[1] |
Azaiez, N.; Bier, V. M.: Optimal resource allocation for security in reliability systems, European journal of operational research 181, 773-786 (2007) · Zbl 1131.90001
· doi:10.1016/j.ejor.2006.03.057 |

[2] |
Bier, V. M.; Abhichandani, V.: Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries, (2002) |

[3] |
Bier, V. M.; Nagaraj, A.; Abhichandani, V.: Protection of simple series and parallel systems with components of different values, Reliability engineering and system safety 87, 315-323 (2005) |

[4] |
Bier, V. M.; Oliveros, S.; Samuelson, L.: Choosing what to protect: strategic defense allocation against an unknown attacker, Journal of public economic theory 9, 563-587 (2007) |

[5] |
Fudenberg, D. M.; Tirole, J.: Game theory, (1991) · Zbl 0596.90015 |

[6] |
Gordon, L. A.; Loeb, M.: The economics of information security investment, ACM transactions on information and system security 5, No. 4, 438-457 (2002) |

[7] |
Hausken, K.: Probabilistic risk analysis and game theory, Risk analysis 22, No. 1, 17-27 (2002) |

[8] |
Hausken, K.: Production and conflict models versus rent seeking models, Public choice 123, 59-93 (2005) |

[9] |
Hausken, K.: Income, interdependence, and substitution effects affecting incentives for security investment, Journal of accounting and public policy 25, No. 6, 629-665 (2006) |

[10] |
Hausken, K.: Strategic defense and attack for series and parallel reliability systems, European journal of operational research 186, No. 2, 856-881 (2008) · Zbl 1138.91367
· doi:10.1016/j.ejor.2007.02.013 |

[11] |
Hirshleifer, J.: Anarchy and its breakdown, Journal of political economy 103, No. 1, 26-52 (1995) |

[12] |
Kunreuther, H.; Heal, G.: Interdependent security, The journal of risk and uncertainty 26, No. 2/3, 231-249 (2003) · Zbl 1040.91062
· doi:10.1023/A:1024119208153 |

[13] |
Levitin, G.: Optimal multilevel protection in series-parallel systems, Reliability engineering and system safety 81, 93-102 (2003) |

[14] |
Levitin, G.: Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes, European journal of operational research 150, 406-419 (2003) · Zbl 1137.90454
· doi:10.1016/S0377-2217(02)00506-4 |

[15] |
Levitin, G.: Optimal defense strategy against intentional attacks, IEEE transactions on reliability 56, No. 1, 148-157 (2007) |

[16] |
Levitin, G.; Lisnianski, A.: Optimal separation of elements in vulnerable multi-state systems, Reliability engineering and system safety 73, 55-66 (2001) |

[17] |
Levitin, G.; Lisnianski, A.: Optimizing survivability of vulnerable series-parallel multi-state systems, Reliability engineering and system safety 79, 319-331 (2003) |

[18] |
Levitin, G.; Dai, Y.; Xie, M.; Poh, K. L.: Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm, Reliability engineering and system safety 82, 93-104 (2003) |

[19] |
Schelling, T.: The strategy of conflict, (1960) · Zbl 0089.37801 |

[20] |
Skaperdas, S.: Contest success functions, Economic theory 7, 283-290 (1996) · Zbl 0852.90137 |

[21] |
Tullock, G.: Efficient rent-seeking, Toward a theory of the rent-seeking society, 97-112 (1980) |