CINXE.COM

Document Zbl 07976060 - zbMATH Open

<!doctype html> <html lang="en"> <head> <meta charset="utf-8"> <title>Document Zbl 07976060 - zbMATH Open</title> <meta name="viewport" content="width=device-width, minimum-scale=0.1, maximum-scale=5.0"> <meta name="robots" content="noarchive, noindex"> <meta name="referrer" content="origin-when-cross-origin"> <link href="https://static.zbmath.org/contrib/bootstrap/v3.3.7/css/bootstrap.min.css" rel="stylesheet" media="screen,print"> <link href="https://static.zbmath.org/contrib/bootstrap/v3.3.7/css/bootstrap-theme.min.css" rel="stylesheet" media="screen,print"> <link href="https://static.zbmath.org/contrib/bootstrap-lightbox/v0.7.0/bootstrap-lightbox.min.css" rel="stylesheet" media="screen,print"> <link rel="stylesheet" href="https://static.zbmath.org/contrib/bootstrap-select/v1.13.14/css/bootstrap-select.min.css"> <link href="/static/css/smoothness/jquery-ui-1.10.1.custom.min.css" rel="stylesheet" media="screen"> <link href="/static/styles.css?v=20241024" rel="stylesheet" media="screen,print"> <link href="https://static.zbmath.org/zbMathJax/v0.1.38/zbmathjax.css" rel="stylesheet" media="screen,print"> <link rel="shortcut icon" href="/static/zbmath.ico"> <script type="application/ld+json"> { "@context": "http://schema.org", "@type": "Organization", "url": "https://zbmath.org/", "logo": "https://zbmath.org/static/zbMATH.png" } </script> </head> <body> <div id="line"></div> <span id="clear" style="cursor: pointer;">&times;</span> <div id="page"> <div id="head"> <nav id="menu" class="navbar navbar-default"> <div class="container-fluid"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#zbnav" aria-expanded="false"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a class="navbar-brand" href="#"> <img class="logo" src="/static/zbmath.gif" alt="zbMATH Open logo"> </a> </div> <div id="zbnav" class="collapse navbar-collapse"> <ul class="nav navbar-nav pages"> <li class="about"> <a href="/about/">About</a> </li> <li class="frequently-asked-questions"> <a href="/frequently-asked-questions/">FAQ</a> </li> <li class="general-help"> <a href="/general-help/">General Help</a> </li> <li class="reviewer-service"> <a href="https://zbmath.org/reviewer-service/" target="_self" >Reviewer Service</a> </li> <li> <a href="/tools-and-resources/">Tools &amp; Resources</a> </li> <li class="contact"> <a href="/contact/">Contact</a> </li> </ul> <ul class="nav navbar-nav navbar-right prefs"> <li class="preferences dropdown"> <a data-toggle="dropdown" href="#">Preferences <i class="caret"></i></a> <ul class="dropdown-menu preferences"> <li> <form id="preferences" class="navbar-form" method="post" action="/preferences/" onsubmit="return confirm('This website uses cookies for the purposes of storing preference information on your device. Do you agree to this?\n\nPlease refer to our Privacy Policy to learn more about our use of cookies.')" > <input type="hidden" name="path" value="/?q=ra%3Azhao.xudong+se%3A7125"> <span class=""> <label class="title">Search Form</label> <div class="form-group"> <input id="search-multi-line" type="radio" name="search" value="multi-line" checked> <label for="search-multi-line" class="radio">Multi-Line Search (default)</label> </div> <div class="form-group"> <input id="search-one-line" type="radio" name="search" value="one-line"> <label for="search-one-line" class="radio">One-Line Search</label> </div> </span> <span class="count"> <label class="title">Hits per Page</label> <div class="form-group"> <input id="count-10" type="radio" name="count" value="10"> <label for="count-10" class="radio">10</label> </div> <div class="form-group"> <input id="count-20" type="radio" name="count" value="20"> <label for="count-20" class="radio">20</label> </div> <div class="form-group"> <input id="count-50" type="radio" name="count" value="50"> <label for="count-50" class="radio">50</label> </div> <div class="form-group"> <input id="count-100" type="radio" name="count" value="100" checked> <label for="count-100" class="radio">100 (default)</label> </div> <div class="form-group"> <input id="count-200" type="radio" name="count" value="200"> <label for="count-200" class="radio">200</label> </div> </span> <span class="format"> <label class="title">Display Format</label> <div class="form-group"> <input id="format-mathjax" type="radio" name="format" value="mathjax" checked> <label for="format-mathjax" class="radio">MathJax (default)</label> </div> <div class="form-group"> <input id="format-amstex" type="radio" name="format" value="latex"> <label for="format-amstex" class="radio">LaTeX</label> </div> </span> <span class="ranking"> <label class="title">Documents Sorting</label> <div class="form-group"> <input id="documents-ranking-default" type="radio" name="documents_ranking" value="date" checked> <label for="documents-ranking-default" class="radio">Newest first (default)</label> </div> <div class="form-group"> <input id="documents-ranking-references" type="radio" name="documents_ranking" value="references"> <label for="documents-ranking-references" class="radio">Citations</label> </div> <div class="form-group"> <input id="documents-ranking-relevance" type="radio" name="documents_ranking" value="relevance"> <label for="documents-ranking-relevance" class="radio">Relevance</label> </div> </span> <span class="ranking"> <label class="title">Authors Sorting</label> <div class="form-group"> <input id="authors-ranking-default" type="radio" name="authors_ranking" value="alpha" checked> <label for="authors-ranking-default" class="radio">Alphabetically (default)</label> </div> <div class="form-group"> <input id="authors-ranking-references" type="radio" name="authors_ranking" value="references"> <label for="authors-ranking-references" class="radio">Citations</label> </div> </span> <span class="ranking"> <label class="title">Serials Sorting</label> <div class="form-group"> <input id="serials-ranking-default" type="radio" name="serials_ranking" value="alpha" checked> <label for="serials-ranking-default" class="radio">Alphabetically (default)</label> </div> <div class="form-group"> <input id="serials-ranking-references" type="radio" name="serials_ranking" value="references"> <label for="serials-ranking-references" class="radio">Citations</label> </div> </span> <span class="ranking"> <label class="title">Software Sorting</label> <div class="form-group"> <input id="software-ranking-default" type="radio" name="software_ranking" value="references" checked> <label for="software-ranking-default" class="radio">Citations (default)</label> </div> <div class="form-group"> <input id="software-ranking-alpha" type="radio" name="software_ranking" value="alpha"> <label for="software-ranking-alpha" class="radio">Alphabetically</label> </div> </span> <button