Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Adversarial Risk Analysis - MaRDI portal

Adversarial Risk Analysis

From MaRDI portal
Publication:5252152

DOI10.1198/jasa.2009.0155zbMath1390.91117OpenAlexW4292230443MaRDI QIDQ5252152

David Ríos Insua, David L. Banks, Jesus Rios

Publication date: 29 May 2015

Published in: Journal of the American Statistical Association (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1198/jasa.2009.0155




Related Items (37)

Security from the adversary's inertia-controlling convergence speed when playing mixed strategy equilibriaHypothesis Testing in Presence of AdversariesModeling and mitigating the effects of supply chain disruption in a defender-attacker gameModeling costly learning and counter-learning in a defender-attacker game with private defender informationNetwork routing for insurgency: An adversarial risk analysis frameworkOn the value of exposure and secrecy of defense system: first-mover advantage vs. robustnessMultithreat multisite protection: a security case studyDesigning Societies of RobotsSecurity economics: an adversarial risk analysis approach to airport protectionADVERSARIAL RISK ANALYSIS FOR FIRST-PRICE SEALED-BID AUCTIONSAdversarial risk analysis for first‐price sealed‐bid auctionsAdversarial risk analysis under partial informationAdversarial Machine Learning: Bayesian PerspectivesDecision support issues in automated driving systemsStatistical Medical Fraud Assessment: Exposition to an Emerging FieldAdversarial risk analysis for auctions using non-strategic play and level-k thinking: A general case of n bidders with regretInfluence modeling: mathematical programming representations of persuasion under either risk or uncertaintyComputational Efficiency in Multivariate Adversarial Risk Analysis ModelsSystems under attack-survivability rather than reliability: concept, results, and applicationsDefense and attack for interdependent systemsAdversarial issues in reliabilityDominance and innovation: a returns‐based beliefs approachAdvances in Bayesian decision making in reliabilityRobust Adversarial Risk Analysis: A Level-k ApproachAdversarial Risk Analysis: The Somali Pirates CaseGame Theoretical Approach for Reliable Enhanced IndexationGradient methods for solving Stackelberg gamesAdversarial classification: an adversarial risk analysis approachSecurity games over lexicographic ordersAn Adversarial Risk Analysis Framework for Batch Acceptance ProblemsInterplay of rumor propagation and clarification on social media during crisis events -- a game-theoretic approachDecision programming for mixed-integer multi-stage optimization under uncertaintyAdversarial risk analysis as a decomposition method for structured expert judgement modellingExpert judgement in terrorism risk assessmentAdversarial risk analysis: Borel gamesUncommon Knowledge in Multiparty AuctionsAdversarial Risk Analysis for Auctions Using Mirror Equilibrium and Bayes Nash Equilibrium




This page was built for publication: Adversarial Risk Analysis