IDEAS home Printed from https://ideas.repec.org/f/pzh735.html
   My authors  Follow this author

Jun Zhuang

Personal Details

First Name:Jun
Middle Name:
Last Name:Zhuang
Suffix:
RePEc Short-ID:pzh735
http://www.eng.buffalo.edu/~jzhuang/

Affiliation

University at Buffalo, Department of Industrial and Systems Engineering

http://engineering.buffalo.edu/industrial-systems.html
Buffalo, NY

Research output

as
Jump to: Working papers Articles

Working papers

  1. Marchant, Mary A. & Murrell, Courtney Paige & Zhuang, Jun, 2004. "Investment Analysis Of Replacing Endophyte-Infected With Endophyte-Free Tall Fescue Pastures," 2004 Annual Meeting, February 14-18, 2004, Tulsa, Oklahoma 34630, Southern Agricultural Economics Association.
  2. Zhuang, Jun & Marchant, Mary A. & Nokes, Sue & Strobel, Herbert, 2004. "Economic Analysis of Cellulase Production by Clostridium thermocellum in Solid State and Submerged Fermentation," Staff Papers 31982, University of Kentucky, Department of Agricultural Economics.
  3. Peng, Xuehua & Marchant, Mary A. & Qin, Xiang Dong & Zhuang, Jun, 2003. "Chinese Consumers' Preferences for Livestock Products," 2003 Annual meeting, July 27-30, Montreal, Canada 22253, American Agricultural Economics Association (New Name 2008: Agricultural and Applied Economics Association).

Articles

  1. Li, Shuying & Zhuang, Jun & Shen, Shifei & Wang, Jia, 2017. "Driving-forces model on individual behavior in scenarios considering moving threat agents," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 481(C), pages 127-140.
  2. Daniel Seaberg & Laura Devine & Jun Zhuang, 2017. "A review of game theory applications in natural disaster management research," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(3), pages 1461-1483, December.
  3. Niyirora, Jerome & Zhuang, Jun, 2017. "Fluid approximations and control of queues in emergency departments," European Journal of Operational Research, Elsevier, vol. 261(3), pages 1110-1124.
  4. Zahiri, Behzad & Zhuang, Jun & Mohammadi, Mehrdad, 2017. "Toward an integrated sustainable-resilient supply chain: A pharmaceutical case study," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 103(C), pages 109-142.
  5. Bairong Wang & Jun Zhuang, 2017. "Crisis information distribution on Twitter: a content analysis of tweets during Hurricane Sandy," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(1), pages 161-181, October.
  6. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
  7. John Coles & Jing Zhang & Jun Zhuang, 2016. "Partnership behavior in disaster relief operations: a case study comparison of the responses to the tornado in Joplin, Missouri and Hurricane Sandy along the Jersey Coast," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 84(1), pages 625-647, October.
  8. Zhujie Chu & Wenna Wang & Bairong Wang & Jun Zhuang, 2016. "Research on Factors Influencing Municipal Household Solid Waste Separate Collection: Bayesian Belief Networks," Sustainability, MDPI, Open Access Journal, vol. 8(2), pages 1-14, February.
  9. Yisha Xiang & Jun Zhuang, 2016. "A medical resource allocation model for serving emergency victims with deteriorating health conditions," Annals of Operations Research, Springer, vol. 236(1), pages 177-196, January.
  10. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
  11. Ning, Manxiu & Gong, Jinquan & Zheng, Xuhui & Zhuang, Jun, 2016. "Does New Rural Pension Scheme decrease elderly labor supply? Evidence from CHARLS," China Economic Review, Elsevier, vol. 41(C), pages 315-330.
  12. Sabbaghi, Mostafa & Behdad, Sara & Zhuang, Jun, 2016. "Managing consumer behavior toward on-time return of the waste electrical and electronic equipment: A game theoretic approach," International Journal of Production Economics, Elsevier, vol. 182(C), pages 545-563.
  13. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
  14. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
  15. He, Fei & Zhuang, Jun, 2016. "Balancing pre-disaster preparedness and post-disaster relief," European Journal of Operational Research, Elsevier, vol. 252(1), pages 246-256.
  16. Kjell Hausken & Jun Zhuang, 2016. "How companies and governments react to disasters," Journal of Risk and Reliability, , vol. 230(4), pages 417-426, August.
  17. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
  18. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
  19. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
  20. Jun Zhuang & Gregory Saxton & Han Wu, 2014. "Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors," Annals of Operations Research, Springer, vol. 221(1), pages 469-491, October.
  21. Xiaojun Shan & Jun Zhuang, 2014. "Subsidizing to disrupt a terrorism supply chain—a four-player game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(7), pages 1108-1119, July.
  22. Liya Guo & Shan Huang & Jun Zhuang & Adel Sadek, 2013. "Modeling Parking Behavior Under Uncertainty: A Static Game Theoretic versus a Sequential Neo-additive Capacity Modeling Approach," Networks and Spatial Economics, Springer, vol. 13(3), pages 327-350, September.
  23. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
  24. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
  25. May Cheung & Jun Zhuang, 2012. "Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters," Decision Analysis, INFORMS, vol. 9(2), pages 156-164, June.
  26. Coles, John B. & Zhuang, Jun & Yates, Justin, 2012. "Case study in disaster relief: A descriptive analysis of agency partnerships in the aftermath of the January 12th, 2010 Haitian earthquake," Socio-Economic Planning Sciences, Elsevier, vol. 46(1), pages 67-77.
  27. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
  28. K Hausken & J Zhuang, 2012. "The timing and deterrence of terrorist attacks due to exogenous dynamics," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 726-735, June.
  29. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
  30. Urschel John D & Zhuang Jun, 2011. "Are NFL Coaches Risk and Loss Averse? Evidence from Their Use of Kickoff Strategies," Journal of Quantitative Analysis in Sports, De Gruyter, vol. 7(3), pages 1-17, July.
  31. Jun Zhuang & Vicki Bier, 2011. "Secrecy And Deception At Equilibrium, With Applications To Anti-Terrorism Resource Allocation," Defence and Peace Economics, Taylor & Francis Journals, vol. 22(1), pages 43-61.
  32. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
  33. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
  34. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
  35. Peng, Xuehua & Marchant, Mary A. & Qin, Xiang Dong & Zhuang, Jun, 2005. "Chinese Consumers' Preferences for Livestock Products," International Food and Agribusiness Management Review, International Food and Agribusiness Management Association (IFAMA), vol. 8(04).
  36. Md. Tanveer Ahmed & Jun Zhuang & Changhyun Kwon, 0. "Understanding Conflicting Interests of a Government and a Tobacco Manufacturer: A Game-Theoretic Approach," Group Decision and Negotiation, Springer, vol. 0, pages 1-22.