type="submit" class="btn btn-default">OK</button> <div class="clearfix"> </form> </li> </ul> </li> </ul> </div> </div> </nav> <div id="tabs"> <h1 class="logo"> <a class="logo" href="/"> <img class="logo" src="/static/zbmath.gif" alt="zbMATH Open &mdash; the first resource for mathematics" > </a> </h1> <nav> <ul class="nav nav-tabs"> <li class="tab-documents active"> <a href="/">Documents</a> </li> <li class="tab-authors"> <a href="/authors/">Authors</a> </li> <li class="tab-serials"> <a href="/serials/">Serials</a> </li> <li class="tab-software"> <a href="/software/">Software</a> </li> <li class="tab-classification"> <a href="/classification/">Classification</a> </li> <li class="tab-formulae"> <a href="/formulae/">Formulæ</a> </li> </ul> </nav> <div class="clearfix"></div> </div> <div class="content-fixed"> <div class="content-formular"> <div style="display: none;"> <div class="row ml-0"id="multi-line-new-line" style="display: none;"> <div class="col-xs-12 form-inline multi-line"> <select class="form-control multi-line-field multi-line-selectpicker" name="ml-0-f" aria-label="field"> <option data-type="input" value="any" selected>Anywhere</option> <option data-type="input" value="au">Authors</option> <option data-type="input" value="ti">Title</option> <option data-type="input" value="py">Year</option> <option data-type="range" value="pyr">Year Range</option> <option data-type="input" value="cc">MSC</option> <option data-type="input" value="cc1">MSC Primary</option> <option data-type="input" value="so">Source / Journal</option> <option data-type="input" value="pu">Publisher</option> <option data-type="input" value="la">Language</option> <option data-type="input" value="ab">Summary / Review</option> <option data-type="input" value="rv">Reviewer</option> <option data-type="input" value="an">zbMATH ID</option> <option data-type="input" value="en">External ID</option> <option data-type="input" value="ut">Keywords</option> <option data-type="input" value="sw">Software</option> <option data-type="input" value="br">Biographic Ref</option> <option data-type="input" value="rft">Reference Text</option> <option data-type="multiselect-db" value="db">Database</option> <option data-divider="true"></option> <option data-function="remove-line" data-content='<span class="glyphicon glyphicon-minus" aria-hidden="true"></span> remove line' value="any">remove line</option> </select><input name="ml-0-v" class="form-control multi-line-value multi-line-input" type="text" value="" aria-label="value"><select class="form-control multi-line-operators multi-line-selectpicker" name="ml-0-op" aria-label="operator"> <option value="and" selected>AND</option> <option value="andnot">AND NOT</option> <option value="or">OR</option> </select></div> </div> <input name="ml-0-v" class="form-control multi-line-value multi-line-input" type="text" value="" aria-label="value" id="multi-line-type-input"> <span class="multi-line-value" id="multi-line-type-range"><span style="padding-left: 5px;">from</span> <input name="ml-0-v1" class="form-control multi-line-input" type="text" value="" aria-label="value"> until <input name="ml-0-v2" class="form-control multi-line-input" type="text" value="" aria-label="value"></span> <input name="ml-0-v" class="form-control multi-line-value multi-line-input" type="text" value="" aria-label="value" id="multi-line-type-input-la" placeholder="use name or ISO code"> <input name="ml-0-v" class="form-control multi-line-value multi-line-input" type="text" value="" aria-label="value" id="multi-line-type-input-rv" placeholder="enter name or zbMATH reviewer number"> <input name="ml-0-v" class="form-control multi-line-value multi-line-input" type="text" value="" aria-label="value" id="multi-line-type-input-an" placeholder="Zbl, JFM or ERAM number"> <input name="ml-0-v" class="form-control multi-line-value multi-line-input" type="text" value="" aria-label="value" id="multi-line-type-input-en" placeholder="e.g. DOI, ISBN, arXiv ID"> <input name="ml-0-v" class="form-control multi-line-value multi-line-input" type="text" value="" aria-label="value" id="multi-line-type-input-sw" placeholder="use * to find all documents using software"> <input name="ml-0-v" class="form-control multi-line-value multi-line-input" type="text" value="" aria-label="value" id="multi-line-type-input-br" placeholder="find documents about the life or work of a person"> <span class="multi-line-value" id="multi-line-type-multiselect-db"> <select class="multi-line-selectpicker" data-width="100%" multiple> <option value="zbl">Zbl</option> <option value="arxiv">arXiv</option> <option value="jfm">JFM</option> <option value="eram">ERAM</option> </select> <input type="hidden" class="multi-line-input" name="ml-0-v" value=""> </span> </div> <form name="documents" method="GET" action="/" autocomplete="off"> <div class="documents multi-line" style="display: none;"> <div class="forms"> <ul class="nav forms"> <li class="one-line"> <span tabindex="0" class="glyphicon glyphicon-question-sign" title="One-Line Search allows for free logical combinations of search fields" aria-label="One-Line Search allows for free logical combinations of search fields" data-placement="bottom"></span>&nbsp;<a style="display: inline-block;" href="#">One-Line Search <span class="glyphicon glyphicon-search"></span></a> </li> </ul> </div> <div class="clearfix"></div> <div class="container-fluid"> <input type="hidden" id="multi-line-ml" name="ml" value="3"> <div id="multi-line-row-wrapper"> <div class="row ml-1"> <div class="col-xs-12 form-inline multi-line"> <select class="form-control multi-line-field multi-line-selectpicker" name="ml-1-f" aria-label="field"> <option data-type="input" value="any" selected>Anywhere</option> <option data-type="input" value="au">Authors</option> <option data-type="input" value="ti">Title</option> <option data-type="input" value="py">Year</option> <option data-type="range" value="pyr">Year Range</option> <option data-type="input" value="cc">MSC</option> <option data-type="input" value="cc1">MSC Primary</option> <option data-type="input" value="so">Source / Journal</option> <option data-type="input" value="pu">Publisher</option> <option data-type="input" value="la">Language</option> <option data-type="input" value="ab">Summary / Review</option> <option data-type="input" value="rv">Reviewer</option> <option data-type="input" value="an">zbMATH ID</option> <option data-type="input" value="en">External ID</option> <option data-type="input" value="ut">Keywords</option> <option data-type="input" value="sw">Software</option> <option data-type="input" value="br">Biographic Ref</option> <option data-type="input" value="rft">Reference Text</option> <option