iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1016/J.RESS.2012.11.015
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T10:10:48Z","timestamp":1720087848337},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T00:00:00Z","timestamp":1364774400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Reliability Engineering & System Safety"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1016\/j.ress.2012.11.015","type":"journal-article","created":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T20:03:36Z","timestamp":1354737816000},"page":"176-186","source":"Crossref","is-referenced-by-count":19,"special_numbering":"C","title":["Is it wise to leave some false targets unprotected?"],"prefix":"10.1016","volume":"112","author":[{"given":"Gregory","family":"Levitin","sequence":"first","affiliation":[]},{"given":"Kjell","family":"Hausken","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.ress.2012.11.015_bib1","first-page":"31","article-title":"Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence","volume":"5","author":"Dighe","year":"2009","journal-title":"International Journal of Performability Engineering, Special issue on System Survivability and Defense against External Impacts"},{"issue":"12","key":"10.1016\/j.ress.2012.11.015_bib2","doi-asserted-by":"crossref","first-page":"1737","DOI":"10.1111\/j.1539-6924.2010.01455.x","article-title":"Reasons for secrecy and deception in homeland-security resource allocation","volume":"30","author":"Zhuang","year":"2010","journal-title":"Risk Analysis"},{"issue":"2","key":"10.1016\/j.ress.2012.11.015_bib3","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1016\/j.ejor.2009.07.028","article-title":"Modeling secrecy and deception in a multiple-period attacker\u2013defender signaling game","volume":"203","author":"Zhuang","year":"2010","journal-title":"European Journal of Operational Research"},{"key":"10.1016\/j.ress.2012.11.015_bib4","doi-asserted-by":"crossref","first-page":"976","DOI":"10.1287\/opre.1070.0434","article-title":"Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort","volume":"55","author":"Zhuang","year":"2007","journal-title":"Operations Research"},{"issue":"4","key":"10.1016\/j.ress.2012.11.015_bib5","first-page":"355","article-title":"Review of systems defense and attack models","volume":"8","author":"Hausken","year":"2012","journal-title":"International Journal of Performability Engineering"},{"key":"10.1016\/j.ress.2012.11.015_bib6","unstructured":"Blanks, KS An effectiveness analysis of the tactical employment of decoys, Master's thesis, Pentagon, Army Command and General Staff Coll Fort Leavenworth KS, Accession Number: ADA284608,"},{"issue":"1","key":"10.1016\/j.ress.2012.11.015_bib7","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/TR.2008.2011661","article-title":"Redundancy vs. protection vs. false targets for systems under attack","volume":"58","author":"Levitin","year":"2009","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/j.ress.2012.11.015_bib8","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1080\/14751790902985181","article-title":"Intelligence and impact contests in systems with fake targets","volume":"25","author":"Levitin","year":"2009","journal-title":"Defense and Security Analysis"},{"issue":"1","key":"10.1016\/j.ress.2012.11.015_bib9","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.ejor.2007.11.060","article-title":"Targets efficiency in defense strategy","volume":"194","author":"Levitin","year":"2009","journal-title":"European Journal of Operational Research"},{"issue":"2","key":"10.1016\/j.ress.2012.11.015_bib10","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1016\/j.ress.2008.06.006","article-title":"Targets vs. redundancy in homogeneous parallel systems","volume":"94","author":"Levitin","year":"2009","journal-title":"Reliability Engineering & System Safety"},{"issue":"12","key":"10.1016\/j.ress.2012.11.015_bib11","doi-asserted-by":"crossref","first-page":"1927","DOI":"10.1016\/j.ress.2009.06.010","article-title":"Intelligence and impact contests in systems with redundancy, false targets, and partial protection","volume":"94","author":"Levitin","year":"2009","journal-title":"Reliability Engineering & System Safety"},{"key":"10.1016\/j.ress.2012.11.015_bib12","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1016\/j.ress.2008.11.003","article-title":"Protection vs. false targets in series systems","volume":"94","author":"Hausken","year":"2009","journal-title":"Reliability Engineering & System Safety"},{"key":"10.1016\/j.ress.2012.11.015_bib13","doi-asserted-by":"crossref","first-page":"1647","DOI":"10.1016\/j.ress.2011.07.012","article-title":"Is it wise to protect false targets?","volume":"96","author":"Levitin","year":"2011","journal-title":"Reliability Engineering & System Safety"},{"key":"10.1016\/j.ress.2012.11.015_bib14","series-title":"The attack on pearl harbor: an illustrated history","author":"Kimmett","year":"2004"},{"key":"10.1016\/j.ress.2012.11.015_bib15","series-title":"Attack on twitter came in two waves","author":"Wortham","year":"2011"},{"key":"10.1016\/j.ress.2012.11.015_bib16","series-title":"Two-wave bagle trojan attack launched","author":"Espiner","year":"2005"},{"issue":"2","key":"10.1016\/j.ress.2012.11.015_bib17","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1016\/j.ress.2008.06.005","article-title":"Minmax defense strategy for complex multi-state systems","volume":"94","author":"Hausken","year":"2009","journal-title":"Reliability Engineering & System Safety"},{"issue":"1","key":"10.1016\/j.ress.2012.11.015_bib18","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.ress.2009.07.006","article-title":"Defense and attack of complex and dependent systems","volume":"95","author":"Hausken","year":"2010","journal-title":"Reliability Engineering & System Safety"},{"issue":"1","key":"10.1016\/j.ress.2012.11.015_bib19","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1080\/00207720903434789","article-title":"Protecting complex infrastructures against multiple strategic attackers","volume":"42","author":"Hausken","year":"2011","journal-title":"International Journal of Systems Science"},{"key":"10.1016\/j.ress.2012.11.015_bib20","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/S0951-8320(03)00136-4","article-title":"Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm","volume":"82","author":"Levitin","year":"2003","journal-title":"Reliability Engineering & System Safety"},{"key":"10.1016\/j.ress.2012.11.015_bib21","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s11127-005-1717-3","article-title":"Production and conflict models versus rent seeking models","volume":"123","author":"Hausken","year":"2005","journal-title":"Public Choice"},{"key":"10.1016\/j.ress.2012.11.015_bib22","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/BF01213906","article-title":"Contest success functions","volume":"7","author":"Skaperdas","year":"1996","journal-title":"Economic Theory"},{"key":"10.1016\/j.ress.2012.11.015_bib23","series-title":"Toward a theory of the rent-seeking society","first-page":"97","article-title":"Efficient rent-seeking","author":"Tullock","year":"1980"},{"key":"10.1016\/j.ress.2012.11.015_bib24","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/0176-2680(94)90061-2","article-title":"Modelling rent-seeking contests","volume":"10","author":"Nitzan","year":"1994","journal-title":"European Journal of Political Economy"},{"issue":"1","key":"10.1016\/j.ress.2012.11.015_bib25","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1086\/261974","article-title":"Anarchy and its breakdown","volume":"103","author":"Hirshleifer","year":"1995","journal-title":"Journal of Political Economy"},{"issue":"5","key":"10.1016\/j.ress.2012.11.015_bib26","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1111\/j.1539-6924.2008.01090.x","article-title":"Efficiency of even separation of parallel elements with variable contest intensity","volume":"28","author":"Hausken","year":"2008","journal-title":"Risk Analysis"},{"issue":"3","key":"10.1016\/j.ress.2012.11.015_bib27","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1287\/mksc.1040.0105","article-title":"Collaborative product and market development: theoretical implications and experimental evidence","volume":"24","author":"Amaldoss","year":"2005","journal-title":"Marketing Science"},{"issue":"1","key":"10.1016\/j.ress.2012.11.015_bib28","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1002\/j.2325-8012.2007.tb00828.x","article-title":"Two-stage team rent-seeking: experimental analysis","volume":"74","author":"Cadigan","year":"2007","journal-title":"Southern Economic Journal"},{"issue":"1-2","key":"10.1016\/j.ress.2012.11.015_bib29","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s11127-009-9488-x","article-title":"Strategic entry deterrence and terrorism: theory and experimental evidence","volume":"143","author":"Cadigan","year":"2010","journal-title":"Public Choice"},{"issue":"5","key":"10.1016\/j.ress.2012.11.015_bib30","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1016\/j.ijindorg.2009.01.004","article-title":"An experimental investigation of asymmetric contests","volume":"27","author":"Fonseca","year":"2009","journal-title":"International Journal of Industrial Organization"},{"issue":"4","key":"10.1016\/j.ress.2012.11.015_bib31","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.jmp.2005.03.002","article-title":"Two-stage contests with budget constraints: an experimental study","volume":"49","author":"Parco","year":"2005","journal-title":"Journal of Mathematical Psychology"},{"issue":"282","key":"10.1016\/j.ress.2012.11.015_bib32","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1111\/j.1475-4932.2012.00822.x","article-title":"Contests with the probability of a draw: a stochastic foundation","volume":"88","author":"Jia","year":"2012","journal-title":"Economic Record"}],"container-title":["Reliability Engineering & System Safety"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832012002451?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832012002451?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T11:32:20Z","timestamp":1643801540000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0951832012002451"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":32,"alternative-id":["S0951832012002451"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.ress.2012.11.015","relation":{},"ISSN":["0951-8320"],"issn-type":[{"value":"0951-8320","type":"print"}],"subject":[],"published":{"date-parts":[[2013,4]]}}}