Citations

Many of the citations below have been collected in an experimental project, CitEc, where a more detailed citation analysis can be found. These are citations from works listed in RePEc that could be analyzed mechanically. So far, only a minority of all works could be analyzed. See under "Corrections" how you can help improve the citation analysis.

Working papers

  1. Marchant, Mary A. & Murrell, Courtney Paige & Zhuang, Jun, 2004. "Investment Analysis Of Replacing Endophyte-Infected With Endophyte-Free Tall Fescue Pastures," 2004 Annual Meeting, February 14-18, 2004, Tulsa, Oklahoma 34630, Southern Agricultural Economics Association.

    Cited by:

    1. Musshoff, Oliver & Hirschauer, Norbert, 2008. "Investment planning under uncertainty and flexibility: the case of a purchasable sales contract," Australian Journal of Agricultural and Resource Economics, Australian Agricultural and Resource Economics Society, vol. 52(1), March.
    2. Smith, Stephen A. & Caldwell, James D. & Popp, Michael P. & Coffey, Kenneth P. & Jennings, John A. & Savin, Mary C. & Rosenkrans, Charles F., Jr., 2012. "Tall Fescue Toxicosis Mitigation Strategies: Comparisons of Cow-calf Returns," Journal of Agricultural and Applied Economics, Southern Agricultural Economics Association, vol. 44(04), November.
    3. Oliver Musshoff & Norbert Hirschauer, 2008. "Adoption of organic farming in Germany and Austria: an integrative dynamic investment perspective," Agricultural Economics, International Association of Agricultural Economists, vol. 39(1), pages 135-145, July.
    4. Tubetov, Dulat & Musshoff, Oliver & Kellner, Ulla, 0. "Investments in Kazakhstani Dairy Farming: A Comparison of Classical Investment Theory and the Real Options Approach," Quarterly Journal of International Agriculture, Humboldt-Universität zu Berlin, vol. 51.

  2. Peng, Xuehua & Marchant, Mary A. & Qin, Xiang Dong & Zhuang, Jun, 2003. "Chinese Consumers' Preferences for Livestock Products," 2003 Annual meeting, July 27-30, Montreal, Canada 22253, American Agricultural Economics Association (New Name 2008: Agricultural and Applied Economics Association).

    Cited by:

    1. Zhao, Jing & Thompson, Wyatt, 2013. "The Effect of Refrigerator Use on Meat Consumption in Rural China," 2013 Annual Meeting, February 2-5, 2013, Orlando, Florida 142931, Southern Agricultural Economics Association.
    2. Zhang, Xiaoyong & Dagevos, Hans & He, Yuna & van der Lans, Ivo & Zhai, Fengying, 2008. "Consumption and corpulence in China: A consumer segmentation study based on the food perspective," Food Policy, Elsevier, vol. 33(1), pages 37-47, February.
    3. Xie, Chaoping & Marchant, Mary A., 2015. "Supplying China’s Growing Appetite for Poultry," International Food and Agribusiness Management Review, International Food and Agribusiness Management Association (IFAMA), vol. 18(A).
    4. Wang, Qingbin & Zhang, Guangxuan, 2012. "China’s small-scale hog production and implications for trade: Evidence from a farmer survey," 2012 Annual Meeting, August 12-14, 2012, Seattle, Washington 125288, Agricultural and Applied Economics Association.

Articles

  1. Bairong Wang & Jun Zhuang, 2017. "Crisis information distribution on Twitter: a content analysis of tweets during Hurricane Sandy," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 89(1), pages 161-181, October.

    Cited by:

    1. Yan Wang & John E. Taylor, 2018. "Coupling sentiment and human mobility in natural disasters: a Twitter-based study of the 2014 South Napa Earthquake," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 92(2), pages 907-925, June.

  2. Zhujie Chu & Wenna Wang & Bairong Wang & Jun Zhuang, 2016. "Research on Factors Influencing Municipal Household Solid Waste Separate Collection: Bayesian Belief Networks," Sustainability, MDPI, Open Access Journal, vol. 8(2), pages 1-14, February.

    Cited by:

    1. Hongyun Han & Zhijian Zhang & Sheng Xia, 2016. "The Crowding-Out Effects of Garbage Fees and Voluntary Source Separation Programs on Waste Reduction: Evidence from China," Sustainability, MDPI, Open Access Journal, vol. 8(7), pages 1-17, July.
    2. Fu Chen & Xiaoxiao Li & Jing Ma & Yongjun Yang & Gang-Jun Liu, 2018. "An Exploration of the Impacts of Compulsory Source-Separated Policy in Improving Household Solid Waste-Sorting in Pilot Megacities, China: A Case Study of Nanjing," Sustainability, MDPI, Open Access Journal, vol. 10(5), pages 1-14, April.
    3. Navarro Ferronato & Carolina D’Avino & Marco Ragazzi & Vincenzo Torretta & Giovanni De Feo, 2017. "Social Surveys about Solid Waste Management within Higher Education Institutes: A Comparison," Sustainability, MDPI, Open Access Journal, vol. 9(3), pages 1-17, March.

  3. Yisha Xiang & Jun Zhuang, 2016. "A medical resource allocation model for serving emergency victims with deteriorating health conditions," Annals of Operations Research, Springer, vol. 236(1), pages 177-196, January.

    Cited by:

    1. Niyirora, Jerome & Zhuang, Jun, 2017. "Fluid approximations and control of queues in emergency departments," European Journal of Operational Research, Elsevier, vol. 261(3), pages 1110-1124.

  4. Ning, Manxiu & Gong, Jinquan & Zheng, Xuhui & Zhuang, Jun, 2016. "Does New Rural Pension Scheme decrease elderly labor supply? Evidence from CHARLS," China Economic Review, Elsevier, vol. 41(C), pages 315-330.