data-type="multiselect-db" value="db">Database</option> <option data-divider="true"></option> <option data-function="remove-line" data-content='<span class="glyphicon glyphicon-minus" aria-hidden="true"></span> remove line' value="any">remove line</option> </select><input name="ml-1-v" class="form-control multi-line-value multi-line-input" type="text" value="" aria-label="value"><select class="form-control multi-line-operators multi-line-selectpicker" name="ml-1-op" aria-label="operator"> <option value="and" selected>AND</option> <option value="andnot">AND NOT</option> <option value="or">OR</option> </select></div> </div> <div class="row ml-2"> <div class="col-xs-12 form-inline multi-line"> <select class="form-control multi-line-field multi-line-selectpicker" name="ml-2-f" aria-label="field"> <option data-type="input" value="any">Anywhere</option> <option data-type="input" value="au" selected>Authors</option> <option data-type="input" value="ti">Title</option> <option data-type="input" value="py">Year</option> <option data-type="range" value="pyr">Year Range</option> <option data-type="input" value="cc">MSC</option> <option data-type="input" value="cc1">MSC Primary</option> <option data-type="input" value="so">Source / Journal</option> <option data-type="input" value="pu">Publisher</option> <option data-type="input" value="la">Language</option> <option data-type="input" value="ab">Summary / Review</option> <option data-type="input" value="rv">Reviewer</option> <option data-type="input" value="an">zbMATH ID</option> <option data-type="input" value="en">External ID</option> <option data-type="input" value="ut">Keywords</option> <option data-type="input" value="sw">Software</option> <option data-type="input" value="br">Biographic Ref</option> <option data-type="input" value="rft">Reference Text</option> <option data-type="multiselect-db" value="db">Database</option> <option data-divider="true"></option> <option data-function="remove-line" data-content='<span class="glyphicon glyphicon-minus" aria-hidden="true"></span> remove line' value="any">remove line</option> </select><input name="ml-2-v" class="form-control multi-line-value multi-line-input" type="text" value="" aria-label="value"><select class="form-control multi-line-operators multi-line-selectpicker" name="ml-2-op" aria-label="operator"> <option value="and" selected>AND</option> <option value="andnot">AND NOT</option> <option value="or">OR</option> </select></div> </div> <div class="row ml-3"> <div class="col-xs-12 form-inline multi-line"> <select class="form-control multi-line-field multi-line-selectpicker" name="ml-3-f" aria-label="field"> <option data-type="input" value="any">Anywhere</option> <option data-type="input" value="au">Authors</option> <option data-type="input" value="ti" selected>Title</option> <option data-type="input" value="py">Year</option> <option data-type="range" value="pyr">Year Range</option> <option data-type="input" value="cc">MSC</option> <option data-type="input" value="cc1">MSC Primary</option> <option data-type="input" value="so">Source / Journal</option> <option data-type="input" value="pu">Publisher</option> <option data-type="input" value="la">Language</option> <option data-type="input" value="ab">Summary / Review</option> <option data-type="input" value="rv">Reviewer</option> <option data-type="input" value="an">zbMATH ID</option> <option data-type="input" value="en">External ID</option> <option data-type="input" value="ut">Keywords</option> <option data-type="input" value="sw">Software</option> <option data-type="input" value="br">Biographic Ref</option> <option data-type="input" value="rft">Reference Text</option> <option data-type="multiselect-db" value="db">Database</option> <option data-divider="true"></option> <option data-function="remove-line" data-content='<span class="glyphicon glyphicon-minus" aria-hidden="true"></span> remove line' value="any">remove line</option> </select><input name="ml-3-v" class="form-control multi-line-value multi-line-input" type="text" value="" aria-label="value"><div id="multi-line-plus"> <a href="#"><span class="glyphicon glyphicon-plus" aria-hidden="true"></span> add line</a> </div></div> </div> </div> <div class="row"> <div class="col-xs-12 form-inline"> <div class="form-group field checkboxes-wrapper" id="checkboxes-wrapper-test" style="visibility: hidden; position: fixed;"> <label>Document Type:</label> <div class="checkboxes"> <div class="slider"> <label title="search for Articles in Journals"> <input type="checkbox" class="form-control" value="j" checked> <span tabindex="0"><small></small></span> Journal Articles </label> </div> <div class="slider"> <label title="search for Articles in Conference Proceedings and Collected Volumes"> <input type="checkbox" class="form-control" value="a" checked> <span tabindex="0"><small></small></span> Collection Articles </label> </div> <div class="slider"> <label title="search for Monographs, Proceedings, Dissertations etc."> <input type="checkbox" class="form-control" value="b" checked> <span tabindex="0"><small></small></span> Books </label> </div> <div class="slider"> <label title="search for arXiv Preprints"> <input type="checkbox" class="form-control" value="p" checked> <span tabindex="0"><small></small></span> arXiv Preprints </label> </div> </div> </div> <div class="form-group field checkboxes-wrapper" id="checkboxes-wrapper-real"> <label>Document Type:</label> <div class="checkboxes"> <div class="slider"> <label for="dt-j" title="search for Articles in Journals"> <input type="checkbox" id="dt-j" name="dt" class="form-control" value="j" checked> <span tabindex="0"><small></small></span> Journal Articles </label> </div> <div class="slider"> <label for="dt-a" title="search for Articles in Conference Proceedings and Collected Volumes"> <input type="checkbox" id="dt-a" name="dt" class="form-control" value="a" checked> <span tabindex="0"><small></small></span> Collection Articles </label> </div> <div class="slider"> <label for="dt-b" title="search for Monographs, Proceedings, Dissertations etc."> <input type="checkbox" id="dt-b" name="dt" class="form-control" value="b" checked> <span tabindex="0"><small></small></span> Books </label> </div> <div class="slider"> <label for="dt-p" title="search for arXiv Preprints"> <input type="checkbox" id="dt-p" name="dt" class="form-control" value="p" checked> <span tabindex="0"><small></small></span> arXiv Preprints </label> </div> </div> </div> </div> </div> <div class="row"> <div class="col-xs-12 buttons"> <a tabindex="0" class="btn btn-default clear-all">Reset all <span class="glyphicon glyphicon-remove"></span></a> <div class="submit"> <button class="btn btn-default search" type="submit">Search <span class="glyphicon glyphicon-search"></span></button> </div> </div> </div> </div> </div> </form> <form class="form-inline" name="documents" method="GET" action="/"> <div class="documents one-line" style="display: block;"> <div class="forms"> <ul class="nav forms"> <li class="multi-line"><a href="#">New Multi-Line Search <span class="glyphicon glyphicon-list"></span></a></li> </ul> </div> <div id="search-row" class="input-group box"> <span> <div id="search-field"> <input class="query form-control" type="text" name="q" value="ra:zhao.xudong se:7125" aria-label="Search for documents" placeholder="Search for documents" autocomplete="off"> </div> <div class="search-buttons input-group-btn"> <div class="btn-group"> <button class="btn btn-default search" type="submit"><span class="virtual">Search</span> <span class="glyphicon glyphicon-search" style="top: 2px;"></span></button> </div> </div> </span> <span> <div class="search-buttons input-group-btn"> <div class="btn-group"> <div class="btn-group fields"> <button class="btn btn-default dropdown-toggle" data-toggle="dropdown">Fields <i class="caret"></i></button> <ul id="fields" class="dropdown-menu pull-right"> <li><a href="#"><span class="token item">any:</span><span>&nbsp;</span>anywhere (default)</a></li> <li><a href="#"><span class="token item">ab:</span><span>&nbsp;&nbsp;</span>review text</a></li> <li><a href="#"><span class="token item">an:</span><span>&nbsp;&nbsp;</span>zbmath id</a></li> <li><a href="#"><span class="token item">any:</span><span>&nbsp;&nbsp;</span>anywhere</a></li> <li><a href="#"><span class="token item">au:</span><span>&nbsp;&nbsp;</span>contributor name</a></li> <li><a href="#"><span class="token item">br:</span><span>&nbsp;&nbsp;</span>biographic reference name</a></li> <li><a href="#"><span class="token item">cc:</span><span>&nbsp;&nbsp;</span>msc title</a></li> <li><a href="#"><span class="token item">dt:</span><span>&nbsp;&nbsp;</span>document type</a></li> <li><a href="#"><span class="token item">doi:</span><span>&nbsp;&nbsp;</span>doi</a></li> <li><a href="#"><span class="token item">en:</span><span>&nbsp;&nbsp;</span>external id</a></li> <li><a href="#"><span class="token item">la:</span><span>&nbsp;&nbsp;</span>language</a></li> <li><a href="#"><span class="token item">pu:</span><span>&nbsp;&nbsp;</span>publisher</a></li> <li><a href="#"><span class="token item">py:</span><span>&nbsp;&nbsp;</span>year</a></li> <li><a href="#"><span class="token item">rv:</span><span>&nbsp;&nbsp;</span>reviewer name</a></li> <li><a href="#"><span class="token item">so:</span><span>&nbsp;&nbsp;</span>source</a></li> <li><a href="#"><span class="token item">sw:</span><span>&nbsp;&nbsp;</span>software name</a></li> <li><a href="#"><span class="token item">ti:</span><span>&nbsp;&nbsp;</span>title</a></li> <li><a href="#"><span class="token item">ut:</span><span>&nbsp;&nbsp;</span>keyword</a></li> </ul> </div> <div class="btn-group operators"> <button class="btn btn-default dropdown-toggle" data-toggle="dropdown">Operators <i class="caret"></i></button> <ul id="operators" class="dropdown-menu pull-right"> <li><a href="#"><span class="token">a&nbsp;<span class="item">&</span>&nbsp;b&nbsp;</span><span>&nbsp;</span>logical and (default)</a></li> <li><a href="#"><span class="token">a&nbsp;<span class="item">|</span>&nbsp;b&nbsp;</span><span>&nbsp;</span>logical or</a></li> <li><a href="#"><span class="token"><span class="item">!</span>ab&nbsp;&nbsp;&nbsp;</span><span>&nbsp;</span>logical not</a></li> <li><a href="#"><span class="token">abc<span class="item">*</span>&nbsp;&nbsp;</span><span>&nbsp;</span>right wildcard</a></li> <li><a href="#"><span class="token"><span class="item">"</span>ab&nbsp;c<span class="item">"</span></span><span>&nbsp;</span>phrase</a></li> <li><a href="#"><span class="token"><span class="item">(</span>ab&nbsp;c<span class="item">)</span></span><span>&nbsp;</span>parentheses</a></li> </ul> </div> </div> </div> <div class="special"> <ul class="nav help-button"> <li class="dropdown pull-right"> <a href="#">Help <i class="caret"></i></a> </li> </ul> </div> </span> </div> <div class="help"><h2>Examples</h2> <div id="help-terms" role="table"> <div class="help-item" role="row"> <span class="search-example" role="rowheader"><a href="/?q=Geometry">Geometry</a></span> <span class="search-explanation" role="cell" role="cell">Search for the term <em>Geometry</em> in <strong>any</strong> field. Queries are <strong>case-independent</strong>.</span> </div> <div class="help-item" role="row"> <span class="search-example" role="rowheader"><a href="/?q=Funct%2A">Funct*</a></span> <span class="search-explanation" role="cell"><strong>Wildcard</strong> queries are specified by <strong><u>*</u></strong> (e.g. <em>functions</em>, <em>functorial</em>, etc.). Otherwise the search is <strong>exact</strong>.</span> </div> <div class="help-item" role="row"> <span class="search-example" role="rowheader"><a href="/?q=%22Topological+group%22">"Topological group"</a></span> <span class="search-explanation" role="cell"><strong>Phrases</strong> (multi-words) should be set in <u>"</u>straight quotation marks<u>"</u>.</span> </div> <div class="help-item" role="row"> <span class="search-example" role="rowheader"><a href="/?q=au%3A+Bourbaki+%26+ti%3A+Algebra">au: Bourbaki &amp; ti: Algebra</a></span> <span class="search-explanation" role="cell">Search for <strong><u>au</u>thor</strong> and <strong><u>ti</u>tle</strong>. The <strong>and-operator &amp;</strong> is default and can be omitted.</span> </div> <div class="help-item" role="row"> <span class="search-example" role="rowheader"><a href="/?q=Chebyshev+%7C+Tschebyscheff">Chebyshev | Tschebyscheff</a></span> <span class="search-explanation" role="cell">The <strong>or-operator |</strong> allows to search for <em>Chebyshev</em> or <em>Tschebyscheff</em>.</span> </div> <div class="help-item" role="row"> <span class="search-example" role="rowheader"><a href="/?q=Quasi%2A+map%2A+py%3A+1989">Quasi* map* py: 1989</a></span> <span class="search-explanation" role="cell">The resulting documents have <strong><u>p</u>ublication <u>y</u>ear</strong> <em>1989</em>.</span> </div> <div class="help-item" role="row"> <span class="search-example" role="rowheader"><a href="/?q=so%3A+Eur%2A+J%2A+Mat%2A+Soc%2A+cc%3A+14">so: Eur* J* Mat* Soc* cc: 14</a></span> <span class="search-explanation" role="cell">Search for publications in a particular <strong><u>so</u>urce</strong> with a <strong>Mathematics Subject <u>C</u>lassification <u>c</u>ode (<u>cc</u>)</strong> in <em>14</em>.</span> </div> <div class="help-item" role="row"> <span class="search-example" role="rowheader"><a href="/?q=%22Partial+diff%2A+eq%2A%22+%21+elliptic">"Partial diff* eq*" ! elliptic</a></span> <span class="search-explanation" role="cell">The <strong>not</strong>-operator <strong>!</strong> eliminates all results containing the word <em>elliptic</em>.</span> </div> <div class="help-item" role="row"> <span class="search-example" role="rowheader"><a href="/?q=dt%3A+b+%26+au%3A+Hilbert">dt: b &amp; au: Hilbert</a></span> <span class="search-explanation" role="cell">The <strong><u>d</u>ocument <u>t</u>ype</strong> is set to books; alternatively: <u>j</u> for <strong>journal articles</strong>, <u>a</u> for <strong>book articles</strong>.</span> </div> <div class="help-item" role="row"> <span class="search-example" role="rowheader"><a href="/?q=py%3A+2000-2015+cc%3A+%2894A+%7C+11T%29">py: 2000-2015 cc: (94A | 11T)</a></span> <span class="search-explanation" role="cell">Number <strong>ranges</strong> are accepted. Terms can be grouped within <strong><u>(</u>parentheses<u>)</u></strong>.</span> </div> <div class="help-item" role="row"> <span class="search-example" role="rowheader"><a href="/?q=la%3A+chinese">la: chinese</a></span> <span class="search-explanation" role="cell">Find documents in a given <strong><u>la</u>nguage</strong>. <a href="http://en.wikipedia.org/wiki/ISO_639-1">ISO 639-1</a> language codes can also be used.</span> </div> </div> <div id="help-fields"> <h2>Fields</h2> <table> <tr> <td class="nowrap padding" role="rowheader"><strong>any</strong></td> <td class="padding">anywhere</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>an</strong></td> <td class="padding">internal document identifier</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>au</strong></td> <td class="padding">author, editor</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>ai</strong></td> <td class="padding">internal author identifier</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>ti</strong></td> <td class="padding">title</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>la</strong></td> <td class="padding">language</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>so</strong></td> <td class="padding">source</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>ab</strong></td> <td class="padding">review, abstract</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>py</strong></td> <td class="padding">publication year</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>rv</strong></td> <td class="padding">reviewer</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>cc</strong></td> <td class="padding">MSC code</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>ut</strong></td> <td class="padding">uncontrolled term</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>dt</strong></td> <td class="padding" colspan="4">document type (<strong>j</strong>: journal article; <strong>b</strong>: book; <strong>a</strong>: book article)</td> </tr> </table> </div> <div id="help-operators"> <h2>Operators</h2> <table> <tr> <td class="nowrap padding" role="rowheader">a <strong>&amp;</strong> b</td> <td class="padding">logic and</td> </tr> <tr> <td class="nowrap padding" role="rowheader">a <strong>|</strong> b</td> <td class="padding">logic or</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>!</strong>ab</td> <td class="padding">logic not</td> </tr> <tr> <td class="nowrap padding" role="rowheader">abc<strong>*</strong></td> <td class="padding">right wildcard</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>"</strong>ab c<strong>"</strong></td> <td class="padding">phrase</td> </tr> <tr> <td class="nowrap padding" role="rowheader"><strong>(</strong>ab c<strong>)</strong></td> <td class="padding">parentheses</td> </tr> </table> </div> <p> See also our <a href="/general-help/">General Help</a>. </p></div> </div> </form> <div class="clearfix"></div> </div> <div class="content-shadow"></div> </div> </div> <div id="body"> <div id="main"> <div class="messages"> </div> <div id="documents"> <div class="content-main"> <div class="content-item"><div class="item"> <article> <div class="author"><a href="/authors/hausken.kjell" title="Author Profile">Hausken, Kjell</a>; <a href="/authors/welburn.jonathan-w" title="Author Profile">Welburn, Jonathan W.</a>; <a href="/authors/zhuang.jun" title="Author Profile">Zhuang, Jun</a></div> <h2 class="title"> <strong>A review of attacker-defender games and cyber security.</strong> <i>(English)</i> <a class="label nowrap" href="/7976060">Zbl 07976060</a> </h2> <div class="source"> <a href="/serials/7125" title="Journal Profile">Games</a> <a href="/?q=in%3A523144" title="Articles in this Issue">15, No. 4, Paper No. 28, 27 p. (2024)</a>. </div> <div class="abstract"></div> <div class="clear"></div> <div class="classification"> <h3>MSC:</h3> <table><tr> <td> <a class="mono" href="/classification/?q=cc%3A91A10" title="MSC2020">91A10</a> </td> <td class="space"> Noncooperative games </td> </tr><tr> <td> <a class="mono" href="/classification/?q=cc%3A68M25" title="MSC2020">68M25</a> </td> <td class="space"> Computer security </td> </tr><tr> <td> <a class="mono" href="/classification/?q=cc%3A91-02" title="MSC2020">91-02</a> </td> <td class="space"> Research exposition (monographs, survey articles) pertaining to game theory, economics, and finance </td> </tr></table> </div><div class="keywords"> <h3>Keywords:</h3><a href="/?q=ut%3Agame+theory">game theory</a>; <a href="/?q=ut%3Aattack">attack</a>; <a href="/?q=ut%3Adefense">defense</a>; <a href="/?q=ut%3Acyber+security">cyber security</a></div> <!-- Modal used to show zbmath metadata in different output formats--> <div class="modal fade" id="metadataModal" tabindex="-1" role="dialog" aria-labelledby="myModalLabel"> <div class="modal-dialog" role="document"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> <h4 class="modal-title" id="myModalLabel">Cite</h4> </div> <div class="modal-body"> <div class="form-group"> <label for="select-output" class="control-label">Format</label> <select id="select-output" class="form-control" aria-label="Select Metadata format"></select> </div> <div class="form-group"> <label for="metadataText" class="control-label">Result</label> <textarea class="form-control" id="metadataText" rows="10" style="min-width: 100%;max-width: 100%"></textarea> </div> <div id="metadata-alert" class="alert alert-danger" role="alert" style="display: none;"> <!-- alert for connection errors etc --> </div> </div> <div class="modal-footer"> <button type="button" class="btn btn-primary" onclick="copyMetadata()">Copy to clipboard</button> <button type="button" class="btn btn-default" data-dismiss="modal">Close</button> </div> </div> </div> </div> <div class="functions clearfix"> <div class="function"> <!