Artículos de revistas sobre el tema "Defensive game systems"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Defensive game systems".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Wu, Wenhao y Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation". Electronics 8, n.º 9 (5 de septiembre de 2019): 991. http://dx.doi.org/10.3390/electronics8090991.
Texto completoMolik, Bartosz, Natalia Morgulec-Adamowicz, Jolanta Marszałek, Andrzej Kosmol, Izabela Rutkowska, Alicja Jakubicka, Ewelina Kaliszewska et al. "Evaluation of Game Performance in Elite Male Sitting Volleyball Players". Adapted Physical Activity Quarterly 34, n.º 2 (abril de 2017): 104–24. http://dx.doi.org/10.1123/apaq.2015-0028.
Texto completoTian, Changjia, Varuna De Silva, Michael Caine y Steve Swanson. "Use of Machine Learning to Automate the Identification of Basketball Strategies Using Whole Team Player Tracking Data". Applied Sciences 10, n.º 1 (18 de diciembre de 2019): 24. http://dx.doi.org/10.3390/app10010024.
Texto completoGambarelli, Daniele, Gianfranco Gambarelli y Dries Goossens. "Offensive or defensive play in soccer: a game-theoretical approach". Journal of Quantitative Analysis in Sports 15, n.º 4 (25 de octubre de 2019): 261–69. http://dx.doi.org/10.1515/jqas-2017-0071.
Texto completoZhang, Cevin, Karin Pukk Härenstam, Sebastiaan Meijer y Adam S. Darwich. "Serious Gaming of Logistics Management in Pediatric Emergency Medicine". International Journal of Serious Games 7, n.º 1 (2 de marzo de 2020): 47–77. http://dx.doi.org/10.17083/ijsg.v7i1.334.
Texto completoPizarro, David, Alba Práxedes, Bruno Travassos, Bruno Gonçalves y Alberto Moreno. "How Informational Constraints for Decision-Making on Passing, Dribbling and Shooting Change With the Manipulation of Small-Sided Games Changes in Futsal". Perceptual and Motor Skills 128, n.º 4 (22 de mayo de 2021): 1684–711. http://dx.doi.org/10.1177/00315125211016350.
Texto completoGuedea Delgado, Julio Cesar, Raúl Josué Nájera Longoria, Oscar Núñez Enríquez, Ramón Candía Luján y Gabriel Gastélum Cuadras. "Sistemas tácticos y resultados de competición del Mundial de Fútbol Asociación de Rusia 2018.Tactical systems and matches results from the Football Association Worldcup Rusia 2018." Retos, n.º 36 (6 de junio de 2019): 503–9. http://dx.doi.org/10.47197/retos.v36i36.69296.
Texto completoPraça, Gibson Moreira, Hugo Folgado, André Gustavo Pereira de Andrade y Pablo Juan Greco. "Comportamento tático coletivo em Pequenos Jogos no Futebol: influência de jogadores adicionais". Brazilian Journal of Kinanthropometry and Human Performance 18, n.º 1 (16 de marzo de 2016): 62. http://dx.doi.org/10.5007/1980-0037.2016v18n1p62.
Texto completoMontgomery, Paul G., David B. Pyne y Clare L. Minahan. "The Physical and Physiological Demands of Basketball Training and Competition". International Journal of Sports Physiology and Performance 5, n.º 1 (marzo de 2010): 75–86. http://dx.doi.org/10.1123/ijspp.5.1.75.
Texto completoZhang, Jing, Shifei Shen y Rui Yang. "The impacts of adaptive attacking and defending strategies on mitigation of intentional threats". Kybernetes 39, n.º 5 (15 de junio de 2010): 825–37. http://dx.doi.org/10.1108/03684921011043279.
Texto completoKing, Sheila M., Caroline Dykeman, Peter Redgrave y Paul Dean. "Use of a Distracting Task to Obtain Defensive Head Movements to Looming Visual Stimuli by Human Adults in a Laboratory Setting". Perception 21, n.º 2 (abril de 1992): 245–59. http://dx.doi.org/10.1068/p210245.
Texto completoXia, Zhuoqun, Zhenwei Fang, Fengfei Zou, Jin Wang y Arun Kumar Sangaiah. "Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant". Security and Communication Networks 2019 (16 de julio de 2019): 1–13. http://dx.doi.org/10.1155/2019/6956072.
Texto completoShan, Xiaojun y Jun Zhuang. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game". European Journal of Operational Research 228, n.º 1 (julio de 2013): 262–72. http://dx.doi.org/10.1016/j.ejor.2013.01.029.
Texto completoOdhiambo, Edwin y Jane Wanjira. "Strategic Positioning and Competitive Advantage of Commercial Banks in Uasin Gishu County, Kenya". International Journal of Current Aspects 3, n.º II (24 de abril de 2019): 83–97. http://dx.doi.org/10.35942/ijcab.v3iii.8.
Texto completoYang, Agnes, Young Jin Kwon y Sang-Yong Tom Lee. "The impact of information sharing legislation on cybersecurity industry". Industrial Management & Data Systems 120, n.º 9 (13 de agosto de 2020): 1777–94. http://dx.doi.org/10.1108/imds-10-2019-0536.
