default search action
BibTeX records: Kjell Hausken
@article{DBLP:journals/eor/Hausken24, author = {Kjell Hausken}, title = {Fifty Years of Operations Research in Defense}, journal = {Eur. J. Oper. Res.}, volume = {318}, number = {2}, pages = {355--368}, year = {2024}, url = {https://doi.org/10.1016/j.ejor.2023.12.023}, doi = {10.1016/J.EJOR.2023.12.023}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eor/Hausken24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/games/HauskenWZ24, author = {Kjell Hausken and Jonathan W. Welburn and Jun Zhuang}, title = {A Review of Attacker-Defender Games and Cyber Security}, journal = {Games}, volume = {15}, number = {4}, pages = {28}, year = {2024}, url = {https://doi.org/10.3390/g15040028}, doi = {10.3390/G15040028}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/games/HauskenWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igtr/Hausken22, author = {Kjell Hausken}, title = {Theoretic Model of Adversaries and Media Manipulation: {A} Two-Period Extension}, journal = {{IGTR}}, volume = {24}, number = {3}, pages = {2150019:1--2150019:23}, year = {2022}, url = {https://doi.org/10.1142/S0219198921500195}, doi = {10.1142/S0219198921500195}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/igtr/Hausken22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsds/Hausken22, author = {Kjell Hausken}, title = {A Review of Axioms for Group Contest Success Functions}, journal = {Int. J. Strateg. Decis. Sci.}, volume = {13}, number = {1}, pages = {1--19}, year = {2022}, url = {https://doi.org/10.4018/ijsds.301549}, doi = {10.4018/IJSDS.301549}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsds/Hausken22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/games/WangH21, author = {Guizhou Wang and Kjell Hausken}, title = {Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency}, journal = {Games}, volume = {12}, number = {2}, pages = {34}, year = {2021}, url = {https://doi.org/10.3390/g12020034}, doi = {10.3390/G12020034}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/games/WangH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igtr/Hausken21, author = {Kjell Hausken}, title = {Governments Playing Games and Combating the Dynamics of a Terrorist Organization}, journal = {{IGTR}}, volume = {23}, number = {2}, pages = {2050013:1--2050013:26}, year = {2021}, url = {https://doi.org/10.1142/S0219198920500139}, doi = {10.1142/S0219198920500139}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/igtr/Hausken21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/HauskenW21, author = {Kjell Hausken and Jonathan W. Welburn}, title = {Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits}, journal = {Inf. Syst. Frontiers}, volume = {23}, number = {6}, pages = {1609--1620}, year = {2021}, url = {https://doi.org/10.1007/s10796-020-10054-z}, doi = {10.1007/S10796-020-10054-Z}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/HauskenW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jors/Hausken21, author = {Kjell Hausken}, title = {Government intervention to combat the dynamics of terrorist organizations}, journal = {J. Oper. Res. Soc.}, volume = {72}, number = {1}, pages = {217--226}, year = {2021}, url = {https://doi.org/10.1080/01605682.2019.1656561}, doi = {10.1080/01605682.2019.1656561}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jors/Hausken21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/Hausken21, author = {Kjell Hausken}, title = {The precautionary principle as multi-period games where players have different thresholds for acceptable uncertainty}, journal = {Reliab. Eng. Syst. Saf.}, volume = {206}, pages = {107224}, year = {2021}, url = {https://doi.org/10.1016/j.ress.2020.107224}, doi = {10.1016/J.RESS.2020.107224}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/Hausken21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/games/WangWH20, author = {Guizhou Wang and Jonathan W. Welburn and Kjell Hausken}, title = {A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling}, journal = {Games}, volume = {11}, number = {4}, pages = {64}, year = {2020}, url = {https://doi.org/10.3390/g11040064}, doi = {10.3390/G11040064}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/games/WangWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsds/HauskenN20, author = {Kjell Hausken and Mthuli Ncube}, title = {Game Theoretic Analysis of Insurgent Attacks, Government Protection, and International Intervention}, journal = {Int. J. Strateg. Decis. Sci.}, volume = {11}, number = {1}, pages = {56--75}, year = {2020}, url = {https://doi.org/10.4018/IJSDS.2020010104}, doi = {10.4018/IJSDS.2020010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsds/HauskenN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/Hausken20, author = {Kjell Hausken}, title = {Cyber resilience in firms, organizations and societies}, journal = {Internet Things}, volume = {11}, pages = {100204}, year = {2020}, url = {https://doi.org/10.1016/j.iot.2020.100204}, doi = {10.1016/J.IOT.2020.100204}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/Hausken20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ord/Hausken20, author = {Kjell Hausken}, title = {Game theoretic analysis of ideologically biased clickbait or fake news and real news}, journal = {Oper. Res. Decis.}, volume = {30}, number = {2}, year = {2020}, url = {https://doi.org/10.37190/ord200203}, doi = {10.37190/ORD200203}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ord/Hausken20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ord/Hausken20a, author = {Kjell Hausken}, title = {Governmental combat of migration between competing terrorist organisations}, journal = {Oper. Res. Decis.}, volume = {30}, number = {3}, year = {2020}, url = {https://doi.org/10.37190/ord200302}, doi = {10.37190/ORD200302}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ord/Hausken20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/da/Hausken19, author = {Kjell Hausken}, title = {Principal-Agent Theory, Game Theory, and the Precautionary Principle}, journal = {Decis. Anal.}, volume = {16}, number = {2}, pages = {105--127}, year = {2019}, url = {https://doi.org/10.1287/deca.2018.0380}, doi = {10.1287/DECA.2018.0380}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/da/Hausken19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/games/Hausken19, author = {Kjell Hausken}, title = {A Game Theoretic Model of Adversaries and Media Manipulation}, journal = {Games}, volume = {10}, number = {4}, pages = {48}, year = {2019}, url = {https://doi.org/10.3390/g10040048}, doi = {10.3390/G10040048}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/games/Hausken19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jors/Hausken19, author = {Kjell Hausken}, title = {Defence and attack of complex interdependent systems}, journal = {J. Oper. Res. Soc.}, volume = {70}, number = {3}, pages = {364--376}, year = {2019}, url = {https://doi.org/10.1080/01605682.2018.1438763}, doi = {10.1080/01605682.2018.1438763}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jors/Hausken19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcs/Hausken19, author = {Kjell Hausken}, title = {Governmental combat of the dynamics of multiple competing terrorist organizations}, journal = {Math. Comput. Simul.}, volume = {166}, pages = {33--55}, year = {2019}, url = {https://doi.org/10.1016/j.matcom.2019.04.003}, doi = {10.1016/J.MATCOM.2019.04.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcs/Hausken19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igtr/Hausken18, author = {Kjell Hausken}, title = {Proactivity and Retroactivity of Firms and Information Sharing of Hackers}, journal = {{IGTR}}, volume = {20}, number = {1}, pages = {1750027:1--1750027:30}, year = {2018}, url = {https://doi.org/10.1142/S021919891750027X}, doi = {10.1142/S021919891750027X}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/igtr/Hausken18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/RaoMHHY018, author = {Nageswara S. V. Rao and Chris Y. T. Ma and Kjell Hausken and Fei He and David K. Y. Yau and Jun Zhuang}, title = {Defense Strategies for Asymmetric Networked Systems with Discrete Components}, journal = {Sensors}, volume = {18}, number = {5}, pages = {1421}, year = {2018}, url = {https://doi.org/10.3390/s18051421}, doi = {10.3390/S18051421}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/RaoMHHY018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/Hausken17, author = {Kjell Hausken}, title = {Defense and attack for interdependent systems}, journal = {Eur. J. Oper. Res.