Subject
Information Systems and Management,Management Science and Operations Research,Modelling and Simulation,General Computer Science,Industrial and Manufacturing Engineering
Reference43 articles.
1. Near optimal design of wavelength routed optical networks;Agarwal;European Journal of Operational Research,2016
2. A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism;Apostolakis;Risk Analysis,2005
3. A Bayesian model for a game of information in optimal attack/defense strategies;Azaiez,2009
4. Optimal resource allocation for security in reliability systems;Azaiez;European Journal of Operational Research,2007
5. Ben Yaghlane, A., & Azaiez, M. N. (2016). Poisson processes for modeling continuous-time attacks. Under review.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献