[Banks, D., Petralia, F., & Wang, S. (2011). Adversarial risk analysis: Borel games. Applied Stochastic Models in Business and Industry 27(2), pp. 72-86.10.1002/asmb.890]Search in Google Scholar
[Brown, G. & Washburn, A.R. (2000 rev. 2004). The fast theater model (FATHM), Project Report, (NPS-OR-01-002-PR), Naval Postgraduate School, Monterey, CA.]Search in Google Scholar
[Camerer, C. (2003). Behavioral Game Ttheory: Experiments in Strategic Interaction. Princeton University Press, New Jersey.]Search in Google Scholar
[Caswell, D. J., Howard, R. A., & Paté-Cornell, M. E. (2011). Analysis of national strategies to counter a country's nuclear weapons program. Decision Analysis, 8(1), 30-45.10.1287/deca.1110.0198]Search in Google Scholar
[Churchill, D., Saffidine, A., & Buro, M. (2012). Fast Heuristic Search for RTS Game Combat Scenarios. In AIIDE.]Search in Google Scholar
[Davis, P. K., & Blumenthal, D. (1991). The base of sand problem: A white paper on the state of military combat modeling (No. RAND/N-3148-OSD/DARPA). Defense Advanced Research Projects Agency, Arlington VA.]Search in Google Scholar
[Golany, B., Kaplan, E. H., Marmur, A., & Rothblum, U. G. (2009). Nature plays with dice-terrorists do not: Allocating resources to counter strategic versus probabilistic risks. European Journal of Operational Research, 192(1), 198-208.10.1016/j.ejor.2007.09.001]Search in Google Scholar
[Howard, R. A. & Matheson, J. E. (2005). Influence diagrams. Decision Analysis, 2(3), pp. 127-143.10.1287/deca.1050.0020]Search in Google Scholar
[Kadane, J. B. & Larkey, P. D. (1982). Subjective probability and the theory of games. Management Science, 28(2), pp. 113-120.10.1287/mnsc.28.2.113]Search in Google Scholar
[Kangas, L. (2005). Taistelun stokastinen mallinnus. Master's Thesis, Helsinki University of Technology. http://sal.aalto.fi/publications/pdf-files/tkan05.pdf Accessed: 2014-05-07]Search in Google Scholar
[Kangas, L. & Lappi, E. (2006) Probabilistic risk analysis in combat modeling. In: Hämäläinen, J. (ed.) Lanchester and Beyond. A Workshop on Operational Analysis Methodology. PVTT Publications 11]Search in Google Scholar
[Kangaspunta, J., Liesiö, J., & Salo, A. (2012). Cost-efficiency analysis of weapon system portfolios. European Journal of Operational Research, 223(1), pp. 264-275.10.1016/j.ejor.2012.05.042]Search in Google Scholar
[Kardes, E., & Hall, R. (2005). Survey of literature on strategic decision making in the presence of adversaries. Unpublished report.]Search in Google Scholar
[Kovenock, D., Roberson, B. (2010). Conflicts with multiple battlefields, CESifo working paper: Empirical and Theoretical Methods, No. 316510.2139/ssrn.1679624]Search in Google Scholar
[Kroshl, W. M., Sarkani, S., & Mazzuchi, T. A. (2015). Efficient allocation of resources for defense of spatially distributed networks using agent‐based simulation. Risk Analysis (to appear).10.1111/risa.12325]Search in Google Scholar
[Lappi, E. (2012). Computational methods for tactical simulations. Julkaisusarja 1. N:o 1/2012. Doctoral Thesis, National Defence University, Finland]Search in Google Scholar
[Lappi, E., Pakkanen, M., & Åkesson, B. (2012). An approximative method of simulating a duel. In: Proceedings of the Winter Simulation Conference, WSC '12, pp. 208:1-208:1010.1109/WSC.2012.6465044]Search in Google Scholar
[Lappi, E., Pentti, J., Åkesson, B., Roponen, J., Valtonen, J., Koskinen, J., Burhan, U., Sivertun, Å., and Hämäläinen, J. (2015). Team 4: Data farm. manuscript.]Search in Google Scholar
[Meng, S., Wiens, M., & Schultmann, F. (2014). A game-theoretic approach to assess adversarial risks. In: Brebbia, C.A. (ed.), Risk Analysis IX, WIT Press, Southampton, UK, pp. 141-152.10.2495/RISK140131]Search in Google Scholar
[Myerson, R. B. (1991). Game Theory: Analysis of Conflict. Harvard University Press, Cambridge, MA.]Search in Google Scholar
[Paté-Cornell, E., & Guikema, S. (2002). Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures. Military Operations Research, 7(4), pp. 5-23.10.5711/morj.7.4.5]Search in Google Scholar
[Reese, W. (1980). Deception in a game theoretic framework. In: Daniel, D. C., Herbig, K. L., Reese, W., Heuer, R. J., & Sarbin, T. R. (1980). Multidisciplinary Perspectives on Military Deception (No. NPS-56-80-012A). Naval Postgraduate School, Monterey, CA.]Search in Google Scholar
[Rios Insua, D., Rios, J., & Banks, D. (2009). Adversarial risk analysis. Journal of the American Statistical Association, 104(486), pp. 841-854.10.1198/jasa.2009.0155]Search in Google Scholar
[Rios, J., & Rios Insua, D. (2012). Adversarial risk analysis for counterterrorism modeling. Risk analysis, 32(5), pp. 894-915.10.1111/j.1539-6924.2011.01713.x]Search in Google Scholar
[Roponen, J. (2013). Kaksintaistelun approksimatiivinen mallintaminen. Bachelor’s Thesis, Aalto University. http://sal.aalto.fi/publications/pdf-files/trop13_public.pdf Accessed: 2014-05-07]Search in Google Scholar
[Rothschild, C., McLay, L., & Guikema, S. (2012). Adversarial risk analysis with incomplete information: A level‐k approach. Risk Analysis, 32(7), pp. 1219-123110.1111/j.1539-6924.2011.01701.x]Search in Google Scholar
[Santos Jr, E., & Zhao, Q. (2006). Adversarial models for opponent intent inferencing. In: Kott A., & McEneaney W. (2006) Adversarial Reasoning: Computational Approaches to Reading the Opponents Mind. Chapman & Hall/CRC, Boca Raton, 1-22.10.1201/9781420011012.ch1.1]Search in Google Scholar
[Tolk, A. (2012). Engineering Principles of Combat Modeling and Distributed Simulation. Wiley. USA.10.1002/9781118180310]Search in Google Scholar
[Tzu, S. (2004 print) The art of War. Trans. Giles L. Project Gutenberg.]Search in Google Scholar
[Washburn, A. R., & Kress, M. (2009). Combat Modeling. Springer. Heidelberg.10.1007/978-1-4419-0790-5]Search in Google Scholar
[Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Operations Research, 55(5), pp. 976-99110.1287/opre.1070.0434]Search in Google Scholar
[Zuckerman, I., Kraus, S., & Rosenschein, J. S. (2012). The adversarial activity model for bounded rational agents. Autonomous Agents and Multi-Agent Systems, 24(3), 374-409.10.1007/s10458-010-9153-2]Search in Google Scholar
[Åkesson, A. (2012). Automatic calculation of win probabilities and conditional strength distribution of units in stochastic simulation model. Master's Thesis, Åbo Akademi University.]Search in Google Scholar