}, volume = {256}, number = {2}, pages = {582--591}, year = {2017}, url = {https://doi.org/10.1016/j.ejor.2016.06.033}, doi = {10.1016/J.EJOR.2016.06.033}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eor/Hausken17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/games/Hausken17, author = {Kjell Hausken}, title = {Security Investment, Hacking, and Information Sharing between Firms and between Hackers}, journal = {Games}, volume = {8}, number = {2}, pages = {23}, year = {2017}, url = {https://doi.org/10.3390/g8020023}, doi = {10.3390/G8020023}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/games/Hausken17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igtr/Hausken17, author = {Kjell Hausken}, title = {Information Sharing Among Cyber Hackers in Successive Attacks}, journal = {{IGTR}}, volume = {19}, number = {2}, pages = {1750010:1--1750010:33}, year = {2017}, url = {https://doi.org/10.1142/S0219198917500104}, doi = {10.1142/S0219198917500104}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/igtr/Hausken17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/Hausken17, author = {Kjell Hausken}, title = {Special versus general protection and attack of parallel and series components}, journal = {Reliab. Eng. Syst. Saf.}, volume = {165}, pages = {239--256}, year = {2017}, url = {https://doi.org/10.1016/j.ress.2017.03.027}, doi = {10.1016/J.RESS.2017.03.027}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/Hausken17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fusion/RaoMHHY017, author = {Nageswara S. V. Rao and Chris Y. T. Ma and Kjell Hausken and Fei He and David K. Y. Yau and Jun Zhuang}, title = {Game-theoretic strategies for asymmetric networked systems}, booktitle = {20th International Conference on Information Fusion, {FUSION} 2017, Xi'an, China, July 10-13, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICIF.2017.8009874}, doi = {10.23919/ICIF.2017.8009874}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fusion/RaoMHHY017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfi/RaoMHHY017, author = {Nageswara S. V. Rao and Chris Y. T. Ma and Kjell Hausken and Fei He and David K. Y. Yau and Jun Zhuang}, title = {Defense strategies for asymmetric networked systems under composite utilities}, booktitle = {2017 {IEEE} International Conference on Multisensor Fusion and Integration for Intelligent Systems, {MFI} 2017, Daegu, Korea (South), November 16-18, 2017}, pages = {384--389}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MFI.2017.8170351}, doi = {10.1109/MFI.2017.8170351}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mfi/RaoMHHY017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/syscon/RaoIMHH017, author = {Nageswara S. V. Rao and Neena Imam and Chris Y. T. Ma and Kjell Hausken and Fei He and Jun Zhuang}, title = {On defense strategies for system of systems using aggregated correlations}, booktitle = {2017 Annual {IEEE} International Systems Conference, SysCon 2017, Montreal, QC, Canada, April 24-27, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SYSCON.2017.7934817}, doi = {10.1109/SYSCON.2017.7934817}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/syscon/RaoIMHH017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/anor/Hausken016, author = {Kjell Hausken and Jun Zhuang}, title = {The strategic interaction between a company and the government surrounding disasters}, journal = {Ann. Oper. Res.}, volume = {237}, number = {1-2}, pages = {27--40}, year = {2016}, url = {https://doi.org/10.1007/s10479-014-1684-5}, doi = {10.1007/S10479-014-1684-5}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/anor/Hausken016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igtr/HauskenN16, author = {Kjell Hausken and Mthuli Ncube}, title = {How Elections are Impacted by Production, Economic Growth and Conflict}, journal = {{IGTR}}, volume = {18}, number = {1}, pages = {1550015:1--1550015:29}, year = {2016}, url = {https://doi.org/10.1142/S0219198915500152}, doi = {10.1142/S0219198915500152}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/igtr/HauskenN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fusion/RaoMHH016, author = {Nageswara S. V. Rao and Chris Y. T. Ma and Kjell Hausken and Fei He and Jun Zhuang}, title = {Defense strategies for infrastructures with multiple systems of components}, booktitle = {19th International Conference on Information Fusion, {FUSION} 2016, Heidelberg, Germany, July 5-8, 2016}, pages = {270--277}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7527898/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fusion/RaoMHH016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfi/RaoMHH016, author = {Nageswara S. V. Rao and Chris Y. T. Ma and Kjell Hausken and Fei He and Jun Zhuang}, title = {Game-theoretic strategies for systems of components using product-form utilities}, booktitle = {2016 {IEEE} International Conference on Multisensor Fusion and Integration for Intelligent Systems, {MFI} 2016, Baden-Baden, Germany, September 19-21, 2016}, pages = {341--346}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/MFI.2016.7849511}, doi = {10.1109/MFI.2016.7849511}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mfi/RaoMHH016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/WelburnH15, author = {Jonathan W. Welburn and Kjell Hausken}, title = {A game theoretic model of economic crises}, journal = {Appl. Math. Comput.}, volume = {266}, pages = {738--762}, year = {2015}, url = {https://doi.org/10.1016/j.amc.2015.05.093}, doi = {10.1016/J.AMC.2015.05.093}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/WelburnH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cejor/Hausken14, author = {Kjell Hausken}, title = {Individual versus overarching protection and attack of assets}, journal = {Central Eur. J. Oper. Res.}, volume = {22}, number = {1}, pages = {89--112}, year = {2014}, url = {https://doi.org/10.1007/s10100-012-0271-6}, doi = {10.1007/S10100-012-0271-6}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cejor/Hausken14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Hausken14, author = {Kjell Hausken}, title = {Returns to information security investment: Endogenizing the expected loss}, journal = {Inf. Syst. Frontiers}, volume = {16}, number = {2}, pages = {329--336}, year = {2014}, url = {https://doi.org/10.1007/s10796-012-9390-9}, doi = {10.1007/S10796-012-9390-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Hausken14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinHD14, author = {Gregory Levitin and Kjell Hausken and Yuanshun Dai}, title = {Optimal defense with variable number of overarching and individual protections}, journal = {Reliab. Eng. Syst. Saf.}, volume = {123}, pages = {81--90}, year = {2014}, url = {https://doi.org/10.1016/j.ress.2013.11.001}, doi = {10.1016/J.RESS.2013.11.001}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LevitinHD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apjor/Hausken13, author = {Kjell Hausken}, title = {Combined Series and Parallel Systems subject to Individual versus Overarching Defense and Attack}, journal = {Asia Pac. J. Oper. Res.}, volume = {30}, number = {2}, year = {2013}, url = {https://doi.org/10.1142/S021759591250056X}, doi = {10.1142/S021759591250056X}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apjor/Hausken13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cejor/LevitinH13, author = {Gregory Levitin and Kjell Hausken}, title = {Parallel systems under two sequential attacks with contest intensity variation}, journal = {Central Eur. J. Oper. Res.}, volume = {21}, number = {1}, pages = {207--224}, year = {2013}, url = {https://doi.org/10.1007/s10100-011-0225-4}, doi = {10.1007/S10100-011-0225-4}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cejor/LevitinH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/Hausken013, author = {Kjell Hausken and Jun Zhuang}, title = {The impact of disaster on the strategic interaction between company and government}, journal = {Eur. J. Oper. Res.}, volume = {225}, number = {2}, pages = {363--376}, year = {2013}, url = {https://doi.org/10.1016/j.ejor.2012.09.047}, doi = {10.1016/J.EJOR.2012.09.047}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eor/Hausken013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jors/LevitinH13, author = {Gregory Levitin and Kjell Hausken}, title = {Defence resource distribution between protection and decoys for constant resource stockpiling pace}, journal = {J. Oper. Res. Soc.}, volume = {64}, number = {9}, pages = {1409--1417}, year = {2013}, url = {https://doi.org/10.1057/jors.2012.117}, doi = {10.1057/JORS.2012.117}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jors/LevitinH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinHB13, author = {Gregory Levitin and Kjell Hausken and Hanoch Ben{-}Haim}, title = {Defending majority voting systems against a strategic attacker}, journal = {Reliab. Eng. Syst. Saf.}, volume = {111}, pages = {37--44}, year = {2013}, url = {https://doi.org/10.1016/j.ress.2012.10.004}, doi = {10.1016/J.RESS.2012.10.004}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LevitinHB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinH13, author = {Gregory Levitin and Kjell Hausken}, title = {Is it wise to leave some false targets unprotected?}, journal = {Reliab. Eng. Syst. Saf.}, volume = {112}, pages = {176--186}, year = {2013}, url = {https://doi.org/10.1016/j.ress.2012.11.015}, doi = {10.1016/J.RESS.2012.11.015}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LevitinH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/BierH13, author = {Vicki M. Bier and Kjell Hausken}, title = {Defending and attacking a network of two arcs subject to traffic congestion}, journal = {Reliab. Eng. Syst. Saf.}, volume = {112}, pages = {214--224}, year = {2013}, url = {https://doi.org/10.1016/j.ress.2012.11.016}, doi = {10.1016/J.RESS.2012.11.016}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/BierH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinHD13, author = {Gregory Levitin and Kjell Hausken and Yuanshun Dai}, title = {Individual vs. overarching protection for minimizing the expected damage caused by an attack}, journal = {Reliab. Eng. Syst. Saf.}, volume = {119}, pages = {117--125}, year = {2013}, url = {https://doi.org/10.1016/j.ress.2013.05.024}, doi = {10.1016/J.RESS.2013.05.024}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LevitinHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/LevitinH13, author = {Gregory Levitin and Kjell Hausken}, title = {Defending Threshold Voting Systems With Identical Voting Units}, journal = {{IEEE} Trans. Reliab.}, volume = {62}, number = {2}, pages = {466--477}, year = {2013}, url = {https://doi.org/10.1109/TR.2013.2255794}, doi = {10.1109/TR.2013.2255794}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/LevitinH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igtr/Hausken12, author = {Kjell Hausken}, title = {On the Impossibility of Deterrence in Sequential Colonel Blotto Games}, journal = {{IGTR}}, volume = {14}, number = {2}, year = {2012}, url = {https://doi.org/10.1142/S0219198912500119}, doi = {10.1142/S0219198912500119}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/igtr/Hausken12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/Hausken12, author = {Kjell Hausken}, title = {Terrorism risks, civil liberties, and privacy concerns}, journal = {Int. J. Crit. Infrastructures}, volume = {8}, number = {4}, pages = {293--305}, year = {2012}, url = {https://doi.org/10.1504/IJCIS.2012.050099}, doi = {10.1504/IJCIS.2012.050099}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/Hausken12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jors/Hausken012, author = {Kjell Hausken and Jun Zhuang}, title = {The timing and deterrence of terrorist attacks due to exogenous dynamics}, journal = {J. Oper. Res. Soc.}, volume = {63}, number = {6}, pages = {726--735}, year = {2012}, url = {https://doi.org/10.1057/jors.2011.79}, doi = {10.1057/JORS.2011.79}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jors/Hausken012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jors/LevitinH12, author = {Gregory Levitin and Kjell Hausken}, title = {Individual \emph{versus} overarching protection against strategic attacks}, journal = {J. Oper. Res. Soc.}, volume = {63}, number = {7}, pages = {969--981}, year = {2012}, url = {https://doi.org/10.1057/jors.2011.96}, doi = {10.1057/JORS.2011.96}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jors/LevitinH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jors/LevitinH12a, author = {Gregory Levitin and Kjell Hausken}, title = {Parallel systems under two sequential attacks with imperfect detection of the first attack outcome}, journal = {J. Oper. Res. Soc.}, volume = {63}, number = {11}, pages = {1545--1555}, year = {2012}, url = {https://doi.org/10.1057/jors.2012.4}, doi = {10.1057/JORS.2012.4}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jors/LevitinH12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinHTC12, author = {Gregory Levitin and Kjell Hausken and Heidi A. Taboada and David W. Coit}, title = {Data survivability vs. security in information systems}, journal = {Reliab. Eng. Syst. Saf.}, volume = {100}, pages = {19--27}, year = {2012}, url = {https://doi.org/10.1016/j.ress.2011.12.015}, doi = {10.1016/J.RESS.2011.12.015}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ress/LevitinHTC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/anor/BierH11, author = {Vicki M. Bier and Kjell Hausken}, title = {Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures}, journal = {Ann. Oper. Res.}, volume = {186}, number = {1}, pages = {39--59}, year = {2011}, url = {https://doi.org/10.1007/s10479-010-0833-8}, doi = {10.1007/S10479-010-0833-8}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/anor/BierH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apjor/LevitinHB11, author = {Gregory Levitin and Kjell Hausken and Hanoch Ben{-}Haim}, title = {Active and Passive Defense against Multiple Attack Facilities}, journal = {Asia Pac. J. Oper. Res.}, volume = {28}, number = {4}, pages = {431--444}, year = {2011}, url = {https://doi.org/10.1142/S021759591100317X}, doi = {10.1142/S021759591100317X}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apjor/LevitinHB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cejor/HauskenL11, author = {Kjell Hausken and Gregory Levitin}, title = {Shield versus sword resource distribution in K-round duels}, journal = {Central Eur. J. Oper. Res.}, volume = {19}, number = {4}, pages = {589--603}, year = {2011}, url = {https://doi.org/10.1007/s10100-010-0148-5}, doi = {10.1007/S10100-010-0148-5}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cejor/HauskenL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/da/HauskenZ11, author = {Kjell Hausken and Jun Zhuang}, title = {Governments' and Terrorists' Defense and Attack in a \emph{T}-Period Game}, journal = {Decis. Anal.}, volume = {8}, number = {1}, pages = {46--70}, year = {2011}, url = {https://doi.org/10.1287/deca.1100.0194}, doi = {10.1287/DECA.1100.0194}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/da/HauskenZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/HauskenB11, author = {Kjell Hausken and Vicki M. Bier}, title = {Defending against multiple different attackers}, journal = {Eur. J. Oper. Res.}, volume = {211}, number = {2}, pages = {370--384}, year = {2011}, url = {https://doi.org/10.1016/j.ejor.2010.12.013}, doi = {10.1016/J.EJOR.2010.12.013}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eor/HauskenB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igtr/HauskenL11, author = {Kjell Hausken and Gregory Levitin}, title = {Active vs. Passive Defense against a Strategic Attacker}, journal = {{IGTR}}, volume = {13}, number = {1}, pages = {1--12}, year = {2011}, url = {https://doi.org/10.1142/S0219198911002812}, doi = {10.1142/S0219198911002812}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/igtr/HauskenL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igtr/Hausken11, author = {Kjell Hausken}, title = {Game Theoretic Analysis of Two-Period-Dependent Degraded Multistate Reliability Systems}, journal = {{IGTR}}, volume = {13}, number = {3}, pages = {247--267}, year = {2011}, url = {https://doi.org/10.1142/S0219198911002988}, doi = {10.1142/S0219198911002988}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/igtr/Hausken11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsysc/Hausken11, author = {Kjell Hausken}, title = {Protecting complex infrastructures against multiple strategic attackers}, journal = {Int. J. Syst. Sci.}, volume = {42}, number = {1}, pages = {11--29}, year = {2011}, url = {https://doi.org/10.1080/00207720903434789}, doi = {10.1080/00207720903434789}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsysc/Hausken11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinH11, author = {Gregory Levitin and Kjell Hausken}, title = {Preventive strike vs. false targets and protection in defense strategy}, journal = {Reliab. Eng. Syst. Saf.}, volume = {96}, number = {8}, pages = {912--924}, year = {2011}, url = {https://doi.org/10.1016/j.ress.2011.03.008}, doi = {10.1016/J.RESS.2011.03.008}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LevitinH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinH11a, author = {Gregory Levitin and Kjell Hausken}, title = {Is it wise to protect false targets?}, journal = {Reliab. Eng. Syst. Saf.}, volume = {96}, number = {12}, pages = {1647--1656}, year = {2011}, url = {https://doi.org/10.1016/j.ress.2011.07.012}, doi = {10.1016/J.RESS.2011.07.012}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LevitinH11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/LevitinH10, author = {Gregory Levitin and Kjell Hausken}, title = {Separation in homogeneous systems with independent identical elements}, journal = {Eur. J. Oper. Res.}, volume = {203}, number = {3}, pages = {625--634}, year = {2010}, url = {https://doi.org/10.1016/j.ejor.2009.08.016}, doi = {10.1016/J.EJOR.2009.08.016}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eor/LevitinH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jors/LevitinH10, author = {Gregory Levitin and Kjell Hausken}, title = {Defence and attack of systems with variable attacker system structure detection probability}, journal = {J. Oper. Res. Soc.}, volume = {61}, number = {1}, pages = {124--133}, year = {2010}, url = {https://doi.org/10.1057/jors.2008.158}, doi = {10.1057/JORS.2008.158}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jors/LevitinH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/Hausken10, author = {Kjell Hausken}, title = {Defense and attack of complex and dependent systems}, journal = {Reliab. Eng. Syst. Saf.}, volume = {95}, number = {1}, pages = {29--42}, year = {2010}, url = {https://doi.org/10.1016/j.ress.2009.07.006}, doi = {10.1016/J.RESS.2009.07.006}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/Hausken10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinH10, author = {Gregory Levitin and Kjell Hausken}, title = {Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems}, journal = {Reliab. Eng. Syst. Saf.}, volume = {95}, number = {5}, pages = {565--572}, year = {2010}, url = {https://doi.org/10.1016/j.ress.2010.01.007}, doi = {10.1016/J.RESS.2010.01.007}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LevitinH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/LevitinH09, author = {Gregory Levitin and Kjell Hausken}, title = {False targets efficiency in defense strategy}, journal = {Eur. J. Oper. Res.}, volume = {194}, number = {1}, pages = {155--162}, year = {2009}, url = {https://doi.org/10.1016/j.ejor.2007.11.060}, doi = {10.1016/J.EJOR.2007.11.060}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eor/LevitinH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/HauskenL09, author = {Kjell Hausken and Gregory Levitin}, title = {Minmax defense strategy for complex multi-state systems}, journal = {Reliab. Eng. Syst. Saf.}, volume = {94}, number = {2}, pages = {577--587}, year = {2009}, url = {https://doi.org/10.1016/j.ress.2008.06.005}, doi = {10.1016/J.RESS.2008.06.005}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/HauskenL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinH09, author = {Gregory Levitin and Kjell Hausken}, title = {False targets vs. redundancy in homogeneous parallel systems}, journal = {Reliab. Eng. Syst. Saf.}, volume = {94}, number = {2}, pages = {588--595}, year = {2009}, url = {https://doi.org/10.1016/j.ress.2008.06.006}, doi = {10.1016/J.RESS.2008.06.006}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LevitinH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinH09a, author = {Gregory Levitin and Kjell Hausken}, title = {Parallel systems under two sequential attacks}, journal = {Reliab. Eng. Syst. Saf.}, volume = {94}, number = {3}, pages = {763--772}, year = {2009}, url = {https://doi.org/10.1016/j.ress.2008.08.006}, doi = {10.1016/J.RESS.2008.08.006}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LevitinH09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/HauskenL09a, author = {Kjell Hausken and Gregory Levitin}, title = {Protection vs. false targets in series systems}, journal = {Reliab. Eng. Syst. Saf.}, volume = {94}, number = {5}, pages = {973--981}, year = {2009}, url = {https://doi.org/10.1016/j.ress.2008.11.003}, doi = {10.1016/J.RESS.2008.11.003}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/HauskenL09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinH09b, author = {Gregory Levitin and Kjell Hausken}, title = {Meeting a demand vs. enhancing protections in homogeneous parallel systems}, journal = {Reliab. Eng. Syst. Saf.}, volume = {94}, number = {11}, pages = {1711--1717}, year = {2009}, url = {https://doi.org/10.1016/j.ress.2009.05.011}, doi = {10.1016/J.RESS.2009.05.011}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LevitinH09b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinH09c, author = {Gregory Levitin and Kjell Hausken}, title = {Intelligence and impact contests in systems with redundancy, false targets, and partial protection}, journal = {Reliab. Eng. Syst. Saf.}, volume = {94}, number = {12}, pages = {1927--1941}, year = {2009}, url = {https://doi.org/10.1016/j.ress.2009.06.010}, doi = {10.1016/J.RESS.2009.06.010}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LevitinH09c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/LevitinH09, author = {Gregory Levitin and Kjell Hausken}, title = {Redundancy vs. Protection vs. False Targets for Systems Under Attack}, journal = {{IEEE} Trans. Reliab.