-- Button trigger metadata modal --> <a type="button" class="btn btn-default btn-xs pdf" data-toggle="modal" data-target="#metadataModal" data-itemtype="Zbl" data-itemname="Zbl 07976060" data-ciurl="/ci/07976060" data-biburl="/bibtex/07976060.bib" data-amsurl="/amsrefs/07976060.bib" data-xmlurl="/xml/07976060.xml" > Cite </a> <a class="btn btn-default btn-xs pdf" data-container="body" type="button" href="/pdf/07976060.pdf" title="Zbl 07976060 as PDF">Review PDF</a> </div> <div class="fulltexts"> <span class="fulltext">Full Text:</span> <a class="btn btn-default btn-xs" type="button" href="https://doi.org/10.3390/g15040028" aria-label="DOI for “A review of attacker-defender games and cyber security”" title="10.3390/g15040028">DOI</a> </div> <div class="sfx" style="float: right;"> </div> </div> <div class="references"> <h3>References:</h3> <table><tr> <td>[1]</td> <td class="space">Amin, S.; Johansson, K.H.; Preface to the Focused Issue on Dynamic Games in Cyber Security; Dyn. Games Appl.: 2019; Volume 9 ,881-883. &middot; <a href="/1429.00022" class="nowrap">Zbl 1429.00022</a></td> </tr><tr> <td>[2]</td> <td class="space">Do, C.T.; Tran, N.H.; Hong, C.; Kamhoua, C.A.; Kwiat, K.A.; Blasch, E.; Ren, S.; Pissinou, N.; Iyengar, S.S.; Game theory for cyber security and privacy; ACM Comput. Surv. (CSUR): 2017; Volume 50 ,30.</td> </tr><tr> <td>[3]</td> <td class="space">Etesami, S.R.; Basar, T.; Dynamic Games in Cyber-Physical Security: An Overview; Dyn. Games Appl.: 2019; Volume 9 ,884-913. &middot; <a href="/1431.91052" class="nowrap">Zbl 1431.91052</a></td> </tr><tr> <td>[4]</td> <td class="space">Guikema, S.; Aven, T.; Assessing Risk from Intelligent Attacks: A Perspective on Approaches; Reliab. Eng. Syst. Saf.: 2010; Volume 95 ,478-483.</td> </tr><tr> <td>[5]</td> <td class="space">Hausken, K.; Cyber resilience in firms, organizations and societies; Internet Things: 2020; Volume 11 ,100204.</td> </tr><tr> <td>[6]</td> <td class="space">Hausken, K.; Fifty Years of Operations Research in Defense; Eur. J. Oper. Res.: 2024; Volume 318 ,355-368.</td> </tr><tr> <td>[7]</td> <td class="space">Hausken, K.; Levitin, G.; Review of Systems Defense and Attack Models; Int. J. Perform. Eng.: 2012; Volume 8 ,355-366.</td> </tr><tr> <td>[8]</td> <td class="space">Hunt, K.; Zhuang, J.; A review of attacker-defender games: Current state and paths forward; Eur. J. Oper. Res.: 2024; Volume 313 ,401-417. &middot; <a href="/07864980" class="nowrap">Zbl 07864980</a></td> </tr><tr> <td>[9]</td> <td class="space">Kott, A.; Swami, A.; McDaniel, P.; Security Outlook: Six Cyber Game Changers for the Next 15 Years; Computer: 2014; Volume 47 ,104-106.</td> </tr><tr> <td>[10]</td> <td class="space">Pala, A.; Zhuang, J.; Information Sharing in Cybersecurity: A Review; Decis. Anal.: 2019; Volume 16 ,172-196.</td> </tr><tr> <td>[11]</td> <td class="space">Roy, S.; Ellis, C.; Shiva, S.; Dasgupta, D.; Shandilya, V.; Wu, Q.; A survey of game theory as applied to network security; Proceedings of the System Sciences (HICSS), 2010 43rd Hawaii International Conference: ; ,1-10.</td> </tr><tr> <td>[12]</td> <td class="space">Sedjelmaci, H.; Hadji, M.; Ansari, N.; Cyber Security Game for Intelligent Transportation Systems; IEEE Netw.: 2019; Volume 33 ,216-222.</td> </tr><tr> <td>[13]</td> <td class="space">Hausken, K.; Probabilistic Risk Analysis and Game Theory; Risk Anal.: 2002; Volume 22 ,17-27.</td> </tr><tr> <td>[14]</td> <td class="space">Ackerman, G.; Zhuang, J.; Weerasuriya, S.; Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat; Risk Anal.: 2017; Volume 37 ,342-371.</td> </tr><tr> <td>[15]</td> <td class="space">Xu, Z.; Zhuang, J.; A Study on A Sequential One-Defender-N-Attacker Game; Risk Anal.: 2019; Volume 39 ,1414-1432.</td> </tr><tr> <td>[16]</td> <td class="space">Zhuang, J.; Bier, V.M.; Gupta, A.; Subsidies in Interdependent Security with Heterogeneous Discount Rates; Eng. Econ.: 2007; Volume 52 ,1-19.</td> </tr><tr> <td>[17]</td> <td class="space">Zhuang, J.; Impacts of Subsidized Security on Stability and Total Social Costs of Equilibrium Solutions in an N-Player Game with Errors; Eng. Econ.: 2010; Volume 55 ,131-149.</td> </tr><tr> <td>[18]</td> <td class="space">Shan, X.; Zhuang, J.; Subsidizing to Disrupt a Terrorism Supply Chain—A Four-Player Game; J. Oper. Res. Soc.: 2014; Volume 65 ,1108-1119.</td> </tr><tr> <td>[19]</td> <td class="space">Hausken, K.; Zhuang, J.; Governments’ and Terrorists’ Defense and Attack in a T-Period Game; Decis. Anal.: 2011; Volume 8 ,46-70. &middot; <a href="/1398.91368" class="nowrap">Zbl 1398.91368</a></td> </tr><tr> <td>[20]</td> <td class="space">Jose, V.R.R.; Zhuang, J.; Technology Adoption, Accumulation, and Competition in Multi-period Attacker-Defender Games; Mil. Oper. Res.: 2013; Volume 18 ,33-47.</td> </tr><tr> <td>[21]</td> <td class="space">Hausken, K.; Zhuang, J.; Defending against a Terrorist Who Accumulates Resources; Mil. Oper. Res.: 2011; Volume 16 ,21-39.</td> </tr><tr> <td>[22]</td> <td class="space">Hausken, K.; Zhuang, J.; Defending against a Stockpiling Terrorist; Eng. Econ.: 2011; Volume 56 ,321-353.</td> </tr><tr> <td>[23]</td> <td class="space">Hausken, K.; Zhuang, J.; The Timing and Deterrence of Terrorist Attacks due to Exogenous Dynamics; J. Oper. Res. Soc.: 2012; Volume 63 ,726-735.</td> </tr><tr> <td>[24]</td> <td class="space">Shan, X.; Zhuang, J.; Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection-A Three-Stage Game; Decis. Anal.: 2014; Volume 11 ,43-62. &middot; <a href="/1398.91067" class="nowrap">Zbl 1398.91067</a></td> </tr><tr> <td>[25]</td> <td class="space">Wang, X.; Zhuang, J.; Balancing Congestion and Security in the Presence of Strategic Applicants with Private Information; Eur. J. Oper. Res.: 2011; Volume 212 ,100-111. &middot; <a href="/1237.90065" class="nowrap">Zbl 1237.90065</a></td> </tr><tr> <td>[26]</td> <td class="space">Song, C.; Zhuang, J.; Two-Stage Security Screening Strategies in the Face of Strategic Applicants, Congestions and Screening Errors; Ann. Oper. Res.: 2017; Volume 258 ,237262. &middot; <a href="/1381.90031" class="nowrap">Zbl 1381.90031</a></td> </tr><tr> <td>[27]</td> <td class="space">Song, C.; Zhuang, J.; N-Stage Security Screening Strategies in the Face of Strategic Applicants; Reliab. Eng. Syst. Saf.: 2017; Volume 165 ,292-301.</td> </tr><tr> <td>[28]</td> <td class="space">Song, C.; Zhuang, J.; Modelling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors; Risk Anal.: 2018; Volume 38 ,118-133.</td> </tr><tr> <td>[29]</td> <td class="space">Pala, A.; Zhuang, J.; Security Screening Queues with Impatient Applicants: A New Model with a Case Study; Eur. J. Oper. Res.: 2018; Volume 265 ,919-930. &middot; <a href="/1374.90123" class="nowrap">Zbl 1374.90123</a></td> </tr><tr> <td>[30]</td> <td class="space">Haphuriwat, N.; Bier, V.M.; Willis, H.H.; Deterring the Smuggling of Nuclear Weapons in Container Freight through Detection and Retaliation; Decis. Anal.: 2011; Volume 8 ,88-102. &middot; <a href="/1398.91028" class="nowrap">Zbl 1398.91028</a></td> </tr><tr> <td>[31]</td> <td class="space">Brown, G.G.; Carlyle, W.M.; Harney, R.C.; Skroch, E.M.; Wood, R.K.; Interdicting a Nuclear-Weapons Project; Oper. Res.: 2009; Volume 57 ,866-877. &middot; <a href="/1226.90142" class="nowrap">Zbl 1226.90142</a></td> </tr><tr> <td>[32]</td> <td class="space">Gerald, G.B.; Matthew, C.; Ahmad, A.-G.; Jeffrey, K.; A defender-attacker optimization of Port Radar surveillance: Defender-Attacker Optimization of Port Surveillance; Nav. Res. Logist.: 2011; Volume 58 ,223-235.</td> </tr><tr> <td>[33]</td> <td class="space">Brown, G.; Kline, J.; Thomas, A.; Washburn, A.; Wood, R.K.; A Game-Theoretic Model for Defense of an Oceanic Bastion against Submarines; Mil. Oper. Res.: 2011; Volume 16 ,25-40.</td> </tr><tr> <td>[34]</td> <td class="space">Orojloo, H.; Azgomi, M.A.; A game-theoretic approach to model and quantify the security of cyber-physical systems; Comput. Ind.: 2017; Volume 88 ,44-57.</td> </tr><tr> <td>[35]</td> <td class="space">Nicholas, P.J.; Alderson, D.L.; Fast Design of Wireless Mesh Networks to Defend against Worst-Case Jamming; Mil. Oper. Res.: 2018; Volume 23 ,5-20.</td> </tr><tr> <td>[36]</td> <td class="space">Xu, J.; Wu, H.C.; Tao, X.F.; 5G Cyberspace Security Game; J. Electron. Inf. Technol.: 2020; Volume 42 ,2319-2329.</td> </tr><tr> <td>[37]</td> <td class="space">Xu, Z.; Baykal-Gursoy, M.; Power Allocation for Cooperative Jamming against a Strategic Eavesdropper Over Parallel Channels; IEEE Trans. Inf. Forensic Secur.: 2023; Volume 18 ,846-858.</td> </tr><tr> <td>[38]</td> <td class="space">Garnaev, A.; Baykal-Gursoy, M.; Poor, H.V.; A Game Theoretic Analysis of Secret and Reliable Communication with Active and Passive Adversarial Modes; IEEE Trans. Wirel. Commun.: 2016; Volume 15 ,2155-2163.</td> </tr><tr> <td>[39]</td> <td class="space">Nikoofal, M.E.; Zhuang, J.; On the Value of Exposure and Secrecy of Defense System: First-Mover Advantage Vs. Robustness; Eur. J. Oper. Res.: 2015; Volume 246 ,320-330. &middot; <a href="/1346.91032" class="nowrap">Zbl 1346.91032</a></td> </tr><tr> <td>[40]</td> <td class="space">Zhuang, J.; Bier, V.M.; Secrecy and Deception at Equilibrium, with Applications to Anti-Terrorism Resource Allocation; Def. Peace Econ.: 2011; Volume 22 ,43-61.</td> </tr><tr> <td>[41]</td> <td class="space">Zhuang, J.; Bier, V.M.; Reasons for Secrecy and Deception in Homeland-Security Resource Allocation; Risk Anal.: 2010; Volume 30 ,1737-1743.</td> </tr><tr> <td>[42]</td> <td class="space">Zhuang, J.; Bier, V.M.; Alagoz, O.; Modeling Secrecy and Deception in a Multiple-Period Attacker-Defender Signaling Game; Eur. J. Oper. Res.: 2010; Volume 203 ,409-418. &middot; <a href="/1177.91053" class="nowrap">Zbl 1177.91053</a></td> </tr><tr> <td>[43]</td> <td class="space">Dighe, N.S.; Zhuang, J.; Bier, V.M.; Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effective Attacker Deterrence; Int. J. Perform. Eng.: 2009; Volume 5 ,31-43.</td> </tr><tr> <td>[44]</td> <td class="space">Wang, C.; Bier, V.M.; Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility; Decis. Anal.: 2011; Volume 8 ,286-302. &middot; <a href="/1398.91068" class="nowrap">Zbl 1398.91068</a></td> </tr><tr> <td>[45]</td> <td class="space">Wang, C.; Bier, V.M.; Quantifying Adversary Capabilities to Inform Defensive Resource Allocation; Risk Anal.: 2016; Volume 36 ,756-775.</td> </tr><tr> <td>[46]</td> <td class="space">Zhai, Q.; Peng, R.; Zhuang, J.; Defender-Attacker Games with Asymmetric Player Utilities; Risk Anal.: 2020; Volume 40 ,408-420.</td> </tr><tr> <td>[47]</td> <td class="space">Dong, Y.; Chen, X.; Hunt, K.; Zhuang, J.; Defensive Resource Allocation: The Roles of Forecast Information and Risk Control; Risk Anal.: 2021; Volume 41 ,1304-1322.</td> </tr><tr> <td>[48]</td> <td class="space">Rios Insua, D.; Rios, J.; Banks, D.; Modeling Opponents in Adversarial Risk Analysis; Risk Anal.: 2016; Volume 36 ,742-755.</td> </tr><tr> <td>[49]</td> <td class="space">Rios Insua, D.; Rios, J.; Banks, D.; Adversarial Risk Analysis; J. Am. Stat. Assoc.: 2009; Volume 104 ,841-854. &middot; <a href="/1390.91117" class="nowrap">Zbl 1390.91117</a></td> </tr><tr> <td>[50]</td> <td class="space">Rothschild, C.; McLay, L.; Guikema, S.; Adversarial Risk Analysis with Incomplete Information: A Level-k Approach; Risk Anal.: 2012; Volume 32 ,1219-1231.</td> </tr><tr> <td>[51]</td> <td class="space">Banks, D.; Gallego, V.; Naveiro, R.; Ríos Insua, D.; Adversarial risk analysis: An overview; Wiley Interdiscip. Rev. Comput. Stat.: 2022; Volume 14 ,e1530. &middot; <a href="/1544.62007" class="nowrap">Zbl 1544.62007</a></td> </tr><tr> <td>[52]</td> <td class="space">Bier, V.M.; Choosing What to Protect; Risk Anal.: 2007; Volume 27 ,607-620.</td> </tr><tr> <td>[53]</td> <td class="space">Bier, V.M.; Oliveros, S.; Samuelson, L.; Choosing what to protect: Strategic defensive allocation against an unknown attacker; J. Public Econ. Theory: 2007; Volume 9 ,563-587.</td> </tr><tr> <td>[54]</td> <td class="space">Hausken, K.; Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain; Oper. Res. Decis.: 2014; Volume 24 ,23-44. &middot; <a href="/1395.91003" class="nowrap">Zbl 1395.91003</a></td> </tr><tr> <td>[55]</td> <td class="space">Yolmeh, A.; Baykal-Gürsoy, M.; A robust approach to infrastructure security games; Comput. Ind. Eng.: 2017; Volume 110 ,515-526.</td> </tr><tr> <td>[56]</td> <td class="space">He, F.; Zhuang, J.; Modelling ‘Contracts’ between a Terrorist Group and a Government in a Sequential Game; J. Oper. Res. Soc.: 2012; Volume 63 ,790-809.</td> </tr><tr> <td>[57]</td> <td class="space">Xu, J.; Zhuang, J.; Modeling Costly Learning and Counter-learning in a Defender-attacker Game with Private Defender Information; Ann. Oper. Res.: 2016; Volume 236 ,271-289. &middot; <a href="/1345.91064" class="nowrap">Zbl 1345.91064</a></td> </tr><tr> <td>[58]</td> <td class="space">Zhuang, J.; Bier, V.M.; Balancing Terrorism and Natural Disasters: Defensive Strategy with Endogenous Attacker Effort; Oper. Res.: 2007; Volume 55 ,976-991. &middot; <a href="/1167.91331" class="nowrap">Zbl 1167.91331</a></td> </tr><tr> <td>[59]</td> <td class="space">Hunt, K.; Agarwal, P.; Zhuang, J.; Technology Adoption for Airport Security: Modeling Public Disclosure and Secrecy in an Attacker-defender Game; Reliab. Eng. Syst. Saf.: 2021; Volume 207 ,107355.</td> </tr><tr> <td>[60]</td> <td class="space">Liu, X.X.; Zhang, J.X.; Zhu, P.D.; Tan, Q.P.; Yin, W.; Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game; Comput. Secur.: 2021; Volume 102 ,102138.