    Cited by:

    1. Cheng, Lingguo & Liu, Hong & Zhang, Ye & Zhao, Zhong, 2017. "The Heterogeneous Impact of Pension Income on Elderly Living Arrangements: Evidence from China’s New Rural Pension Scheme," GLO Discussion Paper Series 80, Global Labor Organization (GLO).
    2. Chen, Xi & Eggleston, Karen & Ang, Sun, 2017. "The Impact of Social Pensions on Intergenerational Relationships: Comparative Evidence from China," GLO Discussion Paper Series 53, Global Labor Organization (GLO).
    3. Li, Zhigang & Wu, Mingqin, 2018. "Education and welfare program compliance: Firm-level evidence from a pension reform in China," China Economic Review, Elsevier, vol. 48(C), pages 1-13.

  5. Sabbaghi, Mostafa & Behdad, Sara & Zhuang, Jun, 2016. "Managing consumer behavior toward on-time return of the waste electrical and electronic equipment: A game theoretic approach," International Journal of Production Economics, Elsevier, vol. 182(C), pages 545-563.

    Cited by:

    1. Oh, Yosep & Behdad, Sara, 2017. "Simultaneous reassembly and procurement planning in assemble-to-order remanufacturing systems," International Journal of Production Economics, Elsevier, vol. 184(C), pages 168-178.
    2. Paul Taboada-González & Quetzalli Aguilar-Virgen & Liliana Márquez-Benavides, 2017. "Recyclables Valorisation as the Best Strategy for Achieving Landfill CO 2 e Emissions Abatement from Domestic Waste: Game Theory," Sustainability, MDPI, Open Access Journal, vol. 9(7), pages 1-10, July.

  6. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.

    Cited by:

    1. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.

  7. He, Fei & Zhuang, Jun, 2016. "Balancing pre-disaster preparedness and post-disaster relief," European Journal of Operational Research, Elsevier, vol. 252(1), pages 246-256.

    Cited by:

    1. Feng Li & Qingyuan Zhu & Jun Zhuang, 2018. "Analysis of fire protection efficiency in the United States: a two-stage DEA-based approach," OR Spectrum: Quantitative Approaches in Management, Springer;Gesellschaft für Operations Research e.V., vol. 40(1), pages 23-68, January.
    2. Yumashev, Dmitry & Johnson, Paul, 2017. "Flexible decision making in the wake of large scale nuclear emergencies: Long-term response," European Journal of Operational Research, Elsevier, vol. 261(1), pages 368-389.
    3. Noham, Reut & Tzur, Michal, 2018. "Designing humanitarian supply chains by incorporating actual post-disaster decisions," European Journal of Operational Research, Elsevier, vol. 265(3), pages 1064-1077.
    4. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.

  8. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.

    Cited by:

    1. E.R. Akhmetshina & G.T. Guzelbaeva & D.K. Rakhmatullina, 2017. "Special Economic Zone as a Local Area of Public-Private Parthership Implementation," European Research Studies Journal, European Research Studies Journal, vol. 0(2A), pages 346-354.

  9. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.

    Cited by:

    1. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    2. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    3. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    4. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    5. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.

  10. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.

    Cited by:

    1. Sabbaghi, Mostafa & Behdad, Sara & Zhuang, Jun, 2016. "Managing consumer behavior toward on-time return of the waste electrical and electronic equipment: A game theoretic approach," International Journal of Production Economics, Elsevier, vol. 182(C), pages 545-563.
    2. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
    3. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.

  11. Jun Zhuang & Gregory Saxton & Han Wu, 2014. "Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors," Annals of Operations Research, Springer, vol. 221(1), pages 469-491, October.

    Cited by:

    1. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
    2. Nagurney, Anna & Flores, Emilio Alvarez & Soylu, Ceren, 2016. "A Generalized Nash Equilibrium network model for post-disaster humanitarian relief," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 95(C), pages 1-18.
    3. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.

  12. Xiaojun Shan & Jun Zhuang, 2014. "Subsidizing to disrupt a terrorism supply chain—a four-player game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(7), pages 1108-1119, July.

