Author of the publication

Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare.

, , , , , and . IEEE Syst. J., 14 (3): 3779-3790 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ranking terrorists in networks: A sensitivity analysis of Al Qaeda's 9/11 attack., , , , and . Soc. Networks, (2015)"Stay Nearby or Get Checked": A Covid-19 Lockdown Exit Strategy., , , and . CoRR, (2020)A new approximation method for the Shapley value applied to the WTC 9/11 terrorist attack., , , and . Soc. Netw. Anal. Min., 8 (1): 3:1-3:12 (2018)Key Player Identification: A Note on Weighted Connectivity Games and the Shapley Value., and . ASONAM, page 356-359. IEEE Computer Society, (2010)General Lotto Games with Scouts: Information versus Strength., , and . CoRR, (2024)Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare., , , , , and . IEEE Syst. J., 14 (3): 3779-3790 (2020)The ''Princess and Monster'' Game on an Interval., , , and . SIAM J. Control. Optim., 47 (3): 1178-1190 (2008)One-mode projection analysis and design of covert affiliation networks., , and . Soc. Networks, 34 (4): 614-622 (2012)Understanding Terrorist Network Topologies and Their Resilience Against Disruption., , and . Counterterrorism and Open Source Intelligence, volume 2 of Lecture Notes in Social Networks, Springer, (2011)Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda., , and . Eur. J. Oper. Res., 229 (1): 230-238 (2013)