Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Atin Basuchoudhary
@article{DBLP:journals/games/BangBM21, author = {James T. Bang and Atin Basuchoudhary and Aniruddha Mitra}, title = {Validating Game-Theoretic Models of Terrorism: Insights from Machine Learning}, journal = {Games}, volume = {12}, number = {3}, pages = {54}, year = {2021}, url = {https://doi.org/10.3390/g12030054}, doi = {10.3390/G12030054}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/games/BangBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/games/Basuchoudhary21, author = {Atin Basuchoudhary}, title = {Why Is Civil Conflict Path Dependent? {A} Cultural Explanation}, journal = {Games}, volume = {12}, number = {4}, pages = {93}, year = {2021}, url = {https://doi.org/10.3390/g12040093}, doi = {10.3390/G12040093}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/games/Basuchoudhary21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BasuchoudharyS19, author = {Atin Basuchoudhary and Nicola Searle}, title = {Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets}, journal = {Comput. Secur.}, volume = {87}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.101591}, doi = {10.1016/J.COSE.2019.101591}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BasuchoudharyS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/BasuchoudharyEA15, author = {Atin Basuchoudhary and Mohamed Eltoweissy and Mohamed Azab and Laura Razzolini and Shimaa Mohamed}, title = {Cyberdefense When Attackers Mimic Legitimate Users: {A} Bayesian Approach}, booktitle = {2015 {IEEE} International Conference on Information Reuse and Integration, {IRI} 2015, San Francisco, CA, USA, August 13-15, 2015}, pages = {502--509}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/IRI.2015.83}, doi = {10.1109/IRI.2015.83}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/BasuchoudharyEA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/BasuchoudharyC14, author = {Atin Basuchoudhary and Nazli Choucri}, editor = {James Joshi and Elisa Bertino and Bhavani Thuraisingham and Ling Liu}, title = {The evolution of network based cybersecurity norms: An analytical narrative}, booktitle = {Proceedings of the 15th {IEEE} International Conference on Information Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15, 2014}, pages = {646--653}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IRI.2014.7051951}, doi = {10.1109/IRI.2014.7051951}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/BasuchoudharyC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/da/CobbB09, author = {Barry R. Cobb and Atin Basuchoudhary}, title = {A Decision Analysis Approach to Solving the Signaling Game}, journal = {Decis. Anal.}, volume = {6}, number = {4}, pages = {239--255}, year = {2009}, url = {https://doi.org/10.1287/deca.1090.0148}, doi = {10.1287/DECA.1090.0148}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/da/CobbB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.