    Cited by:

    1. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    2. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
    3. Afshan Naseem & Shoab Ahmed Khan & Asad Waqar Malik, 2017. "A real-time man-in-loop threat evaluation and resource assignment in defense," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(6), pages 725-738, June.

  13. Liya Guo & Shan Huang & Jun Zhuang & Adel Sadek, 2013. "Modeling Parking Behavior Under Uncertainty: A Static Game Theoretic versus a Sequential Neo-additive Capacity Modeling Approach," Networks and Spatial Economics, Springer, vol. 13(3), pages 327-350, September.

    Cited by:

    1. Bergantino, Angela Stefania & De Carlo, Angela & Morone, Andrea, 2015. "Individuals’ behaviour with respect to parking alternatives: a laboratory experiment," MPRA Paper 63815, University Library of Munich, Germany.
    2. Du, Lili & Gong, Siyuan, 2016. "Stochastic Poisson game for an online decentralized and coordinated parking mechanism," Transportation Research Part B: Methodological, Elsevier, vol. 87(C), pages 44-63.
    3. He, Fang & Yin, Yafeng & Chen, Zhibin & Zhou, Jing, 2015. "Pricing of parking games with atomic players," Transportation Research Part B: Methodological, Elsevier, vol. 73(C), pages 1-12.
    4. Pel, Adam J. & Chaniotakis, Emmanouil, 2017. "Stochastic user equilibrium traffic assignment with equilibrated parking search routes," Transportation Research Part B: Methodological, Elsevier, vol. 101(C), pages 123-139.
    5. Chaniotakis, Emmanouil & Pel, Adam J., 2015. "Drivers’ parking location choice under uncertain parking availability and search times: A stated preference experiment," Transportation Research Part A: Policy and Practice, Elsevier, vol. 82(C), pages 228-239.

  14. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.

    Cited by:

    1. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    2. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
    3. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    4. Sakai, Kazuki & Hohzaki, Ryusuke & Fukuda, Emiko & Sakuma, Yutaka, 2018. "Risk evaluation and games in mine warfare considering shipcounter effects," European Journal of Operational Research, Elsevier, vol. 268(1), pages 300-313.
    5. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Technology, Institute of Organization and Management, vol. 3, pages 23-44.
    6. Afshan Naseem & Shoab Ahmed Khan & Asad Waqar Malik, 2017. "A real-time man-in-loop threat evaluation and resource assignment in defense," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(6), pages 725-738, June.
    7. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    8. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    9. Cameron A. MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    10. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    11. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    12. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.

  15. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.

    Cited by:

    1. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    2. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    3. Yisha Xiang & Jun Zhuang, 2016. "A medical resource allocation model for serving emergency victims with deteriorating health conditions," Annals of Operations Research, Springer, vol. 236(1), pages 177-196, January.
    4. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    5. Cameron A. MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    6. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.

  16. May Cheung & Jun Zhuang, 2012. "Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters," Decision Analysis, INFORMS, vol. 9(2), pages 156-164, June.

    Cited by:

    1. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    2. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    3. Cameron A. MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.

  17. Coles, John B. & Zhuang, Jun & Yates, Justin, 2012. "Case study in disaster relief: A descriptive analysis of agency partnerships in the aftermath of the January 12th, 2010 Haitian earthquake," Socio-Economic Planning Sciences, Elsevier, vol. 46(1), pages 67-77.

    Cited by:

    1. Dillenburger, Steven P. & Cochran, Jeffery K. & Cammarano, Vincent R., 2013. "Minimizing supply airdrop collateral damage risk," Socio-Economic Planning Sciences, Elsevier, vol. 47(1), pages 9-19.
    2. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.
    3. John Coles & Jing Zhang & Jun Zhuang, 2016. "Partnership behavior in disaster relief operations: a case study comparison of the responses to the tornado in Joplin, Missouri and Hurricane Sandy along the Jersey Coast," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 84(1), pages 625-647, October.

  18. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.

    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Afshan Naseem & Shoab Ahmed Khan & Asad Waqar Malik, 2017. "A real-time man-in-loop threat evaluation and resource assignment in defense," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(6), pages 725-738, June.

  19. K Hausken & J Zhuang, 2012. "The timing and deterrence of terrorist attacks due to exogenous dynamics," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 726-735, June.

