BibTeX records: Atin Basuchoudhary

download as .bib file

@article{DBLP:journals/games/BangBM21,
  author       = {James T. Bang and
                  Atin Basuchoudhary and
                  Aniruddha Mitra},
  title        = {Validating Game-Theoretic Models of Terrorism: Insights from Machine
                  Learning},
  journal      = {Games},
  volume       = {12},
  number       = {3},
  pages        = {54},
  year         = {2021},
  url          = {https://doi.org/10.3390/g12030054},
  doi          = {10.3390/G12030054},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/games/BangBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/games/Basuchoudhary21,
  author       = {Atin Basuchoudhary},
  title        = {Why Is Civil Conflict Path Dependent? {A} Cultural Explanation},
  journal      = {Games},
  volume       = {12},
  number       = {4},
  pages        = {93},
  year         = {2021},
  url          = {https://doi.org/10.3390/g12040093},
  doi          = {10.3390/G12040093},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/games/Basuchoudhary21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BasuchoudharyS19,
  author       = {Atin Basuchoudhary and
                  Nicola Searle},
  title        = {Snatched secrets: Cybercrime and trade secrets modelling a firm's
                  decision to report a theft of trade secrets},
  journal      = {Comput. Secur.},
  volume       = {87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.101591},
  doi          = {10.1016/J.COSE.2019.101591},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BasuchoudharyS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/BasuchoudharyEA15,
  author       = {Atin Basuchoudhary and
                  Mohamed Eltoweissy and
                  Mohamed Azab and
                  Laura Razzolini and
                  Shimaa Mohamed},
  title        = {Cyberdefense When Attackers Mimic Legitimate Users: {A} Bayesian Approach},
  booktitle    = {2015 {IEEE} International Conference on Information Reuse and Integration,
                  {IRI} 2015, San Francisco, CA, USA, August 13-15, 2015},
  pages        = {502--509},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/IRI.2015.83},
  doi          = {10.1109/IRI.2015.83},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/BasuchoudharyEA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/BasuchoudharyC14,
  author       = {Atin Basuchoudhary and
                  Nazli Choucri},
  editor       = {James Joshi and
                  Elisa Bertino and
                  Bhavani Thuraisingham and
                  Ling Liu},
  title        = {The evolution of network based cybersecurity norms: An analytical
                  narrative},
  booktitle    = {Proceedings of the 15th {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15,
                  2014},
  pages        = {646--653},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IRI.2014.7051951},
  doi          = {10.1109/IRI.2014.7051951},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/BasuchoudharyC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/da/CobbB09,
  author       = {Barry R. Cobb and
                  Atin Basuchoudhary},
  title        = {A Decision Analysis Approach to Solving the Signaling Game},
  journal      = {Decis. Anal.},
  volume       = {6},
  number       = {4},
  pages        = {239--255},
  year         = {2009},
  url          = {https://doi.org/10.1287/deca.1090.0148},
  doi          = {10.1287/DECA.1090.0148},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/da/CobbB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics