default search action
Kjell Hausken
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j76]Kjell Hausken:
Fifty Years of Operations Research in Defense. Eur. J. Oper. Res. 318(2): 355-368 (2024) - [j75]Kjell Hausken, Jonathan W. Welburn, Jun Zhuang:
A Review of Attacker-Defender Games and Cyber Security. Games 15(4): 28 (2024) - 2022
- [j74]Kjell Hausken:
Theoretic Model of Adversaries and Media Manipulation: A Two-Period Extension. IGTR 24(3): 2150019:1-2150019:23 (2022) - [j73]Kjell Hausken:
A Review of Axioms for Group Contest Success Functions. Int. J. Strateg. Decis. Sci. 13(1): 1-19 (2022) - 2021
- [j72]Guizhou Wang, Kjell Hausken:
Governmental Taxation of Households Choosing between a National Currency and a Cryptocurrency. Games 12(2): 34 (2021) - [j71]Kjell Hausken:
Governments Playing Games and Combating the Dynamics of a Terrorist Organization. IGTR 23(2): 2050013:1-2050013:26 (2021) - [j70]Kjell Hausken, Jonathan W. Welburn:
Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits. Inf. Syst. Frontiers 23(6): 1609-1620 (2021) - [j69]Kjell Hausken:
Government intervention to combat the dynamics of terrorist organizations. J. Oper. Res. Soc. 72(1): 217-226 (2021) - [j68]Kjell Hausken:
The precautionary principle as multi-period games where players have different thresholds for acceptable uncertainty. Reliab. Eng. Syst. Saf. 206: 107224 (2021) - 2020
- [j67]Guizhou Wang, Jonathan W. Welburn, Kjell Hausken:
A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling. Games 11(4): 64 (2020) - [j66]Kjell Hausken, Mthuli Ncube:
Game Theoretic Analysis of Insurgent Attacks, Government Protection, and International Intervention. Int. J. Strateg. Decis. Sci. 11(1): 56-75 (2020) - [j65]Kjell Hausken:
Cyber resilience in firms, organizations and societies. Internet Things 11: 100204 (2020) - [j64]Kjell Hausken:
Game theoretic analysis of ideologically biased clickbait or fake news and real news. Oper. Res. Decis. 30(2) (2020) - [j63]Kjell Hausken:
Governmental combat of migration between competing terrorist organisations. Oper. Res. Decis. 30(3) (2020)
2010 – 2019
- 2019
- [j62]Kjell Hausken:
Principal-Agent Theory, Game Theory, and the Precautionary Principle. Decis. Anal. 16(2): 105-127 (2019) - [j61]Kjell Hausken:
A Game Theoretic Model of Adversaries and Media Manipulation. Games 10(4): 48 (2019) - [j60]Kjell Hausken:
Defence and attack of complex interdependent systems. J. Oper. Res. Soc. 70(3): 364-376 (2019) - [j59]Kjell Hausken:
Governmental combat of the dynamics of multiple competing terrorist organizations. Math. Comput. Simul. 166: 33-55 (2019) - 2018
- [j58]Kjell Hausken:
Proactivity and Retroactivity of Firms and Information Sharing of Hackers. IGTR 20(1): 1750027:1-1750027:30 (2018) - [j57]Nageswara S. V. Rao, Chris Y. T. Ma, Kjell Hausken, Fei He, David K. Y. Yau, Jun Zhuang:
Defense Strategies for Asymmetric Networked Systems with Discrete Components. Sensors 18(5): 1421 (2018) - 2017
- [j56]Kjell Hausken:
Defense and attack for interdependent systems. Eur. J. Oper. Res. 256(2): 582-591 (2017) - [j55]Kjell Hausken:
Security Investment, Hacking, and Information Sharing between Firms and between Hackers. Games 8(2): 23 (2017) - [j54]Kjell Hausken:
Information Sharing Among Cyber Hackers in Successive Attacks. IGTR 19(2): 1750010:1-1750010:33 (2017) - [j53]Kjell Hausken:
Special versus general protection and attack of parallel and series components. Reliab. Eng. Syst. Saf. 165: 239-256 (2017) - [c6]Nageswara S. V. Rao, Chris Y. T. Ma, Kjell Hausken, Fei He, David K. Y. Yau, Jun Zhuang:
Game-theoretic strategies for asymmetric networked systems. FUSION 2017: 1-8 - [c5]Nageswara S. V. Rao, Chris Y. T. Ma, Kjell Hausken, Fei He, David K. Y. Yau, Jun Zhuang:
Defense strategies for asymmetric networked systems under composite utilities. MFI 2017: 384-389 - [c4]Nageswara S. V. Rao, Neena Imam, Chris Y. T. Ma, Kjell Hausken, Fei He, Jun Zhuang:
On defense strategies for system of systems using aggregated correlations. SysCon 2017: 1-6 - 2016