Texto completoLiu, Xiaohu, Hengwei Zhang, Yuchen Zhang, Lulu Shao y Jihong Han. "Active Defense Strategy Selection Method Based on Two-Way Signaling Game". Security and Communication Networks 2019 (29 de noviembre de 2019): 1–14. http://dx.doi.org/10.1155/2019/1362964.
Texto completoYang, Yu, Bichen Che, Yang Zeng, Yang Cheng y Chenyang Li. "MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory". Symmetry 11, n.º 2 (13 de febrero de 2019): 215. http://dx.doi.org/10.3390/sym11020215.
Texto completoStilman, Boris, Vladimir Yakhnis y Oleg Umanskiy. "Linguistic Geometry: The Age of Maturity". Journal of Advanced Computational Intelligence and Intelligent Informatics 14, n.º 6 (20 de septiembre de 2010): 684–99. http://dx.doi.org/10.20965/jaciii.2010.p0684.
Texto completoNoor, Ahmed K. "Game Changers". Mechanical Engineering 136, n.º 09 (1 de septiembre de 2014): 30–35. http://dx.doi.org/10.1115/1.2014-sep-1.
Texto completoHu, Yongjin, Han Zhang, Yuanbo Guo, Tao Li y Jun Ma. "A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice". Wireless Communications and Mobile Computing 2020 (12 de octubre de 2020): 1–10. http://dx.doi.org/10.1155/2020/8850356.
Texto completoTan, Jing-lei, Heng-wei Zhang, Hong-qi Zhang, Cheng Lei, Hui Jin, Bo-wen Li y Hao Hu. "Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model". Security and Communication Networks 2020 (9 de junio de 2020): 1–12. http://dx.doi.org/10.1155/2020/3151495.
Texto completoZhang, Yuchen y Jing Liu. "Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning". Security and Communication Networks 2019 (23 de diciembre de 2019): 1–16. http://dx.doi.org/10.1155/2019/3038586.
Texto completoLiu, Xiaohu, Hengwei Zhang, Yuchen Zhang y Lulu Shao. "Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game". Security and Communication Networks 2020 (28 de octubre de 2020): 1–11. http://dx.doi.org/10.1155/2020/5381495.
Texto completoXu, Xiaotong, Gaocai Wang, Jintian Hu y Yuting Lu. "Study on Stochastic Differential Game Model in Network Attack and Defense". Security and Communication Networks 2020 (8 de junio de 2020): 1–15. http://dx.doi.org/10.1155/2020/3417039.
Texto completoLiang, Li, Fang Deng, Zhihong Peng, Xinxing Li y Wenzhong Zha. "A differential game for cooperative target defense". Automatica 102 (abril de 2019): 58–71. http://dx.doi.org/10.1016/j.automatica.2018.12.034.
Texto completoShi, Leyi, Xiran Wang y Huiwen Hou. "Research on Optimization of Array Honeypot Defense Strategies Based on Evolutionary Game Theory". Mathematics 9, n.º 8 (8 de abril de 2021): 805. http://dx.doi.org/10.3390/math9080805.
Texto completoShinar, J. y G. Silberman. "A discrete dynamic game modelling anti-missile defense scenarios". Dynamics and Control 5, n.º 1 (enero de 1995): 55–67. http://dx.doi.org/10.1007/bf01968535.
Texto completoVon Moll, Alexander y Zachariah Fuchs. "Attacker Dispersal Surface in the Turret Defense Differential Game". IFAC-PapersOnLine 53, n.º 2 (2020): 15659–66. http://dx.doi.org/10.1016/j.ifacol.2020.12.2549.
Texto completoHe, Fei, Jun Zhuang y Nageswara S. V. Rao. "Discrete game-theoretic analysis of defense in correlated cyber-physical systems". Annals of Operations Research 294, n.º 1-2 (21 de septiembre de 2019): 741–67. http://dx.doi.org/10.1007/s10479-019-03381-1.
Texto completoMi, Yan, Hengwei Zhang, Hao Hu, Jinglei Tan y Jindong Wang. "Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model". Security and Communication Networks 2021 (21 de agosto de 2021): 1–16. http://dx.doi.org/10.1155/2021/5594697.
Texto completoFlores-Rodríguez, José y Gonzalo Ramírez-Macías. "Pedagogía no lineal en balonmano. Defensa zonal de una y dos líneas en partidos reducidos (Non-linear pedagogy in handball. One and two lines zone defence in small-sided games)". Retos, n.º 39 (7 de septiembre de 2020): 604–13. http://dx.doi.org/10.47197/retos.v0i39.79640.
Texto completoLins, Isis Didier, Paulo Renato Alves Firmino, Diogo de Carvalho Bezerra, Márcio das Chagas Moura, Enrique López Droguett, Leandro Chaves Rêgo y Carlos Renato dos Santos. "DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY". Pesquisa Operacional 34, n.º 2 (agosto de 2014): 215–35. http://dx.doi.org/10.1590/0101-7438.2014.034.02.0215.
Texto completoDegterev, D. A. y E. A. Stepkin. "American Assistance to Israel: Origins, Structure, Dynamics". MGIMO Review of International Relations, n.º 3(30) (28 de junio de 2013): 92–99. http://dx.doi.org/10.24833/2071-8160-2013-3-30-92-99.
Texto completoHasan, Saqib, Abhishek Dubey, Gabor Karsai y Xenofon Koutsoukos. "A game-theoretic approach for power systems defense against dynamic cyber-attacks". International Journal of Electrical Power & Energy Systems 115 (febrero de 2020): 105432. http://dx.doi.org/10.1016/j.ijepes.2019.105432.
Texto completoHAUSKEN, KJELL. "GAME THEORETIC ANALYSIS OF TWO-PERIOD-DEPENDENT DEGRADED MULTISTATE RELIABILITY SYSTEMS". International Game Theory Review 13, n.º 03 (septiembre de 2011): 247–67. http://dx.doi.org/10.1142/s0219198911002988.
Texto completoBoudko, Svetlana, Peder Aursand y Habtamu Abie. "Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids". Information 11, n.º 12 (14 de diciembre de 2020): 582. http://dx.doi.org/10.3390/info11120582.
Texto completoXiao, Kaiming, Cheng Zhu, Junjie Xie, Yun Zhou, Xianqiang Zhu y Weiming Zhang. "Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework". Entropy 22, n.º 8 (15 de agosto de 2020): 894. http://dx.doi.org/10.3390/e22080894.
Texto completoClose, Kevin y Audrey Amrein-Beardsley. "Learning from what doesn’t work in teacher evaluation". Phi Delta Kappan 100, n.º 1 (27 de agosto de 2018): 15–19. http://dx.doi.org/10.1177/0031721718797115.
Texto completoWang, Kun, Miao Du, Dejun Yang, Chunsheng Zhu, Jian Shen y Yan Zhang. "Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems". ACM Transactions on Embedded Computing Systems 16, n.º 1 (3 de noviembre de 2016): 1–21. http://dx.doi.org/10.1145/2886100.
Texto completoXiang, Yingmeng y Lingfeng Wang. "A game-theoretic study of load redistribution attack and defense in power systems". Electric Power Systems Research 151 (octubre de 2017): 12–25. http://dx.doi.org/10.1016/j.epsr.2017.05.020.
Texto completoCoughlin, P. J. "Pure strategy equilibria in a class of systems defense games". International Journal of Game Theory 20, n.º 3 (septiembre de 1992): 195–210. http://dx.doi.org/10.1007/bf01253775.
Texto completoLi, Yapeng, Ye Deng, Yu Xiao y Jun Wu. "Attack and Defense Strategies in Complex Networks Based on Game Theory". Journal of Systems Science and Complexity 32, n.º 6 (diciembre de 2019): 1630–40. http://dx.doi.org/10.1007/s11424-019-7420-0.
Texto completoMusman, Scott y Andrew Turner. "A game theoretic approach to cyber security risk management". Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, n.º 2 (20 de marzo de 2017): 127–46. http://dx.doi.org/10.1177/1548512917699724.
Texto completoCărăbaş, Ionică. "Aspects regarding the pivot player tasks in the handball game". Timisoara Physical Education and Rehabilitation Journal 7, n.º 13 (1 de diciembre de 2014): 123–27. http://dx.doi.org/10.1515/tperj-2015-0021.
Texto completoQi, Chao, Jiangxing Wu, Guozhen Cheng, Jianjian Ai y Shuo Zhao. "Security Analysis of Dynamic SDN Architectures Based on Game Theory". Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/4123736.
Texto completoZhao, Jinxiong, Xun Zhang, Fuqiang Di, Sensen Guo, Xiaoyu Li, Xiao Jing, Panfei Huang y Dejun Mu. "Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective". Security and Communication Networks 2021 (12 de febrero de 2021): 1–14. http://dx.doi.org/10.1155/2021/6699108.
Texto completoWang, Kun, Li Yuan, Toshiaki Miyazaki, Yuanfang Chen y Yan Zhang. "Jamming and Eavesdropping Defense in Green Cyber–Physical Transportation Systems Using a Stackelberg Game". IEEE Transactions on Industrial Informatics 14, n.º 9 (septiembre de 2018): 4232–42. http://dx.doi.org/10.1109/tii.2018.2841033.
Texto completoKujawski, Edouard. "A Probabilistic Game-Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems". Systems Engineering 19, n.º 6 (noviembre de 2016): 549–66. http://dx.doi.org/10.1002/sys.21376.
Texto completoLiu, Zhaoxi y Lingfeng Wang. "FlipIt Game Model-Based Defense Strategy Against Cyberattacks on SCADA Systems Considering Insider Assistance". IEEE Transactions on Information Forensics and Security 16 (2021): 2791–804. http://dx.doi.org/10.1109/tifs.2021.3065504.
Texto completoMecheva, Teodora y Nikolay Kakanakov. "Cybersecurity in Intelligent Transportation Systems". Computers 9, n.º 4 (13 de octubre de 2020): 83. http://dx.doi.org/10.3390/computers9040083.
Texto completo