Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Adversarial risk analysis: An overview
Adversarial risk analysis (ARA) is a relatively new area of research that informs decision‐
making when facing intelligent opponents and uncertain outcomes. It is a decision‐theoretic …
making when facing intelligent opponents and uncertain outcomes. It is a decision‐theoretic …
Modeling opponents in adversarial risk analysis
Adversarial risk analysis has been introduced as a framework to deal with risks derived from
intentional actions of adversaries. The analysis supports one of the decisionmakers, who …
intentional actions of adversaries. The analysis supports one of the decisionmakers, who …
Know your enemy: Conversational agents for security, education, training, and awareness at scale
Social engineering attacks are widespread, costly, and challenging to mitigate through
technical means. Companies allocate considerable resources toward security education …
technical means. Companies allocate considerable resources toward security education …
Manipulating hidden-Markov-model inferences by corrupting batch data
Time-series models typically assume untainted and legitimate streams of data. However, a
self-interested adversary may have incentive to corrupt this data, thereby altering a decision …
self-interested adversary may have incentive to corrupt this data, thereby altering a decision …
Adversarial risk analysis: The Somali pirates case
We show how adversarial risk analysis may cope with a current important security issue in
relation with piracy off the Somali coasts. Specifically, we describe how to support the owner …
relation with piracy off the Somali coasts. Specifically, we describe how to support the owner …
International Series in Operations Research & Management Science
FS Hillier, CC Price - 2001 - Springer
Conic optimization is a significant and thriving research area within the optimization
community. Conic optimization is the general class of problems concerned with optimizing a …
community. Conic optimization is the general class of problems concerned with optimizing a …
Adversarial Risk Analysis with Incomplete Information: A Level‐k Approach
C Rothschild, L McLay… - Risk Analysis: An …, 2012 - Wiley Online Library
This article proposes, develops, and illustrates the application of level‐k game theory to
adversarial risk analysis. Level‐k reasoning, which assumes that players play strategically …
adversarial risk analysis. Level‐k reasoning, which assumes that players play strategically …
A behavioral approach to repeated Bayesian security games
The prevalence of security threats to organizational defense demands models that support
real-world policymaking. Security games are a potent tool in this regard; however, although …
real-world policymaking. Security games are a potent tool in this regard; however, although …
Robust Adversarial Risk Analysis: A Level-k Approach
Adversarial risk analysis is an active and important area of decision analytic research. Both
single-actor decision analysis and multiple-actor game theory have been applied to this …
single-actor decision analysis and multiple-actor game theory have been applied to this …
Deterrence against Terrorist Attacks in Sports‐Mega Events: A Method to Identify the Optimal Portfolio of Defensive Countermeasures
Sports mega‐events, such as the Olympic Games or the Super Bowl, are attractive targets
for terrorist organizations, due to their visibility, size, and number of people involved. Two …
for terrorist organizations, due to their visibility, size, and number of people involved. Two …