The following publications are possibly variants of this publication:
- Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theoryChen Lin, Hui Xiao, Rui Peng 0001, Yisha Xiang. ress, 210:107510, 2021. [doi]
- Reach-Avoid Games With Two Defenders and One Attacker: An Analytical ApproachRui Yan, Zongying Shi, Yisheng Zhong. tcyb, 49(3):1035-1046, 2019. [doi]
- Optimal transmission strategy for sensors to defend against eavesdropping and jamming attacksLi Yuan, Kun Wang, Toshiaki Miyazaki, Song Guo, Meng Wu. icc 2017: 1-6 [doi]