}, volume = {58}, number = {1}, pages = {58--68}, year = {2009}, url = {https://doi.org/10.1109/TR.2008.2011661}, doi = {10.1109/TR.2008.2011661}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/LevitinH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/LevitinH09a, author = {Gregory Levitin and Kjell Hausken}, title = {Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts}, journal = {{IEEE} Trans. Reliab.}, volume = {58}, number = {4}, pages = {679--690}, year = {2009}, url = {https://doi.org/10.1109/TR.2009.2026814}, doi = {10.1109/TR.2009.2026814}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/LevitinH09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/Hausken08, author = {Kjell Hausken}, title = {Strategic defense and attack for series and parallel reliability systems}, journal = {Eur. J. Oper. Res.}, volume = {186}, number = {2}, pages = {856--881}, year = {2008}, url = {https://doi.org/10.1016/j.ejor.2007.02.013}, doi = {10.1016/J.EJOR.2007.02.013}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eor/Hausken08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/geb/Hausken08, author = {Kjell Hausken}, title = {Whether to attack a terrorist's resource stock today or tomorrow}, journal = {Games Econ. Behav.}, volume = {64}, number = {2}, pages = {548--564}, year = {2008}, url = {https://doi.org/10.1016/j.geb.2008.02.001}, doi = {10.1016/J.GEB.2008.02.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/geb/Hausken08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LevitinH08, author = {Gregory Levitin and Kjell Hausken}, title = {Protection vs. redundancy in homogeneous parallel systems}, journal = {Reliab. Eng. Syst. Saf.}, volume = {93}, number = {10}, pages = {1444--1451}, year = {2008}, url = {https://doi.org/10.1016/j.ress.2007.10.007}, doi = {10.1016/J.RESS.2007.10.007}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LevitinH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/Hausken08, author = {Kjell Hausken}, title = {Strategic defense and attack for reliability systems}, journal = {Reliab. Eng. Syst. Saf.}, volume = {93}, number = {11}, pages = {1740--1750}, year = {2008}, url = {https://doi.org/10.1016/j.ress.2007.11.002}, doi = {10.1016/J.RESS.2007.11.002}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/Hausken08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/Hausken07, author = {Kjell Hausken}, title = {Strategic Defense and Attack of Complex Networks}, booktitle = {6th Annual Workshop on the Economics of Information Security, {WEIS} 2007, The Heinz School and CyLab at Carnegie Mellon University, Pittsburgh, PA, USA, June 7-8, 2007}, year = {2007}, url = {http://weis2007.econinfosec.org/papers/19.doc}, timestamp = {Thu, 22 Jul 2021 16:15:45 +0200}, biburl = {https://dblp.org/rec/conf/weis/Hausken07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Hausken06, author = {Kjell Hausken}, title = {Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability}, journal = {Inf. Syst. Frontiers}, volume = {8}, number = {5}, pages = {338--349}, year = {2006}, url = {https://doi.org/10.1007/s10796-006-9011-6}, doi = {10.1007/S10796-006-9011-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/Hausken06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igtr/HauskenC04, author = {Kjell Hausken and Ross Cressman}, title = {Formalization of Multi-Level Games}, journal = {{IGTR}}, volume = {6}, number = {2}, pages = {195--221}, year = {2004}, url = {https://doi.org/10.1142/S0219198904000150}, doi = {10.1142/S0219198904000150}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/igtr/HauskenC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/HauskenM02, author = {Kjell Hausken and John F. Moxnes}, title = {Stochastic conditional and unconditional warfare}, journal = {Eur. J. Oper. Res.}, volume = {140}, number = {1}, pages = {61--87}, year = {2002}, url = {https://doi.org/10.1016/S0377-2217(01)00229-6}, doi = {10.1016/S0377-2217(01)00229-6}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eor/HauskenM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scw/HauskenM01, author = {Kjell Hausken and Matthias Mohr}, title = {The value of a player in n-person games}, journal = {Soc. Choice Welf.}, volume = {18}, number = {3}, pages = {465--483}, year = {2001}, url = {https://doi.org/10.1007/s003550000070}, doi = {10.1007/S003550000070}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scw/HauskenM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.