    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    3. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    4. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    5. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    6. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    7. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    8. Afshan Naseem & Shoab Ahmed Khan & Asad Waqar Malik, 2017. "A real-time man-in-loop threat evaluation and resource assignment in defense," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(6), pages 725-738, June.
    9. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    10. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    11. Starita, Stefano & Scaparra, Maria Paola, 2016. "Optimizing dynamic investment decisions for railway systems protection," European Journal of Operational Research, Elsevier, vol. 248(2), pages 543-557.
    12. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    13. Hausken, Kjell, 2016. "Axiomatization of Group Contest Success Functions," UiS Working Papers in Economics and Finance 2016/8, University of Stavanger.

  20. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.

    Cited by:

    1. Ni, Guanqun & Xu, Yinfeng & Dong, Yucheng, 2013. "Price and speed decisions in customer-intensive services with two classes of customers," European Journal of Operational Research, Elsevier, vol. 228(2), pages 427-436.
    2. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    3. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
    4. Pala, Ali & Zhuang, Jun, 2018. "Security screening queues with impatient applicants: A new model with a case study," European Journal of Operational Research, Elsevier, vol. 265(3), pages 919-930.
    5. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    6. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    7. Liya Guo & Shan Huang & Jun Zhuang & Adel Sadek, 2013. "Modeling Parking Behavior Under Uncertainty: A Static Game Theoretic versus a Sequential Neo-additive Capacity Modeling Approach," Networks and Spatial Economics, Springer, vol. 13(3), pages 327-350, September.
    8. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.
    9. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    10. Gallice, Andrea, 2017. "An approximate solution to rent-seeking contests with private information," European Journal of Operational Research, Elsevier, vol. 256(2), pages 673-684.

  21. Jun Zhuang & Vicki Bier, 2011. "Secrecy And Deception At Equilibrium, With Applications To Anti-Terrorism Resource Allocation," Defence and Peace Economics, Taylor & Francis Journals, vol. 22(1), pages 43-61.

    Cited by:

    1. Nakao, Keisuke, 2017. "Denial vs. Punishment: Strategies Shape War, but War Itself Affects Strategies," MPRA Paper 81418, University Library of Munich, Germany.
    2. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    3. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    4. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    5. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Technology, Institute of Organization and Management, vol. 3, pages 23-44.
    6. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    7. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    8. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    9. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    10. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    11. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    12. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    13. Grant, Matthew J. & Stewart, Mark G., 2017. "Modelling improvised explosive device attacks in the West – Assessing the hazard," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 345-354.

  22. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.

    Cited by:

    1. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    2. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    3. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    4. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    5. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    6. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.

  23. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.

    Cited by:

    1. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    2. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    3. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    4. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    5. Bertrand Crettez & Naila Hayek, 2014. "Terrorists’ Eradication Versus Perpetual Terror War," Journal of Optimization Theory and Applications, Springer, vol. 160(2), pages 679-702, February.
    6. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    7. Sakai, Kazuki & Hohzaki, Ryusuke & Fukuda, Emiko & Sakuma, Yutaka, 2018. "Risk evaluation and games in mine warfare considering shipcounter effects," European Journal of Operational Research, Elsevier, vol. 268(1), pages 300-313.
    8. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    9. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Technology, Institute of Organization and Management, vol. 3, pages 23-44.
    10. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    11. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    12. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    13. Baykal-Gürsoy, Melike & Duan, Zhe & Poor, H. Vincent & Garnaev, Andrey, 2014. "Infrastructure security games," European Journal of Operational Research, Elsevier, vol. 239(2), pages 469-478.
    14. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    15. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    16. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    17. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    18. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    19. Seidl, Andrea & Kaplan, Edward H. & Caulkins, Jonathan P. & Wrzaczek, Stefan & Feichtinger, Gustav, 2016. "Optimal control of a terror queue," European Journal of Operational Research, Elsevier, vol. 248(1), pages 246-256.
    20. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    21. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    22. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    23. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    24. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    25. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    26. Gallice, Andrea, 2017. "An approximate solution to rent-seeking contests with private information," European Journal of Operational Research, Elsevier, vol. 256(2), pages 673-684.
    27. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    28. Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.

  24. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.

    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Nakao, Keisuke, 2017. "Denial vs. Punishment: Strategies Shape War, but War Itself Affects Strategies," MPRA Paper 81418, University Library of Munich, Germany.
    3. Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
    4. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    5. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    6. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.
    7. Levitin, Gregory & Hausken, Kjell, 2009. "Parallel systems under two sequential attacks," Reliability Engineering and System Safety, Elsevier, vol. 94(3), pages 763-772.
    8. Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.
    9. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    10. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
    11. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    12. Bernhardt, Dan & Polborn, Mattias K., 2010. "Non-convexities and the gains from concealing defenses from committed terrorists," Economics Letters, Elsevier, vol. 107(1), pages 52-54, April.
    13. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    14. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    15. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Technology, Institute of Organization and Management, vol. 3, pages 23-44.
    16. Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
    17. Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
    18. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    19. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    20. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    21. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    22. Zare Moayedi, Behzad & Azgomi, Mohammad Abdollahi, 2012. "A game theoretic framework for evaluation of the impacts of hackers diversity on security measures," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 45-54.
    23. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
    24. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    25. Yisha Xiang & Jun Zhuang, 2016. "A medical resource allocation model for serving emergency victims with deteriorating health conditions," Annals of Operations Research, Springer, vol. 236(1), pages 177-196, January.
    26. Peiqiu Guan & Jun Zhuang, 2015. "Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models," Decision Analysis, INFORMS, vol. 12(4), pages 173-189, December.
    27. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    28. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    29. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    30. Cameron A. MacKenzie & Hiba Baroud & Kash Barker, 2016. "Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill," Annals of Operations Research, Springer, vol. 236(1), pages 103-129, January.
    31. Lv, Wei & Li, Hongyi & Tang, Jiafu, 2017. "Bargaining model of labor disputes considering social mediation and bounded rationalityAuthor-Name: Liu, Dehai," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1064-1071.
    32. Kjell Hausken & Gregory Levitin, 2011. "Shield versus sword resource distribution in K-round duels," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 19(4), pages 589-603, December.
    33. Paan Jindapon & William S. Neilson, 2009. "The Impact Of Societal Risk Attitudes On Terrorism And Counterterrorism," Economics and Politics, Wiley Blackwell, vol. 21(3), pages 433-451, November.
    34. Jiang, J. & Liu, X., 2018. "Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information," European Journal of Operational Research, Elsevier, vol. 266(3), pages 920-933.
    35. Xiao, Hui & Shi, Daimin & Ding, Yi & Peng, Rui, 2016. "Optimal loading and protection of multi-state systems considering performance sharing mechanism," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 88-95.
    36. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    37. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    38. Scott Farrow, 2015. "A comparison of key benefit estimation issues for natural hazards and terrorism: ex ante/ex post valuation and endogenous risk," Chapters,in: Benefit–Cost Analyses for Security Policies, chapter 6, pages 140-154 Edward Elgar Publishing.
    39. Askeland, Tore & Flage, Roger & Aven, Terje, 2017. "Moving beyond probabilities – Strength of knowledge characterisations applied to security," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 196-205.

  25. Peng, Xuehua & Marchant, Mary A. & Qin, Xiang Dong & Zhuang, Jun, 2005. "Chinese Consumers' Preferences for Livestock Products," International Food and Agribusiness Management Review, International Food and Agribusiness Management Association (IFAMA), vol. 8(04).
    See citations under working paper version above.

More information

Research fields, statistics, top rankings, if available.

Statistics

Access and download statistics for all items

Corrections

All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. For general information on how to correct material on RePEc, see these instructions.

To update listings or check citations waiting for approval, Jun Zhuang should log into the RePEc Author Service.

To make corrections to the bibliographic information of a particular item, find the technical contact on the abstract page of that item. There, details are also given on how to add or correct references and citations.

To link different versions of the same work, where versions have a different title, use this form. Note that if the versions have a very similar title and are in the author's profile, the links will usually be created automatically.

Please note that most corrections can take a couple of weeks to filter through the various RePEc services.

IDEAS is a RePEc service hosted by the Research Division of the Federal Reserve Bank of St. Louis . RePEc uses bibliographic data supplied by the respective publishers.