007.10.007"},{"key":"245_CR43","doi-asserted-by":"crossref","unstructured":"Levitin, G., Hausken, K.: Intelligence and impact contests in systems with redundancy, false targets, and partial protection. Reliab. Eng. Syst. Saf. 94(12), 1927\u20131941 (2009). doi: 10.1016\/j.ress.2009.06.010 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0951832009001616","DOI":"10.1016\/j.ress.2009.06.010"},{"key":"245_CR44","doi-asserted-by":"crossref","unstructured":"Levitin, G., Hausken, K.: Parallel systems under two sequential attacks. Reliab. Eng. Syst. Saf. 94(3), 763\u2013772 (2009). doi: 10.1016\/j.ress.2008.08.006 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0951832008002147","DOI":"10.1016\/j.ress.2008.08.006"},{"key":"245_CR45","doi-asserted-by":"crossref","unstructured":"Levitin, G., Hausken, K.: Separation in homogeneous systems with independent identical elements. Eur. J. Oper. Res. 203(3), 625\u2013634 (2010). doi: 10.1016\/j.ejor.2009.08.016 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S037722170900558X","DOI":"10.1016\/j.ejor.2009.08.016"},{"key":"245_CR46","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-74503-9","volume-title":"Linear and Nonlinear Programming, Int. Ser. Oper. Res. & Manag. Sci.","author":"DG Luenberger","year":"2008","unstructured":"Luenberger, D.G., Ye, Y.: Linear and Nonlinear Programming, Int. Ser. Oper. Res. & Manag. Sci., vol. 116. Springer Science+Business Media, LLC, New York (2008)"},{"key":"245_CR47","unstructured":"Luo, Y., Al-Nashif, Y., Szidarovszky, F., Hariri, S.: Game tree based partially observable stochastic game model for intrusion defense systems (IDS). In: IIE Annual Conf. & EXPO (IERC 2009). Miami (2009)"},{"key":"245_CR48","doi-asserted-by":"crossref","unstructured":"Luo, Y., Szidarovszky, F., Al-Nashif, Y., Hariri, S.: A game theory based risk and impact analysis method for intrusion defense systems. In: 2009 IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA), pp. 975\u2013982. IEEE (2009)","DOI":"10.1109\/AICCSA.2009.5069450"},{"key":"245_CR49","doi-asserted-by":"crossref","first-page":"41","DOI":"10.4236\/jis.2010.11005","volume":"1","author":"Y Luo","year":"2010","unstructured":"Luo, Y., Szidarovszky, F., Al-Nashif, Y., Hariri, S.: Game theory based network security. J. Inf. Secur. 1, 41\u201344 (2010)","journal-title":"J. Inf. Secur."},{"key":"245_CR50","unstructured":"Luo, Y., Szidarovszky, F., Al-Nashif, Y., Hariri, S.: A fictitious play approach for multi-stage intrusion defense systems. Int. J. Inf. Secur. (2011, in press)"},{"key":"245_CR51","unstructured":"Mansoor, P.: Linking doctrine to action: a new coin center-of-gravity analysis. Tech. rep, DTIC Document (2007)"},{"key":"245_CR52","doi-asserted-by":"crossref","unstructured":"Park, D., Ramanan, D., Fowlkes, C.: Multiresolution models for object detection. In: Comput. Vis.-ECCV 2010, pp. 241\u2013254. Springer, Berlin Heidelberg (2010)","DOI":"10.1007\/978-3-642-15561-1_18"},{"key":"245_CR53","doi-asserted-by":"crossref","unstructured":"Peng, R., Levitin, G., Xie, M., Ng, S.: Defending simple series and parallel systems with imperfect false targets. Reliab. Eng. Syst. Saf. 95(6), 679\u2013688 (2010). doi: 10.1016\/j.ress.2010.02.008 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0951832010000438","DOI":"10.1016\/j.ress.2010.02.008"},{"key":"245_CR54","doi-asserted-by":"crossref","unstructured":"Penrose, R., Todd, J.A.: On best approximate solutions of linear matrix equations. Math. Proc. Camb. Philos. Soc. 52, 17\u201319 (1956). doi: 10.1017\/S0305004100030929 . http:\/\/journals.cambridge.org\/article_S0305004100030929","DOI":"10.1017\/S0305004100030929"},{"key":"245_CR55","unstructured":"Raab, M., Steger, A.: \u201cBalls into bins\u201d\u2014a simple and tight analysis. In: Luby, M., Rolim, J.D., Serna, M. (eds.) Randomization and Approximation Techniques in Computer Science. Lecture Notes in Computer Science, vol. 1518, pp. 159\u2013170. Springer, Berlin Heidelberg (1998). doi: 10.1007\/3-540-49543-613"},{"issue":"3","key":"245_CR56","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1145\/259207.259235","volume":"7","author":"PF Reynolds Jr","year":"1997","unstructured":"Reynolds Jr, P.F., Natrajan, A., Srinivasan, S.: Consistency maintenance in multi-resolution simulations. ACM Trans. Model. Comput. Sim. 7(3), 368\u2013392 (1997). doi: 10.1145\/259207.259235","journal-title":"ACM Trans. Model. Comput. Sim."},{"key":"245_CR57","unstructured":"Samuelson, P.A.: The fundamental approximation theorem of portfolio analysis in terms of means, variances and higher moments. Rev. Econ. Stud. 37(4), 537\u2013542 (1970). http:\/\/www.jstor.org\/stable\/2296483"},{"issue":"2","key":"245_CR58","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1177\/0022002704272863","volume":"49","author":"T Sandler","year":"2005","unstructured":"Sandler, T., Arce, M.D.G.: Counterterrorism a game-theoretic analysis. J. Confl. Resolut. 49(2), 183\u2013200 (2005)","journal-title":"J. Confl. Resolut."},{"key":"245_CR59","doi-asserted-by":"crossref","unstructured":"Sandler, T., Siqueira, K.: Games and terrorism: recent developments. Sim. Gaming 40(2), 164\u2013192 (2009). doi: 10.1177\/1046878108314772 . http:\/\/sag.sagepub.com\/content\/40\/2\/164.abstract","DOI":"10.1177\/1046878108314772"},{"key":"245_CR60","unstructured":"Sargent, T.J.: Macroeconomic Theory. Academic Press, New York (1979). ISBN:0-12-619750-4"},{"key":"245_CR61","doi-asserted-by":"crossref","unstructured":"Shen, D., Chen, G., Blasch, E., Tadda, G.: Adaptive markov game theoretic data fusion approach for cyber network defense. In: Mil. Commun. Conf., 2007. MILCOM 2007. IEEE, pp. 1\u20137. Orlando (2007). doi: 10.1109\/MILCOM.2007.4454758","DOI":"10.1109\/MILCOM.2007.4454758"},{"key":"245_CR62","unstructured":"Szidarovszky, F., Luo, Y.: Optimal protection against random attacks. Reliab. Eng. Syst. Saf. (2013). Submitted for publication"},{"key":"245_CR63","doi-asserted-by":"crossref","unstructured":"Valenzuela, M., Rozenblit, J., Suantak, L.: Decision support using deterministic equivalents of probabilistic game trees. In: Proc. the 2012 19th IEEE Int. Conf. and Workshops Eng. Comput.-Based Syst. (ECBS), pp. 142\u2013149. Novi Sad (2012). doi: 10.1109\/ECBS.2012.22","DOI":"10.1109\/ECBS.2012.22"},{"key":"245_CR64","doi-asserted-by":"crossref","unstructured":"Wang, L., Ren, S., Yue, K., Kwiaty, K.: Optimal resource allocation for protecting system availability against random cyber attacks. In: Proc. the 2011 3rd Int. Conf. Comput. Res. & Dev. (ICCRD), vol. 1, pp. 477\u2013482. Shanghai (2011). doi: 10.1109\/ICCRD.2011.5764062","DOI":"10.1109\/ICCRD.2011.5764062"},{"key":"245_CR65","doi-asserted-by":"crossref","unstructured":"Zeigler, B.P., Hu, J.H., Rozenblit, J.W.: Hierarchical, modular modelling in DEVS-scheme. In: 1989 Proc. the 21st Conf. on Winter Simul., WSC \u201989, pp. 84\u201389. ACM, New York, Capital Hilton Hotel, Washington, DC (1989). doi: 10.1145\/76738.76749","DOI":"10.1145\/76738.76749"},{"issue":"3","key":"245_CR66","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1016\/j.jnca.2008.07.011","volume":"32","author":"Z Zhang","year":"2009","unstructured":"Zhang, Z., Ho, P.H.: Janus: A dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks. J. Netw. Comput. Appl. 32(3), 710\u2013720 (2009)","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"245_CR67","doi-asserted-by":"crossref","first-page":"976","DOI":"10.1287\/opre.1070.0434","volume":"55","author":"J Zhuang","year":"2007","unstructured":"Zhuang, J., Bier, V.M.: Balancing terrorism and natural disasters\u2013defensive strategy with endogenous attacker effort. Oper. Res. 55(5), 976\u2013991 (2007)","journal-title":"Oper. Res."},{"key":"245_CR68","doi-asserted-by":"crossref","unstructured":"Zhuang, J., Bier, V.M., Alagoz, O.: Modeling secrecy and deception in a multiple-period attacker\/defender signaling game. Eur. J. Oper. Res. 203(2), 409\u2013418 (2010). doi: 10.1016\/j.ejor.2009.07.028 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0377221709005384","DOI":"10.1016\/j.ejor.2009.07.028"},{"key":"245_CR69","doi-asserted-by":"crossref","unstructured":"Zonouz, S., Khurana, H., Sanders, W., Yardley, T.: RRE: a game-theoretic intrusion response and recovery engine. In: 2009 DSN IEEE\/IFIP International Conference on Dependable Systems Networks, pp. 439\u2013448. Lisbon (2009). doi: 10.1109\/DSN.2009.5270307","DOI":"10.1109\/DSN.2009.5270307"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-014-0245-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-014-0245-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-014-0245-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T23:59:59Z","timestamp":1716767999000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-014-0245-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,25]]},"references-count":69,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,2]]}},"alternative-id":["245"],"URL":"https:\/\/doi.org\/10.1007\/s10207-014-0245-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,25]]}}}