- [j52]Kjell Hausken, Jun Zhuang:
The strategic interaction between a company and the government surrounding disasters. Ann. Oper. Res. 237(1-2): 27-40 (2016) - [j51]Kjell Hausken, Mthuli Ncube:
How Elections are Impacted by Production, Economic Growth and Conflict. IGTR 18(1): 1550015:1-1550015:29 (2016) - [c3]Nageswara S. V. Rao, Chris Y. T. Ma, Kjell Hausken, Fei He, Jun Zhuang:
Defense strategies for infrastructures with multiple systems of components. FUSION 2016: 270-277 - [c2]Nageswara S. V. Rao, Chris Y. T. Ma, Kjell Hausken, Fei He, Jun Zhuang:
Game-theoretic strategies for systems of components using product-form utilities. MFI 2016: 341-346 - 2015
- [j50]Jonathan W. Welburn, Kjell Hausken:
A game theoretic model of economic crises. Appl. Math. Comput. 266: 738-762 (2015) - 2014
- [j49]Kjell Hausken:
Individual versus overarching protection and attack of assets. Central Eur. J. Oper. Res. 22(1): 89-112 (2014) - [j48]Kjell Hausken:
Returns to information security investment: Endogenizing the expected loss. Inf. Syst. Frontiers 16(2): 329-336 (2014) - [j47]Gregory Levitin, Kjell Hausken, Yuanshun Dai:
Optimal defense with variable number of overarching and individual protections. Reliab. Eng. Syst. Saf. 123: 81-90 (2014) - 2013
- [j46]Kjell Hausken:
Combined Series and Parallel Systems subject to Individual versus Overarching Defense and Attack. Asia Pac. J. Oper. Res. 30(2) (2013) - [j45]Gregory Levitin, Kjell Hausken:
Parallel systems under two sequential attacks with contest intensity variation. Central Eur. J. Oper. Res. 21(1): 207-224 (2013) - [j44]Kjell Hausken, Jun Zhuang:
The impact of disaster on the strategic interaction between company and government. Eur. J. Oper. Res. 225(2): 363-376 (2013) - [j43]Gregory Levitin, Kjell Hausken:
Defence resource distribution between protection and decoys for constant resource stockpiling pace. J. Oper. Res. Soc. 64(9): 1409-1417 (2013) - [j42]Gregory Levitin, Kjell Hausken, Hanoch Ben-Haim:
Defending majority voting systems against a strategic attacker. Reliab. Eng. Syst. Saf. 111: 37-44 (2013) - [j41]Gregory Levitin, Kjell Hausken:
Is it wise to leave some false targets unprotected? Reliab. Eng. Syst. Saf. 112: 176-186 (2013) - [j40]Vicki M. Bier, Kjell Hausken:
Defending and attacking a network of two arcs subject to traffic congestion. Reliab. Eng. Syst. Saf. 112: 214-224 (2013) - [j39]Gregory Levitin, Kjell Hausken, Yuanshun Dai:
Individual vs. overarching protection for minimizing the expected damage caused by an attack. Reliab. Eng. Syst. Saf. 119: 117-125 (2013) - [j38]Gregory Levitin, Kjell Hausken:
Defending Threshold Voting Systems With Identical Voting Units. IEEE Trans. Reliab. 62(2): 466-477 (2013) - 2012
- [j37]Kjell Hausken:
On the Impossibility of Deterrence in Sequential Colonel Blotto Games. IGTR 14(2) (2012) - [j36]Kjell Hausken:
Terrorism risks, civil liberties, and privacy concerns. Int. J. Crit. Infrastructures 8(4): 293-305 (2012) - [j35]Kjell Hausken, Jun Zhuang:
The timing and deterrence of terrorist attacks due to exogenous dynamics. J. Oper. Res. Soc. 63(6): 726-735 (2012) - [j34]Gregory Levitin, Kjell Hausken:
Individual versus overarching protection against strategic attacks. J. Oper. Res. Soc. 63(7): 969-981 (2012) - [j33]Gregory Levitin, Kjell Hausken:
Parallel systems under two sequential attacks with imperfect detection of the first attack outcome. J. Oper. Res. Soc. 63(11): 1545-1555 (2012) - [j32]Gregory Levitin, Kjell Hausken, Heidi A. Taboada, David W. Coit:
Data survivability vs. security in information systems. Reliab. Eng. Syst. Saf. 100: 19-27 (2012) - 2011
- [j31]Vicki M. Bier, Kjell Hausken:
Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures. Ann. Oper. Res. 186(1): 39-59 (2011) - [j30]Gregory Levitin, Kjell Hausken, Hanoch Ben-Haim:
Active and Passive Defense against Multiple Attack Facilities. Asia Pac. J. Oper. Res. 28(4): 431-444 (2011) - [j29]Kjell Hausken, Gregory Levitin:
Shield versus sword resource distribution in K-round duels. Central Eur. J. Oper. Res. 19(4): 589-603 (2011) - [j28]Kjell Hausken, Jun Zhuang:
