iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.org/pid/72/3481.html?view=bibtex
dblp: BibTeX records: Kjell Hausken

BibTeX records: Kjell Hausken

download as .bib file

@article{DBLP:journals/eor/Hausken24,
  author       = {Kjell Hausken},
  title        = {Fifty Years of Operations Research in Defense},
  journal      = {Eur. J. Oper. Res.},
  volume       = {318},
  number       = {2},
  pages        = {355--368},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ejor.2023.12.023},
  doi          = {10.1016/J.EJOR.2023.12.023},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eor/Hausken24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/games/HauskenWZ24,
  author       = {Kjell Hausken and
                  Jonathan W. Welburn and
                  Jun Zhuang},
  title        = {A Review of Attacker-Defender Games and Cyber Security},
  journal      = {Games},
  volume       = {15},
  number       = {4},
  pages        = {28},
  year         = {2024},
  url          = {https://doi.org/10.3390/g15040028},
  doi          = {10.3390/G15040028},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/games/HauskenWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igtr/Hausken22,
  author       = {Kjell Hausken},
  title        = {Theoretic Model of Adversaries and Media Manipulation: {A} Two-Period
                  Extension},
  journal      = {{IGTR}},
  volume       = {24},
  number       = {3},
  pages        = {2150019:1--2150019:23},
  year         = {2022},
  url          = {https://doi.org/10.1142/S0219198921500195},
  doi          = {10.1142/S0219198921500195},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/igtr/Hausken22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsds/Hausken22,
  author       = {Kjell Hausken},
  title        = {A Review of Axioms for Group Contest Success Functions},
  journal      = {Int. J. Strateg. Decis. Sci.},
  volume       = {13},
  number       = {1},
  pages        = {1--19},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsds.301549},
  doi          = {10.4018/IJSDS.301549},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsds/Hausken22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/games/WangH21,
  author       = {Guizhou Wang and
                  Kjell Hausken},
  title        = {Governmental Taxation of Households Choosing between a National Currency
                  and a Cryptocurrency},
  journal      = {Games},
  volume       = {12},
  number       = {2},
  pages        = {34},
  year         = {2021},
  url          = {https://doi.org/10.3390/g12020034},
  doi          = {10.3390/G12020034},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/games/WangH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igtr/Hausken21,
  author       = {Kjell Hausken},
  title        = {Governments Playing Games and Combating the Dynamics of a Terrorist
                  Organization},
  journal      = {{IGTR}},
  volume       = {23},
  number       = {2},
  pages        = {2050013:1--2050013:26},
  year         = {2021},
  url          = {https://doi.org/10.1142/S0219198920500139},
  doi          = {10.1142/S0219198920500139},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/igtr/Hausken21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/HauskenW21,
  author       = {Kjell Hausken and
                  Jonathan W. Welburn},
  title        = {Attack and Defense Strategies in Cyber War Involving Production and
                  Stockpiling of Zero-Day Cyber Exploits},
  journal      = {Inf. Syst. Frontiers},
  volume       = {23},
  number       = {6},
  pages        = {1609--1620},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10796-020-10054-z},
  doi          = {10.1007/S10796-020-10054-Z},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/HauskenW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jors/Hausken21,
  author       = {Kjell Hausken},
  title        = {Government intervention to combat the dynamics of terrorist organizations},
  journal      = {J. Oper. Res. Soc.},
  volume       = {72},
  number       = {1},
  pages        = {217--226},
  year         = {2021},
  url          = {https://doi.org/10.1080/01605682.2019.1656561},
  doi          = {10.1080/01605682.2019.1656561},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jors/Hausken21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/Hausken21,
  author       = {Kjell Hausken},
  title        = {The precautionary principle as multi-period games where players have
                  different thresholds for acceptable uncertainty},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {206},
  pages        = {107224},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ress.2020.107224},
  doi          = {10.1016/J.RESS.2020.107224},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/Hausken21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/games/WangWH20,
  author       = {Guizhou Wang and
                  Jonathan W. Welburn and
                  Kjell Hausken},
  title        = {A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling},
  journal      = {Games},
  volume       = {11},
  number       = {4},
  pages        = {64},
  year         = {2020},
  url          = {https://doi.org/10.3390/g11040064},
  doi          = {10.3390/G11040064},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/games/WangWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsds/HauskenN20,
  author       = {Kjell Hausken and
                  Mthuli Ncube},
  title        = {Game Theoretic Analysis of Insurgent Attacks, Government Protection,
                  and International Intervention},
  journal      = {Int. J. Strateg. Decis. Sci.},
  volume       = {11},
  number       = {1},
  pages        = {56--75},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJSDS.2020010104},
  doi          = {10.4018/IJSDS.2020010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsds/HauskenN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/Hausken20,
  author       = {Kjell Hausken},
  title        = {Cyber resilience in firms, organizations and societies},
  journal      = {Internet Things},
  volume       = {11},
  pages        = {100204},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.iot.2020.100204},
  doi          = {10.1016/J.IOT.2020.100204},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/Hausken20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ord/Hausken20,
  author       = {Kjell Hausken},
  title        = {Game theoretic analysis of ideologically biased clickbait or fake
                  news and real news},
  journal      = {Oper. Res. Decis.},
  volume       = {30},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.37190/ord200203},
  doi          = {10.37190/ORD200203},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ord/Hausken20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ord/Hausken20a,
  author       = {Kjell Hausken},
  title        = {Governmental combat of migration between competing terrorist organisations},
  journal      = {Oper. Res. Decis.},
  volume       = {30},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.37190/ord200302},
  doi          = {10.37190/ORD200302},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ord/Hausken20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/da/Hausken19,
  author       = {Kjell Hausken},
  title        = {Principal-Agent Theory, Game Theory, and the Precautionary Principle},
  journal      = {Decis. Anal.},
  volume       = {16},
  number       = {2},
  pages        = {105--127},
  year         = {2019},
  url          = {https://doi.org/10.1287/deca.2018.0380},
  doi          = {10.1287/DECA.2018.0380},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/da/Hausken19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/games/Hausken19,
  author       = {Kjell Hausken},
  title        = {A Game Theoretic Model of Adversaries and Media Manipulation},
  journal      = {Games},
  volume       = {10},
  number       = {4},
  pages        = {48},
  year         = {2019},
  url          = {https://doi.org/10.3390/g10040048},
  doi          = {10.3390/G10040048},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/games/Hausken19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jors/Hausken19,
  author       = {Kjell Hausken},
  title        = {Defence and attack of complex interdependent systems},
  journal      = {J. Oper. Res. Soc.},
  volume       = {70},
  number       = {3},
  pages        = {364--376},
  year         = {2019},
  url          = {https://doi.org/10.1080/01605682.2018.1438763},
  doi          = {10.1080/01605682.2018.1438763},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jors/Hausken19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcs/Hausken19,
  author       = {Kjell Hausken},
  title        = {Governmental combat of the dynamics of multiple competing terrorist
                  organizations},
  journal      = {Math. Comput. Simul.},
  volume       = {166},
  pages        = {33--55},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.matcom.2019.04.003},
  doi          = {10.1016/J.MATCOM.2019.04.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcs/Hausken19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igtr/Hausken18,
  author       = {Kjell Hausken},
  title        = {Proactivity and Retroactivity of Firms and Information Sharing of
                  Hackers},
  journal      = {{IGTR}},
  volume       = {20},
  number       = {1},
  pages        = {1750027:1--1750027:30},
  year         = {2018},
  url          = {https://doi.org/10.1142/S021919891750027X},
  doi          = {10.1142/S021919891750027X},
  timestamp    = {Wed, 24 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/igtr/Hausken18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/RaoMHHY018,
  author       = {Nageswara S. V. Rao and
                  Chris Y. T. Ma and
                  Kjell Hausken and
                  Fei He and
                  David K. Y. Yau and
                  Jun Zhuang},
  title        = {Defense Strategies for Asymmetric Networked Systems with Discrete
                  Components},
  journal      = {Sensors},
  volume       = {18},
  number       = {5},
  pages        = {1421},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18051421},
  doi          = {10.3390/S18051421},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/RaoMHHY018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/Hausken17,
  author       = {Kjell Hausken},
  title        = {Defense and attack for interdependent systems},
  journal      = {Eur. J. Oper. Res.},
  volume       = {256},
  number       = {2},
  pages        = {582--591},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ejor.2016.06.033},
  doi          = {10.1016/J.EJOR.2016.06.033},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/Hausken17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/games/Hausken17,
  author       = {Kjell Hausken},
  title        = {Security Investment, Hacking, and Information Sharing between Firms
                  and between Hackers},
  journal      = {Games},
  volume       = {8},
  number       = {2},
  pages        = {23},
  year         = {2017},
  url          = {https://doi.org/10.3390/g8020023},
  doi          = {10.3390/G8020023},
  timestamp    = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/games/Hausken17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igtr/Hausken17,
  author       = {Kjell Hausken},
  title        = {Information Sharing Among Cyber Hackers in Successive Attacks},
  journal      = {{IGTR}},
  volume       = {19},
  number       = {2},
  pages        = {1750010:1--1750010:33},
  year         = {2017},
  url          = {https://doi.org/10.1142/S0219198917500104},
  doi          = {10.1142/S0219198917500104},
  timestamp    = {Wed, 24 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/igtr/Hausken17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/Hausken17,
  author       = {Kjell Hausken},
  title        = {Special versus general protection and attack of parallel and series
                  components},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {165},
  pages        = {239--256},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ress.2017.03.027},
  doi          = {10.1016/J.RESS.2017.03.027},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/Hausken17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fusion/RaoMHHY017,
  author       = {Nageswara S. V. Rao and
                  Chris Y. T. Ma and
                  Kjell Hausken and
                  Fei He and
                  David K. Y. Yau and
                  Jun Zhuang},
  title        = {Game-theoretic strategies for asymmetric networked systems},
  booktitle    = {20th International Conference on Information Fusion, {FUSION} 2017,
                  Xi'an, China, July 10-13, 2017},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICIF.2017.8009874},
  doi          = {10.23919/ICIF.2017.8009874},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fusion/RaoMHHY017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfi/RaoMHHY017,
  author       = {Nageswara S. V. Rao and
                  Chris Y. T. Ma and
                  Kjell Hausken and
                  Fei He and
                  David K. Y. Yau and
                  Jun Zhuang},
  title        = {Defense strategies for asymmetric networked systems under composite
                  utilities},
  booktitle    = {2017 {IEEE} International Conference on Multisensor Fusion and Integration
                  for Intelligent Systems, {MFI} 2017, Daegu, Korea (South), November
                  16-18, 2017},
  pages        = {384--389},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MFI.2017.8170351},
  doi          = {10.1109/MFI.2017.8170351},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mfi/RaoMHHY017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/syscon/RaoIMHH017,
  author       = {Nageswara S. V. Rao and
                  Neena Imam and
                  Chris Y. T. Ma and
                  Kjell Hausken and
                  Fei He and
                  Jun Zhuang},
  title        = {On defense strategies for system of systems using aggregated correlations},
  booktitle    = {2017 Annual {IEEE} International Systems Conference, SysCon 2017,
                  Montreal, QC, Canada, April 24-27, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SYSCON.2017.7934817},
  doi          = {10.1109/SYSCON.2017.7934817},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/syscon/RaoIMHH017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/anor/Hausken016,
  author       = {Kjell Hausken and
                  Jun Zhuang},
  title        = {The strategic interaction between a company and the government surrounding
                  disasters},
  journal      = {Ann. Oper. Res.},
  volume       = {237},
  number       = {1-2},
  pages        = {27--40},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10479-014-1684-5},
  doi          = {10.1007/S10479-014-1684-5},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/anor/Hausken016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igtr/HauskenN16,
  author       = {Kjell Hausken and
                  Mthuli Ncube},
  title        = {How Elections are Impacted by Production, Economic Growth and Conflict},
  journal      = {{IGTR}},
  volume       = {18},
  number       = {1},
  pages        = {1550015:1--1550015:29},
  year         = {2016},
  url          = {https://doi.org/10.1142/S0219198915500152},
  doi          = {10.1142/S0219198915500152},
  timestamp    = {Wed, 24 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/igtr/HauskenN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fusion/RaoMHH016,
  author       = {Nageswara S. V. Rao and
                  Chris Y. T. Ma and
                  Kjell Hausken and
                  Fei He and
                  Jun Zhuang},
  title        = {Defense strategies for infrastructures with multiple systems of components},
  booktitle    = {19th International Conference on Information Fusion, {FUSION} 2016,
                  Heidelberg, Germany, July 5-8, 2016},
  pages        = {270--277},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7527898/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fusion/RaoMHH016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfi/RaoMHH016,
  author       = {Nageswara S. V. Rao and
                  Chris Y. T. Ma and
                  Kjell Hausken and
                  Fei He and
                  Jun Zhuang},
  title        = {Game-theoretic strategies for systems of components using product-form
                  utilities},
  booktitle    = {2016 {IEEE} International Conference on Multisensor Fusion and Integration
                  for Intelligent Systems, {MFI} 2016, Baden-Baden, Germany, September
                  19-21, 2016},
  pages        = {341--346},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/MFI.2016.7849511},
  doi          = {10.1109/MFI.2016.7849511},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mfi/RaoMHH016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/WelburnH15,
  author       = {Jonathan W. Welburn and
                  Kjell Hausken},
  title        = {A game theoretic model of economic crises},
  journal      = {Appl. Math. Comput.},
  volume       = {266},
  pages        = {738--762},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.amc.2015.05.093},
  doi          = {10.1016/J.AMC.2015.05.093},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/WelburnH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cejor/Hausken14,
  author       = {Kjell Hausken},
  title        = {Individual versus overarching protection and attack of assets},
  journal      = {Central Eur. J. Oper. Res.},
  volume       = {22},
  number       = {1},
  pages        = {89--112},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10100-012-0271-6},
  doi          = {10.1007/S10100-012-0271-6},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cejor/Hausken14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/Hausken14,
  author       = {Kjell Hausken},
  title        = {Returns to information security investment: Endogenizing the expected
                  loss},
  journal      = {Inf. Syst. Frontiers},
  volume       = {16},
  number       = {2},
  pages        = {329--336},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10796-012-9390-9},
  doi          = {10.1007/S10796-012-9390-9},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/Hausken14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinHD14,
  author       = {Gregory Levitin and
                  Kjell Hausken and
                  Yuanshun Dai},
  title        = {Optimal defense with variable number of overarching and individual
                  protections},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {123},
  pages        = {81--90},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ress.2013.11.001},
  doi          = {10.1016/J.RESS.2013.11.001},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinHD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apjor/Hausken13,
  author       = {Kjell Hausken},
  title        = {Combined Series and Parallel Systems subject to Individual versus
                  Overarching Defense and Attack},
  journal      = {Asia Pac. J. Oper. Res.},
  volume       = {30},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1142/S021759591250056X},
  doi          = {10.1142/S021759591250056X},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apjor/Hausken13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cejor/LevitinH13,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Parallel systems under two sequential attacks with contest intensity
                  variation},
  journal      = {Central Eur. J. Oper. Res.},
  volume       = {21},
  number       = {1},
  pages        = {207--224},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10100-011-0225-4},
  doi          = {10.1007/S10100-011-0225-4},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cejor/LevitinH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/Hausken013,
  author       = {Kjell Hausken and
                  Jun Zhuang},
  title        = {The impact of disaster on the strategic interaction between company
                  and government},
  journal      = {Eur. J. Oper. Res.},
  volume       = {225},
  number       = {2},
  pages        = {363--376},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ejor.2012.09.047},
  doi          = {10.1016/J.EJOR.2012.09.047},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/Hausken013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jors/LevitinH13,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Defence resource distribution between protection and decoys for constant
                  resource stockpiling pace},
  journal      = {J. Oper. Res. Soc.},
  volume       = {64},
  number       = {9},
  pages        = {1409--1417},
  year         = {2013},
  url          = {https://doi.org/10.1057/jors.2012.117},
  doi          = {10.1057/JORS.2012.117},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jors/LevitinH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinHB13,
  author       = {Gregory Levitin and
                  Kjell Hausken and
                  Hanoch Ben{-}Haim},
  title        = {Defending majority voting systems against a strategic attacker},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {111},
  pages        = {37--44},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ress.2012.10.004},
  doi          = {10.1016/J.RESS.2012.10.004},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinHB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinH13,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Is it wise to leave some false targets unprotected?},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {112},
  pages        = {176--186},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ress.2012.11.015},
  doi          = {10.1016/J.RESS.2012.11.015},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/BierH13,
  author       = {Vicki M. Bier and
                  Kjell Hausken},
  title        = {Defending and attacking a network of two arcs subject to traffic congestion},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {112},
  pages        = {214--224},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ress.2012.11.016},
  doi          = {10.1016/J.RESS.2012.11.016},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/BierH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinHD13,
  author       = {Gregory Levitin and
                  Kjell Hausken and
                  Yuanshun Dai},
  title        = {Individual vs. overarching protection for minimizing the expected
                  damage caused by an attack},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {119},
  pages        = {117--125},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ress.2013.05.024},
  doi          = {10.1016/J.RESS.2013.05.024},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/LevitinH13,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Defending Threshold Voting Systems With Identical Voting Units},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {62},
  number       = {2},
  pages        = {466--477},
  year         = {2013},
  url          = {https://doi.org/10.1109/TR.2013.2255794},
  doi          = {10.1109/TR.2013.2255794},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/LevitinH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igtr/Hausken12,
  author       = {Kjell Hausken},
  title        = {On the Impossibility of Deterrence in Sequential Colonel Blotto Games},
  journal      = {{IGTR}},
  volume       = {14},
  number       = {2},
  year         = {2012},
  url          = {https://doi.org/10.1142/S0219198912500119},
  doi          = {10.1142/S0219198912500119},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/igtr/Hausken12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/Hausken12,
  author       = {Kjell Hausken},
  title        = {Terrorism risks, civil liberties, and privacy concerns},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {8},
  number       = {4},
  pages        = {293--305},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJCIS.2012.050099},
  doi          = {10.1504/IJCIS.2012.050099},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/Hausken12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jors/Hausken012,
  author       = {Kjell Hausken and
                  Jun Zhuang},
  title        = {The timing and deterrence of terrorist attacks due to exogenous dynamics},
  journal      = {J. Oper. Res. Soc.},
  volume       = {63},
  number       = {6},
  pages        = {726--735},
  year         = {2012},
  url          = {https://doi.org/10.1057/jors.2011.79},
  doi          = {10.1057/JORS.2011.79},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jors/Hausken012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jors/LevitinH12,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Individual \emph{versus} overarching protection against strategic
                  attacks},
  journal      = {J. Oper. Res. Soc.},
  volume       = {63},
  number       = {7},
  pages        = {969--981},
  year         = {2012},
  url          = {https://doi.org/10.1057/jors.2011.96},
  doi          = {10.1057/JORS.2011.96},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jors/LevitinH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jors/LevitinH12a,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Parallel systems under two sequential attacks with imperfect detection
                  of the first attack outcome},
  journal      = {J. Oper. Res. Soc.},
  volume       = {63},
  number       = {11},
  pages        = {1545--1555},
  year         = {2012},
  url          = {https://doi.org/10.1057/jors.2012.4},
  doi          = {10.1057/JORS.2012.4},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jors/LevitinH12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinHTC12,
  author       = {Gregory Levitin and
                  Kjell Hausken and
                  Heidi A. Taboada and
                  David W. Coit},
  title        = {Data survivability vs. security in information systems},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {100},
  pages        = {19--27},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ress.2011.12.015},
  doi          = {10.1016/J.RESS.2011.12.015},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinHTC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/anor/BierH11,
  author       = {Vicki M. Bier and
                  Kjell Hausken},
  title        = {Endogenizing the sticks and carrots: modeling possible perverse effects
                  of counterterrorism measures},
  journal      = {Ann. Oper. Res.},
  volume       = {186},
  number       = {1},
  pages        = {39--59},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10479-010-0833-8},
  doi          = {10.1007/S10479-010-0833-8},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/anor/BierH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apjor/LevitinHB11,
  author       = {Gregory Levitin and
                  Kjell Hausken and
                  Hanoch Ben{-}Haim},
  title        = {Active and Passive Defense against Multiple Attack Facilities},
  journal      = {Asia Pac. J. Oper. Res.},
  volume       = {28},
  number       = {4},
  pages        = {431--444},
  year         = {2011},
  url          = {https://doi.org/10.1142/S021759591100317X},
  doi          = {10.1142/S021759591100317X},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apjor/LevitinHB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cejor/HauskenL11,
  author       = {Kjell Hausken and
                  Gregory Levitin},
  title        = {Shield versus sword resource distribution in K-round duels},
  journal      = {Central Eur. J. Oper. Res.},
  volume       = {19},
  number       = {4},
  pages        = {589--603},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10100-010-0148-5},
  doi          = {10.1007/S10100-010-0148-5},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cejor/HauskenL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/da/HauskenZ11,
  author       = {Kjell Hausken and
                  Jun Zhuang},
  title        = {Governments' and Terrorists' Defense and Attack in a \emph{T}-Period
                  Game},
  journal      = {Decis. Anal.},
  volume       = {8},
  number       = {1},
  pages        = {46--70},
  year         = {2011},
  url          = {https://doi.org/10.1287/deca.1100.0194},
  doi          = {10.1287/DECA.1100.0194},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/da/HauskenZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/HauskenB11,
  author       = {Kjell Hausken and
                  Vicki M. Bier},
  title        = {Defending against multiple different attackers},
  journal      = {Eur. J. Oper. Res.},
  volume       = {211},
  number       = {2},
  pages        = {370--384},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ejor.2010.12.013},
  doi          = {10.1016/J.EJOR.2010.12.013},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/HauskenB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igtr/HauskenL11,
  author       = {Kjell Hausken and
                  Gregory Levitin},
  title        = {Active vs. Passive Defense against a Strategic Attacker},
  journal      = {{IGTR}},
  volume       = {13},
  number       = {1},
  pages        = {1--12},
  year         = {2011},
  url          = {https://doi.org/10.1142/S0219198911002812},
  doi          = {10.1142/S0219198911002812},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/igtr/HauskenL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igtr/Hausken11,
  author       = {Kjell Hausken},
  title        = {Game Theoretic Analysis of Two-Period-Dependent Degraded Multistate
                  Reliability Systems},
  journal      = {{IGTR}},
  volume       = {13},
  number       = {3},
  pages        = {247--267},
  year         = {2011},
  url          = {https://doi.org/10.1142/S0219198911002988},
  doi          = {10.1142/S0219198911002988},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/igtr/Hausken11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsysc/Hausken11,
  author       = {Kjell Hausken},
  title        = {Protecting complex infrastructures against multiple strategic attackers},
  journal      = {Int. J. Syst. Sci.},
  volume       = {42},
  number       = {1},
  pages        = {11--29},
  year         = {2011},
  url          = {https://doi.org/10.1080/00207720903434789},
  doi          = {10.1080/00207720903434789},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsysc/Hausken11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinH11,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Preventive strike vs. false targets and protection in defense strategy},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {96},
  number       = {8},
  pages        = {912--924},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ress.2011.03.008},
  doi          = {10.1016/J.RESS.2011.03.008},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinH11a,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Is it wise to protect false targets?},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {96},
  number       = {12},
  pages        = {1647--1656},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ress.2011.07.012},
  doi          = {10.1016/J.RESS.2011.07.012},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinH11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/LevitinH10,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Separation in homogeneous systems with independent identical elements},
  journal      = {Eur. J. Oper. Res.},
  volume       = {203},
  number       = {3},
  pages        = {625--634},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ejor.2009.08.016},
  doi          = {10.1016/J.EJOR.2009.08.016},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/LevitinH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jors/LevitinH10,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Defence and attack of systems with variable attacker system structure
                  detection probability},
  journal      = {J. Oper. Res. Soc.},
  volume       = {61},
  number       = {1},
  pages        = {124--133},
  year         = {2010},
  url          = {https://doi.org/10.1057/jors.2008.158},
  doi          = {10.1057/JORS.2008.158},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jors/LevitinH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/Hausken10,
  author       = {Kjell Hausken},
  title        = {Defense and attack of complex and dependent systems},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {95},
  number       = {1},
  pages        = {29--42},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ress.2009.07.006},
  doi          = {10.1016/J.RESS.2009.07.006},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/Hausken10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinH10,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Influence of attacker's target recognition ability on defense strategy
                  in homogeneous parallel systems},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {95},
  number       = {5},
  pages        = {565--572},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ress.2010.01.007},
  doi          = {10.1016/J.RESS.2010.01.007},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/LevitinH09,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {False targets efficiency in defense strategy},
  journal      = {Eur. J. Oper. Res.},
  volume       = {194},
  number       = {1},
  pages        = {155--162},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ejor.2007.11.060},
  doi          = {10.1016/J.EJOR.2007.11.060},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/LevitinH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/HauskenL09,
  author       = {Kjell Hausken and
                  Gregory Levitin},
  title        = {Minmax defense strategy for complex multi-state systems},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {94},
  number       = {2},
  pages        = {577--587},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ress.2008.06.005},
  doi          = {10.1016/J.RESS.2008.06.005},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/HauskenL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinH09,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {False targets vs. redundancy in homogeneous parallel systems},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {94},
  number       = {2},
  pages        = {588--595},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ress.2008.06.006},
  doi          = {10.1016/J.RESS.2008.06.006},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinH09a,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Parallel systems under two sequential attacks},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {94},
  number       = {3},
  pages        = {763--772},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ress.2008.08.006},
  doi          = {10.1016/J.RESS.2008.08.006},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinH09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/HauskenL09a,
  author       = {Kjell Hausken and
                  Gregory Levitin},
  title        = {Protection vs. false targets in series systems},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {94},
  number       = {5},
  pages        = {973--981},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ress.2008.11.003},
  doi          = {10.1016/J.RESS.2008.11.003},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/HauskenL09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinH09b,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Meeting a demand vs. enhancing protections in homogeneous parallel
                  systems},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {94},
  number       = {11},
  pages        = {1711--1717},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ress.2009.05.011},
  doi          = {10.1016/J.RESS.2009.05.011},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinH09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinH09c,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Intelligence and impact contests in systems with redundancy, false
                  targets, and partial protection},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {94},
  number       = {12},
  pages        = {1927--1941},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ress.2009.06.010},
  doi          = {10.1016/J.RESS.2009.06.010},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinH09c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/LevitinH09,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Redundancy vs. Protection vs. False Targets for Systems Under Attack},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {58},
  number       = {1},
  pages        = {58--68},
  year         = {2009},
  url          = {https://doi.org/10.1109/TR.2008.2011661},
  doi          = {10.1109/TR.2008.2011661},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/LevitinH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/LevitinH09a,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Redundancy vs. Protection in Defending Parallel Systems Against Unintentional
                  and Intentional Impacts},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {58},
  number       = {4},
  pages        = {679--690},
  year         = {2009},
  url          = {https://doi.org/10.1109/TR.2009.2026814},
  doi          = {10.1109/TR.2009.2026814},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/LevitinH09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/Hausken08,
  author       = {Kjell Hausken},
  title        = {Strategic defense and attack for series and parallel reliability systems},
  journal      = {Eur. J. Oper. Res.},
  volume       = {186},
  number       = {2},
  pages        = {856--881},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ejor.2007.02.013},
  doi          = {10.1016/J.EJOR.2007.02.013},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/Hausken08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/geb/Hausken08,
  author       = {Kjell Hausken},
  title        = {Whether to attack a terrorist's resource stock today or tomorrow},
  journal      = {Games Econ. Behav.},
  volume       = {64},
  number       = {2},
  pages        = {548--564},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.geb.2008.02.001},
  doi          = {10.1016/J.GEB.2008.02.001},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/geb/Hausken08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LevitinH08,
  author       = {Gregory Levitin and
                  Kjell Hausken},
  title        = {Protection vs. redundancy in homogeneous parallel systems},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {93},
  number       = {10},
  pages        = {1444--1451},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ress.2007.10.007},
  doi          = {10.1016/J.RESS.2007.10.007},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LevitinH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/Hausken08,
  author       = {Kjell Hausken},
  title        = {Strategic defense and attack for reliability systems},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {93},
  number       = {11},
  pages        = {1740--1750},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ress.2007.11.002},
  doi          = {10.1016/J.RESS.2007.11.002},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/Hausken08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/Hausken07,
  author       = {Kjell Hausken},
  title        = {Strategic Defense and Attack of Complex Networks},
  booktitle    = {6th Annual Workshop on the Economics of Information Security, {WEIS}
                  2007, The Heinz School and CyLab at Carnegie Mellon University, Pittsburgh,
                  PA, USA, June 7-8, 2007},
  year         = {2007},
  url          = {http://weis2007.econinfosec.org/papers/19.doc},
  timestamp    = {Thu, 22 Jul 2021 16:15:45 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/Hausken07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/Hausken06,
  author       = {Kjell Hausken},
  title        = {Returns to information security investment: The effect of alternative
                  information security breach functions on optimal investment and sensitivity
                  to vulnerability},
  journal      = {Inf. Syst. Frontiers},
  volume       = {8},
  number       = {5},
  pages        = {338--349},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10796-006-9011-6},
  doi          = {10.1007/S10796-006-9011-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/Hausken06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igtr/HauskenC04,
  author       = {Kjell Hausken and
                  Ross Cressman},
  title        = {Formalization of Multi-Level Games},
  journal      = {{IGTR}},
  volume       = {6},
  number       = {2},
  pages        = {195--221},
  year         = {2004},
  url          = {https://doi.org/10.1142/S0219198904000150},
  doi          = {10.1142/S0219198904000150},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/igtr/HauskenC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/HauskenM02,
  author       = {Kjell Hausken and
                  John F. Moxnes},
  title        = {Stochastic conditional and unconditional warfare},
  journal      = {Eur. J. Oper. Res.},
  volume       = {140},
  number       = {1},
  pages        = {61--87},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0377-2217(01)00229-6},
  doi          = {10.1016/S0377-2217(01)00229-6},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/HauskenM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scw/HauskenM01,
  author       = {Kjell Hausken and
                  Matthias Mohr},
  title        = {The value of a player in n-person games},
  journal      = {Soc. Choice Welf.},
  volume       = {18},
  number       = {3},
  pages        = {465--483},
  year         = {2001},
  url          = {https://doi.org/10.1007/s003550000070},
  doi          = {10.1007/S003550000070},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scw/HauskenM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}