| Journal Article |
File Downloads |
Abstract Views |
| Last month |
3 months |
12 months |
Total |
Last month |
3 months |
12 months |
Total |
| "Service user involvement in practice": The evaluation of an intervention program for service providers and inpatients in Norwegian Community Mental Health Centers |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
12 |
| A Bitcoin price prediction model assuming oscillatory growth and lengthening cycles |
0 |
1 |
1 |
3 |
0 |
5 |
8 |
12 |
| A Game Theoretic Analysis of Competition Between Vaccine and Drug Companies during Disease Contraction and Recovery |
0 |
0 |
0 |
1 |
0 |
1 |
1 |
3 |
| A Game Theoretic Model of Adversaries and Media Manipulation |
0 |
0 |
0 |
1 |
1 |
1 |
5 |
30 |
| A Game-Theoretic Analysis of the Coexistence and Competition Between Hard and Fiat Money |
0 |
1 |
1 |
1 |
2 |
4 |
6 |
6 |
| A Generalized Interest Rates Model with Scaling |
0 |
0 |
0 |
5 |
1 |
1 |
2 |
17 |
| A MATHEMATICAL MODEL FOR TRAINING IMPULSE AND LACTATE INFLUX AND OUTFLUX DURING EXERCISE |
0 |
0 |
0 |
2 |
0 |
0 |
0 |
15 |
| A Qualitative Identification of Categories of Patient Participation in Decision-Making by Health Care Professionals and Patients During Surgical Treatment |
0 |
0 |
0 |
1 |
0 |
1 |
1 |
5 |
| A Review of Attacker–Defender Games and Cyber Security |
0 |
0 |
1 |
1 |
2 |
4 |
13 |
13 |
| A Review of Axioms for Group Contest Success Functions |
0 |
0 |
0 |
2 |
0 |
0 |
1 |
7 |
| A Review of Game Theory and Risk and Reliability Analysis in Infrastructures and Networks |
0 |
1 |
1 |
1 |
2 |
8 |
9 |
9 |
| A Review of Game Theory in Pandemics, Social Media Rumors, and Disasters |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
| A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling |
0 |
0 |
1 |
4 |
2 |
2 |
5 |
18 |
| A closure approximation technique for epidemic models |
0 |
0 |
0 |
2 |
0 |
0 |
2 |
10 |
| A cost–benefit analysis of terrorist attacks |
1 |
1 |
6 |
29 |
2 |
3 |
17 |
102 |
| A dynamic model of Nordic diagonal stride skiing, with a literature review of cross country skiing |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
6 |
| A first experimental test of multilevel game theory: the PD case |
0 |
0 |
0 |
6 |
0 |
0 |
1 |
30 |
| A game between central banks and households involving central bank digital currencies, other digital currencies and negative interest rates |
0 |
0 |
0 |
2 |
0 |
0 |
2 |
7 |
| A game theoretic model of economic crises |
1 |
1 |
1 |
2 |
1 |
2 |
3 |
49 |
| ACTIVE VS. PASSIVE DEFENSE AGAINST A STRATEGIC ATTACKER |
0 |
0 |
1 |
17 |
3 |
4 |
7 |
95 |
| Acquisition and collaboration as determinants of organisational structure |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
6 |
| Additive multi-effort contests |
1 |
1 |
1 |
4 |
1 |
1 |
6 |
29 |
| Additive multi-effort contests with multiple investment opportunities |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
5 |
| Agent takeover risk of principal in outsourcing relationships |
0 |
0 |
1 |
15 |
2 |
3 |
9 |
99 |
| Al Qaeda at the bar: coordinating ideologues and mercenaries in terrorist organizations |
0 |
0 |
0 |
9 |
2 |
3 |
6 |
81 |
| An enabling mechanism for the creation, adjustment, and dissolution of states and governmental units |
1 |
1 |
2 |
15 |
1 |
4 |
9 |
360 |
| An equilibrium model of advertising, production and exchange |
0 |
0 |
0 |
9 |
1 |
1 |
3 |
52 |
| Approximations and empirics for stochastic war equations |
0 |
0 |
0 |
1 |
0 |
0 |
2 |
10 |
| Assessing the 2010–2018 financial crisis in Greece, Portugal, Ireland, Spain, and Cyprus |
0 |
0 |
0 |
2 |
0 |
0 |
2 |
8 |
| Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits |
0 |
0 |
0 |
2 |
2 |
2 |
4 |
9 |
| Axiomatizing additive multi-effort contests |
0 |
0 |
0 |
0 |
1 |
1 |
2 |
6 |
| Bilateral contracts with transaction costs |
0 |
0 |
0 |
3 |
0 |
0 |
0 |
40 |
| Book Review |
0 |
0 |
0 |
5 |
2 |
2 |
3 |
41 |
| COMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACK |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
11 |
| Choosing what to protect when attacker resources and asset valuations are uncertain |
0 |
0 |
0 |
6 |
2 |
2 |
6 |
70 |
| Collective rent seeking and division of labor1 |
0 |
0 |
0 |
9 |
0 |
1 |
1 |
60 |
| Comparing Growth Models with Other Investment Methods |
1 |
1 |
3 |
8 |
1 |
1 |
4 |
22 |
| Competition between Variable–Supply and Fixed–Supply Currencies |
0 |
0 |
0 |
0 |
1 |
1 |
3 |
7 |
| Containing Contagious Financial Crises: The Political Economy of Joint Intervention into the Asian Crisis |
0 |
0 |
0 |
53 |
0 |
0 |
0 |
184 |
| Conventionalists, Pioneers and Criminals Choosing Between a National Currency and a Global Currency |
0 |
0 |
0 |
3 |
0 |
0 |
0 |
12 |
| Cooperation and between-group competition |
0 |
0 |
0 |
53 |
1 |
5 |
6 |
189 |
| Cross-country skiing motion equations, locomotive forces and mass scaling laws |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
6 |
| Data survivability vs. security in information systems |
0 |
0 |
0 |
2 |
0 |
0 |
1 |
23 |
| Debt crises between a country and an international lender as a two-period game |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
3 |
| Decisions of persons, the pharmaceutical industry, and donors in disease contraction and recovery assuming virus mutation |
0 |
0 |
0 |
1 |
1 |
1 |
1 |
5 |
| Defence and attack of complex interdependent systems |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
15 |
| Defence and attack of systems with variable attacker system structure detection probability |
0 |
0 |
1 |
1 |
0 |
1 |
2 |
20 |
| Defence of homogeneous parallel multi-state systems subject to two sequential attacks |
0 |
0 |
0 |
1 |
0 |
1 |
1 |
7 |
| Defence resource distribution between protection and decoys for constant resource stockpiling pace |
0 |
0 |
0 |
4 |
0 |
0 |
1 |
19 |
| Defending Against a Stockpiling Terrorist |
0 |
0 |
0 |
1 |
1 |
1 |
1 |
15 |
| Defending against multiple different attackers |
0 |
0 |
0 |
17 |
1 |
1 |
1 |
65 |
| Defending and attacking a network of two arcs subject to traffic congestion |
0 |
0 |
0 |
0 |
0 |
1 |
2 |
26 |
| Defending majority voting systems against a strategic attacker |
0 |
0 |
0 |
2 |
0 |
0 |
2 |
17 |
| Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
14 |
| Defense and attack for interdependent systems |
0 |
1 |
1 |
5 |
0 |
3 |
5 |
64 |
| Defense and attack of complex and dependent systems |
0 |
0 |
0 |
4 |
0 |
1 |
2 |
21 |
| Determinants of Election Outcomes: New Evidence from Africa |
0 |
0 |
0 |
5 |
1 |
1 |
2 |
49 |
| Determining the ideological orientation of terrorist organisations: the effects of government repression and organised crime |
0 |
0 |
1 |
13 |
2 |
2 |
6 |
80 |
| Do national development factors affect cryptocurrency adoption? |
0 |
0 |
2 |
10 |
1 |
3 |
10 |
41 |
| EVIDENCE ON THE IMPACT OF THE TROUBLED ASSETS RELIEF PROGRAM ON STOCK RETURNS |
0 |
0 |
1 |
28 |
0 |
1 |
4 |
112 |
| EVIDENCE ON THE TROUBLED ASSETS RELIEF PROGRAM, BAILOUT SIZE, RETURNS AND TAIL RISK |
0 |
0 |
0 |
8 |
1 |
1 |
1 |
27 |
| EXCHANGE, RAIDING, AND THE SHADOW OF THE FUTURE |
0 |
0 |
0 |
6 |
0 |
0 |
0 |
49 |
| Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity |
0 |
0 |
0 |
0 |
0 |
0 |
3 |
10 |
| Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures |
0 |
0 |
0 |
2 |
1 |
1 |
2 |
26 |
| Ethics and efficiency in organizations |
0 |
0 |
0 |
0 |
1 |
1 |
1 |
1 |
| Evaluating Performance Training and Step Aerobics in Intervals |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
8 |
| Exchange of goods while investing into production and safety |
0 |
0 |
0 |
5 |
1 |
3 |
3 |
42 |
| Exhaustive Classification and Review of Techniques and Research Program for Techniques for Skate Skiing, Classical Skiing, and Ski Mountaineering |
0 |
0 |
0 |
4 |
0 |
0 |
1 |
35 |
| FORMALIZATION OF MULTI-LEVEL GAMES |
0 |
0 |
0 |
9 |
1 |
1 |
4 |
69 |
| False targets efficiency in defense strategy |
0 |
0 |
0 |
47 |
0 |
0 |
1 |
160 |
| False targets vs. redundancy in homogeneous parallel systems |
0 |
0 |
0 |
2 |
0 |
0 |
0 |
23 |
| Fifty Years of Operations Research in Defense |
0 |
0 |
0 |
2 |
0 |
2 |
10 |
20 |
| Fixed price contract versus incentive-based contract in the oil and gas industry |
0 |
0 |
0 |
35 |
0 |
0 |
2 |
118 |
| Formalizing the Precautionary Principle Accounting for Strategic Interaction, Natural Factors, and Technological Factors |
0 |
0 |
0 |
13 |
0 |
1 |
3 |
32 |
| GAME THEORETIC ANALYSIS OF TWO-PERIOD-DEPENDENT DEGRADED MULTISTATE RELIABILITY SYSTEMS |
0 |
0 |
0 |
0 |
2 |
2 |
3 |
17 |
| Game Theoretic Analysis of Insurgent Attacks, Government Protection, and International Intervention |
0 |
0 |
0 |
2 |
1 |
1 |
3 |
11 |
| Game Theoretic Modeling of Economic Systems and the European Debt Crisis |
1 |
1 |
1 |
11 |
1 |
1 |
6 |
63 |
| Game theoretic analysis of ideologically biased clickbait or fake news and real news |
0 |
0 |
0 |
8 |
0 |
0 |
2 |
42 |
| Game theoretic analysis of persons, the pharmaceutical industry, and donors in disease contraction and recovery |
0 |
0 |
0 |
1 |
0 |
2 |
2 |
13 |
| Game-theoretic and Behavioral Negotiation Theory |
0 |
0 |
0 |
15 |
0 |
2 |
4 |
55 |
| Generalizing the Black and Scholes Equation Assuming Differentiable Noise |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
2 |
| Gordon Tullock: A Nobel Prize left unbestowed |
0 |
0 |
0 |
3 |
0 |
1 |
1 |
45 |
| Government Spending and Taxation in Democracies and Autocracies |
0 |
0 |
0 |
151 |
0 |
0 |
2 |
472 |
| Government intervention to combat the dynamics of terrorist organizations |
0 |
0 |
0 |
0 |
0 |
0 |
2 |
6 |
| Government protection against terrorism and crime |
0 |
0 |
0 |
1 |
0 |
0 |
2 |
14 |
| Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency |
0 |
0 |
0 |
9 |
1 |
1 |
1 |
30 |
| Governmental combat of migration between competing terrorist organisations |
0 |
0 |
0 |
1 |
1 |
2 |
6 |
24 |
| Governmental combat of the dynamics of multiple competing terrorist organizations |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
16 |
| Governments Playing Games and Combating the Dynamics of a Terrorist Organization |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
21 |
| Governments' and Terrorists' Defense and Attack in a T -Period Game |
0 |
0 |
0 |
8 |
1 |
1 |
2 |
48 |
| Hard money and fiat money in an inflationary world |
0 |
0 |
1 |
1 |
2 |
3 |
8 |
12 |
| Hegemonic Decline and International Leadership |
0 |
0 |
1 |
2 |
1 |
1 |
2 |
8 |
| How Elections are Impacted by Production, Economic Growth and Conflict |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
22 |
| How companies and governments react to disasters |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
16 |
| Income, interdependence, and substitution effects affecting incentives for security investment |
0 |
0 |
2 |
34 |
0 |
0 |
3 |
117 |
| Incumbent policy, benefits provision, and the triggering and spread of revolutionary uprisings |
0 |
0 |
0 |
53 |
0 |
0 |
4 |
269 |
| Individual versus overarching protection against strategic attacks |
0 |
0 |
0 |
4 |
1 |
1 |
2 |
39 |
| Individual versus overarching protection and attack of assets |
0 |
0 |
0 |
3 |
1 |
1 |
2 |
33 |
| Individual vs. overarching protection for minimizing the expected damage caused by an attack |
0 |
0 |
0 |
1 |
1 |
1 |
2 |
10 |
| Inequality, Economic Growth and Poverty in the Middle East and North Africa (MENA) |
0 |
0 |
3 |
35 |
1 |
1 |
13 |
185 |
| Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems |
0 |
0 |
0 |
0 |
1 |
1 |
2 |
15 |
| Information Sharing Among Cyber Hackers in Successive Attacks |
0 |
0 |
0 |
3 |
1 |
1 |
1 |
37 |
| Information sharing among firms and cyber attacks |
0 |
0 |
0 |
52 |
0 |
0 |
1 |
145 |
| Innovation, Development and National Indices |
0 |
0 |
0 |
15 |
0 |
0 |
5 |
73 |
| Inpatient service providers’ perspectives on service user involvement in Norwegian community mental health centres |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
8 |
| Insurgent attacks, government protection, and international intervention |
0 |
0 |
0 |
3 |
0 |
0 |
3 |
20 |
| Intelligence and Impact Contests in Systems with Fake Targets |
0 |
0 |
0 |
0 |
1 |
1 |
3 |
7 |
| Intelligence and impact contests in systems with redundancy, false targets, and partial protection |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
10 |
| Interest Rates, the Taylor Rule, the Quantity Equation, and the Phillips Curve |
0 |
0 |
2 |
12 |
3 |
3 |
9 |
49 |
| Intra-Level and Inter-Level Interaction |
0 |
0 |
0 |
6 |
1 |
1 |
1 |
63 |
| Introducing Randomness into First-Order and Second-Order Deterministic Differential Equations |
0 |
0 |
0 |
0 |
0 |
0 |
2 |
8 |
| Introducing Randomness into First‐Order and Second‐Order Deterministic Differential Equations |
0 |
0 |
0 |
0 |
1 |
1 |
1 |
1 |
| Is it wise to leave some false targets unprotected? |
0 |
0 |
0 |
0 |
1 |
1 |
2 |
9 |
| Is it wise to protect false targets? |
0 |
0 |
0 |
1 |
3 |
3 |
7 |
14 |
| Jack Hirshleifer: A Nobel Prize left unbestowed |
0 |
0 |
1 |
121 |
2 |
3 |
4 |
542 |
| Janet Tai Landa: Economic success of Chinese merchants in Southeast Asia: identity, ethnic cooperation and conflict: integrating the social sciences with evolutionary biology |
0 |
1 |
1 |
10 |
3 |
5 |
8 |
73 |
| Mathematical modelling of acute virus influenza A infections |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
7 |
| Measuring patient participation in surgical treatment decision‐making from healthcare professionals' perspective |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
3 |
| Meeting a demand vs. enhancing protections in homogeneous parallel systems |
0 |
0 |
0 |
0 |
0 |
1 |
1 |
4 |
| Migration and intergroup conflict |
0 |
0 |
1 |
24 |
0 |
0 |
5 |
156 |
| Minmax defense strategy for complex multi-state systems |
0 |
0 |
0 |
0 |
1 |
1 |
2 |
20 |
| Modeling the evolution of countries and ethnic groups |
0 |
0 |
0 |
0 |
0 |
0 |
2 |
4 |
| Modeling which Factors Impact Interest Rates |
0 |
0 |
0 |
2 |
0 |
1 |
2 |
15 |
| Models, phases and cases of patient participation in decision‐making in surgical treatment in Norway: A qualitative study |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
4 |
| Mutual Raiding of Production and the Emergence of Exchange |
0 |
1 |
1 |
17 |
1 |
2 |
3 |
181 |
| N-player costly contracting |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
28 |
| New Economics Journals |
0 |
0 |
1 |
3 |
0 |
0 |
1 |
57 |
| ON THE IMPOSSIBILITY OF DETERRENCE IN SEQUENTIAL COLONEL BLOTTO GAMES |
0 |
0 |
0 |
1 |
2 |
3 |
5 |
20 |
| On the Effectiveness of Security Countermeasures for Critical Infrastructures |
0 |
0 |
0 |
1 |
1 |
2 |
4 |
19 |
| On the inappropriateness of collective rent seeking analysis when agents exert within-group and between-group efforts |
0 |
0 |
0 |
8 |
0 |
0 |
2 |
50 |
| Optimal defense with variable number of overarching and individual protections |
0 |
0 |
0 |
0 |
1 |
1 |
3 |
21 |
| Parallel systems under two sequential attacks |
0 |
0 |
0 |
0 |
0 |
2 |
2 |
13 |
| Parallel systems under two sequential attacks with contest intensity variation |
0 |
0 |
0 |
3 |
1 |
1 |
2 |
18 |
| Parallel systems under two sequential attacks with imperfect detection of the first attack outcome |
0 |
0 |
0 |
5 |
0 |
0 |
0 |
29 |
| Parallel systems with different types of defence resource expenditure under two sequential attacks |
0 |
0 |
0 |
3 |
0 |
0 |
0 |
8 |
| Patient Participation in Surgical Treatment Decision Making from the Patients' Perspective: Validation of an Instrument |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
3 |
| Patient participation, decision‐makers and information flow in surgical treatment |
0 |
0 |
0 |
0 |
1 |
1 |
2 |
7 |
| Policy makers, the international community and people living with HIV/AIDS: the need for new commitment mechanisms |
0 |
0 |
0 |
2 |
1 |
1 |
1 |
12 |
| Policy makers, the international community and the population in the prevention and treatment of diseases: case study on HIV/AIDS |
0 |
0 |
0 |
3 |
1 |
1 |
4 |
50 |
| Political Economy of Service Delivery: Monitoring Versus Contestation |
0 |
0 |
0 |
4 |
0 |
0 |
0 |
28 |
| Preventive strike vs. false targets and protection in defense strategy |
0 |
0 |
1 |
2 |
1 |
2 |
5 |
21 |
| Principal–Agent Theory, Game Theory, and the Precautionary Principle |
0 |
0 |
2 |
36 |
1 |
3 |
14 |
216 |
| Proactivity and Retroactivity of Firms and Information Sharing of Hackers |
0 |
0 |
0 |
8 |
0 |
0 |
0 |
34 |
| Probabilistic Risk Analysis and Game Theory |
0 |
0 |
0 |
2 |
0 |
0 |
2 |
29 |
| Production and Conflict Models Versus Rent-Seeking Models |
0 |
0 |
1 |
66 |
4 |
4 |
5 |
382 |
| Production versus safety in a risky competitive industry |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
12 |
| Production, safety, exchange, and risk |
0 |
0 |
0 |
2 |
0 |
1 |
2 |
16 |
| Production, safety, fighting, and risk |
0 |
0 |
0 |
1 |
1 |
1 |
1 |
8 |
| Protecting complex infrastructures against multiple strategic attackers |
1 |
1 |
1 |
2 |
1 |
1 |
1 |
12 |
| Protection vs. false targets in series systems |
0 |
0 |
0 |
3 |
0 |
1 |
2 |
13 |
| Protection vs. redundancy in homogeneous parallel systems |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
31 |
| Regression analysis of factors impacting interest rates |
1 |
2 |
6 |
6 |
1 |
4 |
12 |
12 |
| Reputation, incomplete information, and differences in patience in repeated games with multiple equilibria |
0 |
0 |
0 |
14 |
0 |
0 |
1 |
66 |
| Resource Distribution in Multiple Attacks Against a Single Target |
0 |
0 |
1 |
3 |
0 |
0 |
1 |
11 |
| Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome |
0 |
0 |
0 |
0 |
1 |
1 |
2 |
19 |
| Returns to information security investment: Endogenizing the expected loss |
0 |
0 |
0 |
2 |
2 |
3 |
5 |
20 |
| Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability |
0 |
0 |
1 |
11 |
0 |
1 |
7 |
44 |
| Risk limits, conflict, and equilibrium selection in games with multiple equilibria |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
15 |
| Risk, price, and reimbursement |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
10 |
| Risk, production and conflict when utilities are as if certain |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
21 |
| Security Investment, Hacking, and Information Sharing between Firms and between Hackers |
0 |
0 |
0 |
6 |
1 |
1 |
2 |
163 |
| Self‐interest and sympathy in economic behaviour |
0 |
0 |
0 |
0 |
0 |
0 |
2 |
2 |
| Separation in homogeneous systems with independent identical elements |
0 |
0 |
0 |
4 |
0 |
1 |
2 |
57 |
| Service Delivery versus Moonlighting: Using Data from Kenya, Uganda, Tanzania and Senegal |
0 |
0 |
0 |
2 |
0 |
0 |
3 |
30 |
| Service delivery weaknesses within education and healthcare: Applying empirics from Kenya, Uganda, Tanzania, and Senegal |
0 |
0 |
0 |
1 |
1 |
2 |
4 |
23 |
| Shield versus sword resource distribution in K-round duels |
0 |
0 |
0 |
3 |
0 |
0 |
2 |
21 |
| Special versus general protection and attack of parallel and series components |
0 |
0 |
0 |
0 |
2 |
2 |
3 |
32 |
| Special versus general protection and attack of two assets |
0 |
0 |
0 |
2 |
2 |
2 |
2 |
23 |
| Stochastic Theories and Deterministic Differential Equations |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
| Stochastic Theories and Deterministic Differential Equations |
0 |
0 |
0 |
0 |
1 |
2 |
2 |
6 |
| Stochastic conditional and unconditional warfare |
0 |
0 |
0 |
4 |
1 |
1 |
1 |
63 |
| Strategic Defense and Attack for Series and Parallel Reliability Systems: Reply to Rejoinder |
0 |
0 |
0 |
2 |
0 |
0 |
3 |
48 |
| Strategic choices by the incumbent and challenger during revolution and civil war |
0 |
0 |
0 |
5 |
0 |
1 |
2 |
42 |
| Strategic defense and attack for reliability systems |
0 |
0 |
0 |
2 |
0 |
1 |
14 |
54 |
| Strategic defense and attack for series and parallel reliability systems |
0 |
0 |
0 |
27 |
1 |
1 |
1 |
126 |
| Strategic defense and attack for series and parallel reliability systems: reply 1 to comment 1 |
0 |
0 |
0 |
4 |
2 |
2 |
3 |
60 |
| Strategic defense and attack of series systems when agents move sequentially |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
11 |
| Stubbornness, Power, and Equilibrium Selection in Repeated Games with Multiple Equilibria |
0 |
0 |
0 |
18 |
0 |
0 |
0 |
155 |
| Systematization of a set of closure techniques |
0 |
0 |
0 |
0 |
1 |
1 |
1 |
4 |
| THE DYNAMIC BIOENERGY OF ANIMALS WITH A DIGESTIVE TRACT |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
6 |
| THE DYNAMICS OF BILATERAL EXCHANGE AND DIVISION OF LABOR |
0 |
0 |
0 |
0 |
1 |
1 |
1 |
3 |
| THE DYNAMICS OF CRIME AND PUNISHMENT |
0 |
0 |
0 |
0 |
0 |
2 |
4 |
11 |
| THE DYNAMICS OF MULTILATERAL EXCHANGE |
0 |
0 |
0 |
0 |
1 |
1 |
1 |
4 |
| THE STABILITY OF ANARCHY AND BREAKDOWN OF PRODUCTION |
0 |
0 |
0 |
39 |
0 |
0 |
1 |
134 |
| Terrorism risks, civil liberties, and privacy concerns |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
14 |
| The Links between Business Environment, Economic Growth and Social Equity: A Study of African Countries |
0 |
0 |
1 |
6 |
1 |
1 |
6 |
32 |
| The Ranking of Researchers by Publications and Citations: Using RePEc Data |
0 |
1 |
1 |
26 |
0 |
4 |
9 |
229 |
| The Shapley value of coalitions to other coalitions |
0 |
0 |
0 |
2 |
1 |
1 |
3 |
13 |
| The battle of the sexes when the future is important |
0 |
0 |
0 |
13 |
0 |
0 |
2 |
93 |
| The choice of strategic core – impact of financial volume |
0 |
0 |
0 |
12 |
0 |
0 |
3 |
97 |
| The dynamics of athletic performance, fitness and fatigue |
0 |
0 |
0 |
0 |
0 |
1 |
3 |
7 |
| The dynamics of terrorist organizations |
0 |
0 |
0 |
5 |
0 |
1 |
1 |
39 |
| The dynamics of war between benign cells, malignant cells, and killer agents |
0 |
0 |
0 |
0 |
2 |
2 |
2 |
2 |
| The dynamics of within-group and between-group interaction |
0 |
0 |
0 |
74 |
1 |
1 |
1 |
295 |
| The economics of terrorism against two targets |
0 |
0 |
0 |
18 |
2 |
2 |
3 |
58 |
| The evolution of fixed-supply and variable-supply currencies |
0 |
0 |
0 |
2 |
0 |
0 |
1 |
8 |
| The impact of actor heterogeneity on the provision of international public goods |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
14 |
| The impact of disaster on the strategic interaction between company and government |
0 |
0 |
0 |
12 |
2 |
2 |
2 |
60 |
| The impact of the future in games with multiple equilibria |
0 |
0 |
0 |
9 |
1 |
1 |
1 |
37 |
| The incumbent, challenger, and population during revolution and civil war |
0 |
0 |
0 |
6 |
0 |
0 |
1 |
77 |
| The paradox and non-paradox of power for groups |
0 |
0 |
0 |
4 |
0 |
0 |
1 |
16 |
| The population dynamics of potato cyst nematodes |
0 |
0 |
2 |
8 |
1 |
1 |
3 |
25 |
| The precautionary principle as multi-period games where players have different thresholds for acceptable uncertainty |
0 |
0 |
0 |
5 |
0 |
0 |
3 |
16 |
| The strategic interaction between a company and the government surrounding disasters |
0 |
0 |
0 |
0 |
1 |
2 |
3 |
28 |
| The strategic interaction between a company and the government surrounding disasters |
0 |
0 |
0 |
2 |
0 |
0 |
2 |
42 |
| The strategic interaction between the government and international oil companies in the UK: An example of a country with dwindling hydrocarbon reserves |
0 |
1 |
1 |
6 |
0 |
2 |
3 |
36 |
| The timing and deterrence of terrorist attacks due to exogenous dynamics |
0 |
0 |
0 |
9 |
0 |
0 |
3 |
51 |
| The value of a player in n-person games |
0 |
0 |
1 |
235 |
1 |
1 |
6 |
598 |
| Theoretic Model of Adversaries and Media Manipulation: A Two-Period Extension |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
| Transaction costs and iceberg costs |
0 |
0 |
0 |
34 |
0 |
0 |
2 |
185 |
| Truthful signalling, the heritability paradox, and the Malthusian equi-marginal principle |
0 |
0 |
0 |
1 |
0 |
0 |
2 |
14 |
| Two producing and trading agents defending and retaliating against terrorism |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
10 |
| Two-period Colonel Blotto contest with cumulative investments over variable assets with resource constraints |
0 |
0 |
0 |
0 |
2 |
2 |
3 |
4 |
| User involvement in in‐patient mental health services: operationalisation, empirical testing, and validation |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
6 |
| When Escalation is Inevitable: A Role of Thresholds in a Counterterrorism Game |
0 |
0 |
0 |
0 |
1 |
3 |
5 |
5 |
| Whether to attack a terrorist's resource stock today or tomorrow |
0 |
0 |
0 |
26 |
0 |
0 |
3 |
154 |
| Whether to attack growing assets and enterprises today or tomorrow |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
12 |
| Total Journal Articles |
8 |
17 |
60 |
1,950 |
128 |
218 |
592 |
10,738 |