Governments' and Terrorists' Defense and Attack in a T-Period Game. Decis. Anal. 8(1): 46-70 (2011) - [j27]Kjell Hausken, Vicki M. Bier:
Defending against multiple different attackers. Eur. J. Oper. Res. 211(2): 370-384 (2011) - [j26]Kjell Hausken, Gregory Levitin:
Active vs. Passive Defense against a Strategic Attacker. IGTR 13(1): 1-12 (2011) - [j25]Kjell Hausken:
Game Theoretic Analysis of Two-Period-Dependent Degraded Multistate Reliability Systems. IGTR 13(3): 247-267 (2011) - [j24]Kjell Hausken:
Protecting complex infrastructures against multiple strategic attackers. Int. J. Syst. Sci. 42(1): 11-29 (2011) - [j23]Gregory Levitin, Kjell Hausken:
Preventive strike vs. false targets and protection in defense strategy. Reliab. Eng. Syst. Saf. 96(8): 912-924 (2011) - [j22]Gregory Levitin, Kjell Hausken:
Is it wise to protect false targets? Reliab. Eng. Syst. Saf. 96(12): 1647-1656 (2011) - 2010
- [j21]Gregory Levitin, Kjell Hausken:
Separation in homogeneous systems with independent identical elements. Eur. J. Oper. Res. 203(3): 625-634 (2010) - [j20]Gregory Levitin, Kjell Hausken:
Defence and attack of systems with variable attacker system structure detection probability. J. Oper. Res. Soc. 61(1): 124-133 (2010) - [j19]Kjell Hausken:
Defense and attack of complex and dependent systems. Reliab. Eng. Syst. Saf. 95(1): 29-42 (2010) - [j18]Gregory Levitin, Kjell Hausken:
Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems. Reliab. Eng. Syst. Saf. 95(5): 565-572 (2010)
2000 – 2009
- 2009
- [j17]Gregory Levitin, Kjell Hausken:
False targets efficiency in defense strategy. Eur. J. Oper. Res. 194(1): 155-162 (2009) - [j16]Kjell Hausken, Gregory Levitin:
Minmax defense strategy for complex multi-state systems. Reliab. Eng. Syst. Saf. 94(2): 577-587 (2009) - [j15]Gregory Levitin, Kjell Hausken:
False targets vs. redundancy in homogeneous parallel systems. Reliab. Eng. Syst. Saf. 94(2): 588-595 (2009) - [j14]Gregory Levitin, Kjell Hausken:
Parallel systems under two sequential attacks. Reliab. Eng. Syst. Saf. 94(3): 763-772 (2009) - [j13]Kjell Hausken, Gregory Levitin:
Protection vs. false targets in series systems. Reliab. Eng. Syst. Saf. 94(5): 973-981 (2009) - [j12]Gregory Levitin, Kjell Hausken:
Meeting a demand vs. enhancing protections in homogeneous parallel systems. Reliab. Eng. Syst. Saf. 94(11): 1711-1717 (2009) - [j11]Gregory Levitin, Kjell Hausken:
Intelligence and impact contests in systems with redundancy, false targets, and partial protection. Reliab. Eng. Syst. Saf. 94(12): 1927-1941 (2009) - [j10]Gregory Levitin, Kjell Hausken:
Redundancy vs. Protection vs. False Targets for Systems Under Attack. IEEE Trans. Reliab. 58(1): 58-68 (2009) - [j9]Gregory Levitin, Kjell Hausken:
Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts. IEEE Trans. Reliab. 58(4): 679-690 (2009) - 2008
- [j8]Kjell Hausken:
Strategic defense and attack for series and parallel reliability systems. Eur. J. Oper. Res. 186(2): 856-881 (2008) - [j7]Kjell Hausken:
Whether to attack a terrorist's resource stock today or tomorrow. Games Econ. Behav. 64(2): 548-564 (2008) - [j6]Gregory Levitin, Kjell Hausken:
Protection vs. redundancy in homogeneous parallel systems. Reliab. Eng. Syst. Saf. 93(10): 1444-1451 (2008) - [j5]Kjell Hausken:
Strategic defense and attack for reliability systems. Reliab. Eng. Syst. Saf. 93(11): 1740-1750 (2008) - 2007
- [c1]Kjell Hausken:
Strategic Defense and Attack of Complex Networks. WEIS 2007 - 2006
- [j4]Kjell Hausken:
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Inf. Syst. Frontiers 8(5): 338-349 (2006) - 2004
- [j3]Kjell Hausken, Ross Cressman:
Formalization of Multi-Level Games. IGTR 6(2): 195-221 (2004) - 2002
- [j2]Kjell Hausken, John F. Moxnes:
Stochastic conditional and unconditional warfare. Eur. J. Oper. Res. 140(1): 61-87 (2002) - 2001
- [j1]Kjell Hausken, Matthias Mohr:
The value of a player in n-person games. Soc. Choice Welf. 18(3): 465-483 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint