Journal articles on the topic 'Defensive game systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Defensive game systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wu, Wenhao, and Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation." Electronics 8, no. 9 (September 5, 2019): 991. http://dx.doi.org/10.3390/electronics8090991.
Full textMolik, Bartosz, Natalia Morgulec-Adamowicz, Jolanta Marszałek, Andrzej Kosmol, Izabela Rutkowska, Alicja Jakubicka, Ewelina Kaliszewska, et al. "Evaluation of Game Performance in Elite Male Sitting Volleyball Players." Adapted Physical Activity Quarterly 34, no. 2 (April 2017): 104–24. http://dx.doi.org/10.1123/apaq.2015-0028.
Full textTian, Changjia, Varuna De Silva, Michael Caine, and Steve Swanson. "Use of Machine Learning to Automate the Identification of Basketball Strategies Using Whole Team Player Tracking Data." Applied Sciences 10, no. 1 (December 18, 2019): 24. http://dx.doi.org/10.3390/app10010024.
Full textGambarelli, Daniele, Gianfranco Gambarelli, and Dries Goossens. "Offensive or defensive play in soccer: a game-theoretical approach." Journal of Quantitative Analysis in Sports 15, no. 4 (October 25, 2019): 261–69. http://dx.doi.org/10.1515/jqas-2017-0071.
Full textZhang, Cevin, Karin Pukk Härenstam, Sebastiaan Meijer, and Adam S. Darwich. "Serious Gaming of Logistics Management in Pediatric Emergency Medicine." International Journal of Serious Games 7, no. 1 (March 2, 2020): 47–77. http://dx.doi.org/10.17083/ijsg.v7i1.334.
Full textPizarro, David, Alba Práxedes, Bruno Travassos, Bruno Gonçalves, and Alberto Moreno. "How Informational Constraints for Decision-Making on Passing, Dribbling and Shooting Change With the Manipulation of Small-Sided Games Changes in Futsal." Perceptual and Motor Skills 128, no. 4 (May 22, 2021): 1684–711. http://dx.doi.org/10.1177/00315125211016350.
Full textGuedea Delgado, Julio Cesar, Raúl Josué Nájera Longoria, Oscar Núñez Enríquez, Ramón Candía Luján, and Gabriel Gastélum Cuadras. "Sistemas tácticos y resultados de competición del Mundial de Fútbol Asociación de Rusia 2018.Tactical systems and matches results from the Football Association Worldcup Rusia 2018." Retos, no. 36 (June 6, 2019): 503–9. http://dx.doi.org/10.47197/retos.v36i36.69296.
Full textPraça, Gibson Moreira, Hugo Folgado, André Gustavo Pereira de Andrade, and Pablo Juan Greco. "Comportamento tático coletivo em Pequenos Jogos no Futebol: influência de jogadores adicionais." Brazilian Journal of Kinanthropometry and Human Performance 18, no. 1 (March 16, 2016): 62. http://dx.doi.org/10.5007/1980-0037.2016v18n1p62.
Full textMontgomery, Paul G., David B. Pyne, and Clare L. Minahan. "The Physical and Physiological Demands of Basketball Training and Competition." International Journal of Sports Physiology and Performance 5, no. 1 (March 2010): 75–86. http://dx.doi.org/10.1123/ijspp.5.1.75.
Full textZhang, Jing, Shifei Shen, and Rui Yang. "The impacts of adaptive attacking and defending strategies on mitigation of intentional threats." Kybernetes 39, no. 5 (June 15, 2010): 825–37. http://dx.doi.org/10.1108/03684921011043279.
Full textKing, Sheila M., Caroline Dykeman, Peter Redgrave, and Paul Dean. "Use of a Distracting Task to Obtain Defensive Head Movements to Looming Visual Stimuli by Human Adults in a Laboratory Setting." Perception 21, no. 2 (April 1992): 245–59. http://dx.doi.org/10.1068/p210245.
Full textXia, Zhuoqun, Zhenwei Fang, Fengfei Zou, Jin Wang, and Arun Kumar Sangaiah. "Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant." Security and Communication Networks 2019 (July 16, 2019): 1–13. http://dx.doi.org/10.1155/2019/6956072.
Full textShan, Xiaojun, and Jun Zhuang. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game." European Journal of Operational Research 228, no. 1 (July 2013): 262–72. http://dx.doi.org/10.1016/j.ejor.2013.01.029.
Full textOdhiambo, Edwin, and Jane Wanjira. "Strategic Positioning and Competitive Advantage of Commercial Banks in Uasin Gishu County, Kenya." International Journal of Current Aspects 3, no. II (April 24, 2019): 83–97. http://dx.doi.org/10.35942/ijcab.v3iii.8.
Full textYang, Agnes, Young Jin Kwon, and Sang-Yong Tom Lee. "The impact of information sharing legislation on cybersecurity industry." Industrial Management & Data Systems 120, no. 9 (August 13, 2020): 1777–94. http://dx.doi.org/10.1108/imds-10-2019-0536.
Full textLiu, Xiaohu, Hengwei Zhang, Yuchen Zhang, Lulu Shao, and Jihong Han. "Active Defense Strategy Selection Method Based on Two-Way Signaling Game." Security and Communication Networks 2019 (November 29, 2019): 1–14. http://dx.doi.org/10.1155/2019/1362964.
Full textYang, Yu, Bichen Che, Yang Zeng, Yang Cheng, and Chenyang Li. "MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory." Symmetry 11, no. 2 (February 13, 2019): 215. http://dx.doi.org/10.3390/sym11020215.
Full textStilman, Boris, Vladimir Yakhnis, and Oleg Umanskiy. "Linguistic Geometry: The Age of Maturity." Journal of Advanced Computational Intelligence and Intelligent Informatics 14, no. 6 (September 20, 2010): 684–99. http://dx.doi.org/10.20965/jaciii.2010.p0684.
Full textNoor, Ahmed K. "Game Changers." Mechanical Engineering 136, no. 09 (September 1, 2014): 30–35. http://dx.doi.org/10.1115/1.2014-sep-1.
Full textHu, Yongjin, Han Zhang, Yuanbo Guo, Tao Li, and Jun Ma. "A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice." Wireless Communications and Mobile Computing 2020 (October 12, 2020): 1–10. http://dx.doi.org/10.1155/2020/8850356.
Full textTan, Jing-lei, Heng-wei Zhang, Hong-qi Zhang, Cheng Lei, Hui Jin, Bo-wen Li, and Hao Hu. "Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model." Security and Communication Networks 2020 (June 9, 2020): 1–12. http://dx.doi.org/10.1155/2020/3151495.
Full textZhang, Yuchen, and Jing Liu. "Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning." Security and Communication Networks 2019 (December 23, 2019): 1–16. http://dx.doi.org/10.1155/2019/3038586.
Full textLiu, Xiaohu, Hengwei Zhang, Yuchen Zhang, and Lulu Shao. "Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game." Security and Communication Networks 2020 (October 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/5381495.
Full textXu, Xiaotong, Gaocai Wang, Jintian Hu, and Yuting Lu. "Study on Stochastic Differential Game Model in Network Attack and Defense." Security and Communication Networks 2020 (June 8, 2020): 1–15. http://dx.doi.org/10.1155/2020/3417039.
Full textLiang, Li, Fang Deng, Zhihong Peng, Xinxing Li, and Wenzhong Zha. "A differential game for cooperative target defense." Automatica 102 (April 2019): 58–71. http://dx.doi.org/10.1016/j.automatica.2018.12.034.
Full textShi, Leyi, Xiran Wang, and Huiwen Hou. "Research on Optimization of Array Honeypot Defense Strategies Based on Evolutionary Game Theory." Mathematics 9, no. 8 (April 8, 2021): 805. http://dx.doi.org/10.3390/math9080805.
Full textShinar, J., and G. Silberman. "A discrete dynamic game modelling anti-missile defense scenarios." Dynamics and Control 5, no. 1 (January 1995): 55–67. http://dx.doi.org/10.1007/bf01968535.
Full textVon Moll, Alexander, and Zachariah Fuchs. "Attacker Dispersal Surface in the Turret Defense Differential Game." IFAC-PapersOnLine 53, no. 2 (2020): 15659–66. http://dx.doi.org/10.1016/j.ifacol.2020.12.2549.
Full textHe, Fei, Jun Zhuang, and Nageswara S. V. Rao. "Discrete game-theoretic analysis of defense in correlated cyber-physical systems." Annals of Operations Research 294, no. 1-2 (September 21, 2019): 741–67. http://dx.doi.org/10.1007/s10479-019-03381-1.
Full textMi, Yan, Hengwei Zhang, Hao Hu, Jinglei Tan, and Jindong Wang. "Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model." Security and Communication Networks 2021 (August 21, 2021): 1–16. http://dx.doi.org/10.1155/2021/5594697.
Full textFlores-Rodríguez, José, and Gonzalo Ramírez-Macías. "Pedagogía no lineal en balonmano. Defensa zonal de una y dos líneas en partidos reducidos (Non-linear pedagogy in handball. One and two lines zone defence in small-sided games)." Retos, no. 39 (September 7, 2020): 604–13. http://dx.doi.org/10.47197/retos.v0i39.79640.
Full textLins, Isis Didier, Paulo Renato Alves Firmino, Diogo de Carvalho Bezerra, Márcio das Chagas Moura, Enrique López Droguett, Leandro Chaves Rêgo, and Carlos Renato dos Santos. "DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY." Pesquisa Operacional 34, no. 2 (August 2014): 215–35. http://dx.doi.org/10.1590/0101-7438.2014.034.02.0215.
Full textDegterev, D. A., and E. A. Stepkin. "American Assistance to Israel: Origins, Structure, Dynamics." MGIMO Review of International Relations, no. 3(30) (June 28, 2013): 92–99. http://dx.doi.org/10.24833/2071-8160-2013-3-30-92-99.
Full textHasan, Saqib, Abhishek Dubey, Gabor Karsai, and Xenofon Koutsoukos. "A game-theoretic approach for power systems defense against dynamic cyber-attacks." International Journal of Electrical Power & Energy Systems 115 (February 2020): 105432. http://dx.doi.org/10.1016/j.ijepes.2019.105432.
Full textHAUSKEN, KJELL. "GAME THEORETIC ANALYSIS OF TWO-PERIOD-DEPENDENT DEGRADED MULTISTATE RELIABILITY SYSTEMS." International Game Theory Review 13, no. 03 (September 2011): 247–67. http://dx.doi.org/10.1142/s0219198911002988.
Full textBoudko, Svetlana, Peder Aursand, and Habtamu Abie. "Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids." Information 11, no. 12 (December 14, 2020): 582. http://dx.doi.org/10.3390/info11120582.
Full textXiao, Kaiming, Cheng Zhu, Junjie Xie, Yun Zhou, Xianqiang Zhu, and Weiming Zhang. "Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework." Entropy 22, no. 8 (August 15, 2020): 894. http://dx.doi.org/10.3390/e22080894.
Full textClose, Kevin, and Audrey Amrein-Beardsley. "Learning from what doesn’t work in teacher evaluation." Phi Delta Kappan 100, no. 1 (August 27, 2018): 15–19. http://dx.doi.org/10.1177/0031721718797115.
Full textWang, Kun, Miao Du, Dejun Yang, Chunsheng Zhu, Jian Shen, and Yan Zhang. "Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems." ACM Transactions on Embedded Computing Systems 16, no. 1 (November 3, 2016): 1–21. http://dx.doi.org/10.1145/2886100.
Full textXiang, Yingmeng, and Lingfeng Wang. "A game-theoretic study of load redistribution attack and defense in power systems." Electric Power Systems Research 151 (October 2017): 12–25. http://dx.doi.org/10.1016/j.epsr.2017.05.020.
Full textCoughlin, P. J. "Pure strategy equilibria in a class of systems defense games." International Journal of Game Theory 20, no. 3 (September 1992): 195–210. http://dx.doi.org/10.1007/bf01253775.
Full textLi, Yapeng, Ye Deng, Yu Xiao, and Jun Wu. "Attack and Defense Strategies in Complex Networks Based on Game Theory." Journal of Systems Science and Complexity 32, no. 6 (December 2019): 1630–40. http://dx.doi.org/10.1007/s11424-019-7420-0.
Full textMusman, Scott, and Andrew Turner. "A game theoretic approach to cyber security risk management." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 2 (March 20, 2017): 127–46. http://dx.doi.org/10.1177/1548512917699724.
Full textCărăbaş, Ionică. "Aspects regarding the pivot player tasks in the handball game." Timisoara Physical Education and Rehabilitation Journal 7, no. 13 (December 1, 2014): 123–27. http://dx.doi.org/10.1515/tperj-2015-0021.
Full textQi, Chao, Jiangxing Wu, Guozhen Cheng, Jianjian Ai, and Shuo Zhao. "Security Analysis of Dynamic SDN Architectures Based on Game Theory." Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/4123736.
Full textZhao, Jinxiong, Xun Zhang, Fuqiang Di, Sensen Guo, Xiaoyu Li, Xiao Jing, Panfei Huang, and Dejun Mu. "Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective." Security and Communication Networks 2021 (February 12, 2021): 1–14. http://dx.doi.org/10.1155/2021/6699108.
Full textWang, Kun, Li Yuan, Toshiaki Miyazaki, Yuanfang Chen, and Yan Zhang. "Jamming and Eavesdropping Defense in Green Cyber–Physical Transportation Systems Using a Stackelberg Game." IEEE Transactions on Industrial Informatics 14, no. 9 (September 2018): 4232–42. http://dx.doi.org/10.1109/tii.2018.2841033.
Full textKujawski, Edouard. "A Probabilistic Game-Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems." Systems Engineering 19, no. 6 (November 2016): 549–66. http://dx.doi.org/10.1002/sys.21376.
Full textLiu, Zhaoxi, and Lingfeng Wang. "FlipIt Game Model-Based Defense Strategy Against Cyberattacks on SCADA Systems Considering Insider Assistance." IEEE Transactions on Information Forensics and Security 16 (2021): 2791–804. http://dx.doi.org/10.1109/tifs.2021.3065504.
Full textMecheva, Teodora, and Nikolay Kakanakov. "Cybersecurity in Intelligent Transportation Systems." Computers 9, no. 4 (October 13, 2020): 83. http://dx.doi.org/10.3390/computers9040083.
Full text