Table 4.
Paper | Country | Cited By |
---|---|---|
Game Theoretic analysis of adaptive radar jamming (Bachmann et al.) |
Australia | Bogdanovic et al., Deligiannis et al. |
Target selection for tracking in multifunction radar networks: Nash and Correlated equilibria (Bogdanovic et al.) |
Netherlands | He et al. |
Power allocation game between a radar network and multiple jammers (Deligiannis et al.) |
UK | He et al. |
Strategies for defending a coastline against multiple attackers (Garcia et al.) |
US | None |
A game theory approach to target tracking in sensor networks (Gu et al.) |
UK | None |
Joint Power allocation and beamforming between a multi-static-radar and jammer based on game theory (He et al.) |
China | None |
Game theoretic situation and transmission in unattended ground sensor networks: a correlated equilibrium approach (Krishnamurthy et al.) |
US | None |
Network enabled missile deflection: games and correlated equilibrium (Maskery et al. 2007 a) |
US | Bachmann et al. |
Decentralised algorithms for netcentric Force Protection against anti-ship missiles (Maskery et al. 2007 b) |
US | Bachmann et al. |
Search and Screening (Koopman) | US | None |
Optimal Strategy for Target Protection with a defender in the pursuit-evasion scenario (Qilong et al.) |
China | None |
Differential game theory with applications tomissiles and autonomous systems guidance (Faruqi) | Australia | None |
A game theoretical interceptor guidance law for ballistic missile defence (Shinar et al.) |
Israel | Faruqi |
Pursuit-Evasion games: a tractable framework for anti-jamming in aerial attacks (Parras et al.) |
Spain | None |
A simple game theoretic approach to suppression of enemy defences and other time-critical target analyses (Hamilton et al.) |
US | None |
Choosing What to Protect: Strategic Defence allocation against an unknown attacker (Bier et al. a) |
US | None |
Considerations on Optimal Resource allocation in avation security (Cioaca) |
Romania | None |
Horsemen and the empty city: A game theoretic examination of deception in Chinese military legend (Cotten et al.) |
US | None |
An Economic Theory of Destabilisation War (Gries et al.) | Germany | None |
Game theoretic approach towards network security: A review (Litti) |
India | None |
Automating cyber defence responses using attack-defence trees and game theory (Jhawar et al.) |
Netherlands | None |
From individual decisions from experience to behavioural game theory (Gonzalez) |
US | None |
Game Theoretic Approaches to Attack Surface Shifting. Moving Target Defense II (Manadhata) |
US | None |
Improving reliability through Multi-Path routing and Link Defence: An Application of Game Theory to Transport (Kanturska et al.) |
UK | None |
Game Theoretic and Reliability models in counter-terrorism and security (Bier et al. b) |
US | Bier et al. a |
Changing behaviours in defence acqusition: a game theory approach (Gardener et al.) |
UK | None |
Joint Transmit Power and Bandwidth Allocation for Cognitive Satellite Network based on Bargaining Game Theory (Zhong et al.) |
China | None |
The Research and Simulation of a Satellite Routing Algorithm based on Game Theory (Qiao et al.) |
China | None |
A survey of multiple unmanned vehicles formation control and coordiation. Normal and fault situations (Zhang et al.) |
Canada | None |