</td> </tr><tr> <td>[61]</td> <td class="space">Gupta, A.; Langbort, C.; Basar, T.; Dynamic Games with Asymmetric Information and Resource Constrained Players with Applications to Security of Cyberphysical Systems; IEEE Trans. Control Netw. Syst.: 2017; Volume 4 ,71-81. &middot; <a href="/1370.94556" class="nowrap">Zbl 1370.94556</a></td> </tr><tr> <td>[62]</td> <td class="space">Han, K.; Choi, J.H.; Implications of false alarms in dynamic games on cyber-security; Chaos Solitons Fractals: 2023; Volume 169 ,113322.</td> </tr><tr> <td>[63]</td> <td class="space">Njilla, L.Y.; Pissinou, N.; Makki, K.; Game theoretic modeling of security and trust relationship in cyberspace; Int. J. Commun. Syst.: 2016; Volume 29 ,1500-1512.</td> </tr><tr> <td>[64]</td> <td class="space">Han, K.; Choi, J.H.; A Reputation Game on Cyber-Security and Cyber-Risk Calibration; Appl. Math. Optim.: 2022; Volume 85 ,13. &middot; <a href="/07511784" class="nowrap">Zbl 07511784</a></td> </tr><tr> <td>[65]</td> <td class="space">Gordon, L.A.; Loeb, M.P.; Lucyshyn, W.; Sharing information on computer systems security: An economic analysis; J. Account. Public Policy: 2003; Volume 22 ,461-485.</td> </tr><tr> <td>[66]</td> <td class="space">Gal-Or, E.; Ghose, A.; The Economic Incentives for Sharing Security Information; Inf. Syst. Res.: 2005; Volume 16 ,186-208.</td> </tr><tr> <td>[67]</td> <td class="space">Hausken, K.; Information Sharing Among Firms and Cyber Attacks; J. Account. Public Policy: 2007; Volume 26 ,639-688.</td> </tr><tr> <td>[68]</td> <td class="space">Hausken, K.; A Strategic Analysis of Information Sharing Among Cyber Attackers; J. Inf. Syst. Technol. Manag.: 2015; Volume 12 ,245-270.</td> </tr><tr> <td>[69]</td> <td class="space">Hausken, K.; Information Sharing Among Cyber Hackers in Successive Attacks; Int. Game Theory Rev.: 2017; Volume 19 ,33. &middot; <a href="/1391.91067" class="nowrap">Zbl 1391.91067</a></td> </tr><tr> <td>[70]</td> <td class="space">Hausken, K.; Security Investment, Hacking, and Information Sharing between Firms and between Hackers; Games: 2017; Volume 8 . &middot; <a href="/1410.91064" class="nowrap">Zbl 1410.91064</a></td> </tr><tr> <td>[71]</td> <td class="space">Hausken, K.; Proactivity and Retroactivity of Firms and Information Sharing of Hackers; Int. Game Theory Rev.: 2018; Volume 20 ,1750027. &middot; <a href="/1398.91065" class="nowrap">Zbl 1398.91065</a></td> </tr><tr> <td>[72]</td> <td class="space">He, M.; Devine, L.; Zhuang, J.; Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders using a Decision Theoretic Approach; Risk Anal.: 2018; Volume 38 ,215-225.</td> </tr><tr> <td>[73]</td> <td class="space">Levitin, G.; Hausken, K.; Taboada, H.A.; Coit, D.W.; Data Survivability Vs. Security in Information Systems; Reliab. Eng. Syst. Saf.: 2012; Volume 100 ,19-27.</td> </tr><tr> <td>[74]</td> <td class="space">Tosh, D.; Sengupta, S.; Kamhoua, C.A.; Kwiat, K.A.; Establishing evolutionary game models for CYBer security information EXchange (CYBEX); J. Comput. Syst. Sci.: 2018; Volume 98 ,27-52. &middot; <a href="/1416.91039" class="nowrap">Zbl 1416.91039</a></td> </tr><tr> <td>[75]</td> <td class="space">Bandyopadhyay, T.; Jacob, V.; Raghunathan, S.; Information security in networked supply chains: Impact of network vulnerability and supply chain integration on incentives to invest; Inf. Technol. Manag.: 2010; Volume 11 ,7-23.</td> </tr><tr> <td>[76]</td> <td class="space">Nagurney, A.; Nagurney, L.S.; Shukla, S.; A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability; Computation, Cryptography, and Network Security: Cham, Swizerland 2015; ,381-398. &middot; <a href="/1382.90015" class="nowrap">Zbl 1382.90015</a></td> </tr><tr> <td>[77]</td> <td class="space">Nagurney, A.; Shukla, S.; Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability; Eur. J. Oper. Res.: 2017; Volume 260 ,588-600. &middot; <a href="/1403.91217" class="nowrap">Zbl 1403.91217</a></td> </tr><tr> <td>[78]</td> <td class="space">Simon, J.; Omar, A.; Cybersecurity investments in the supply chain: Coordination and a strategic attacker; Eur. J. Oper. Res.: 2020; Volume 282 ,161-171. &middot; <a href="/1430.90132" class="nowrap">Zbl 1430.90132</a></td> </tr><tr> <td>[79]</td> <td class="space">Li, Y.; Xu, L.; Cybersecurity investments in a two-echelon supply chain with third-party risk propagation; Int. J. Prod. Res.: 2020; Volume 59 ,1216-1238.</td> </tr><tr> <td>[80]</td> <td class="space">Alpcan, T.; Basar, T.; An intrusion detection game with limited observations; Proceedings of the 12th International Symposium on Dynamic Games and Applications: ; .</td> </tr><tr> <td>[81]</td> <td class="space">Acemoglu, D.; Malekian, A.; Ozdaglar, A.; Network security and contagion; J. Econ. Theory: 2016; Volume 166 ,536-585. &middot; <a href="/1372.91086" class="nowrap">Zbl 1372.91086</a></td> </tr><tr> <td>[82]</td> <td class="space">Kovenock, D.; Roberson, B.; The Optimal Defense of Networks of Targets; Econ. Inq.: 2018; Volume 56 ,2195-2211.</td> </tr><tr> <td>[83]</td> <td class="space">Wang, G.; Welburn, J.W.; Hausken, K.; A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling; Games: 2020; Volume 11 . &middot; <a href="/1457.91071" class="nowrap">Zbl 1457.91071</a></td> </tr><tr> <td>[84]</td> <td class="space">Hausken, K.; Welburn, J.W.; Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits; Inf. Syst. Front.: 2021; Volume 23 ,1609-1620.</td> </tr><tr> <td>[85]</td> <td class="space">Schramm, H.; Alderson, D.L.; Carlyle, W.M.; Dimitrov, N.B.; ; A Game Theoretic Model of Strategic Conflict in Cyberspace: Monterey, CA, USA 2012; .</td> </tr><tr> <td>[86]</td> <td class="space">Schelling, T.C.; ; The Strategy of Conflict: Cambridge, MA, USA 1960; .</td> </tr><tr> <td>[87]</td> <td class="space">Dresher, M.; ; Games of Strategy: Theory and Applications: Santa Monica, CA, USA 1961; . &middot; <a href="/0096.14701" class="nowrap">Zbl 0096.14701</a></td> </tr><tr> <td>[88]</td> <td class="space">Libicki, M.C.; ; Cyberdeterrence and Cyberwar: Santa Monica, CA, USA 2009; .</td> </tr><tr> <td>[89]</td> <td class="space">Nye, J.S.; Nuclear lessons for cyber security?; Strateg. Stud. Q.: 2011; Volume 5 ,18-38.</td> </tr><tr> <td>[90]</td> <td class="space">Crosston, M.D.; World gone cyber MAD: How &ldquo;Mutually Assured Debilitation&rdquo; is the best hope for cyber deterrence; Strateg. Stud. Q.: 2011; Volume 5 ,100-116.</td> </tr><tr> <td>[91]</td> <td class="space">Jensen, E.T.; Cyber deterrence; Emory Int’l L. Rev.: 2012; Volume 26 ,773.</td> </tr><tr> <td>[92]</td> <td class="space">Clarke, R.A.; Knake, R.K.; ; Cyber War: Old Saybrook, CT, USA 2014; .</td> </tr><tr> <td>[93]</td> <td class="space">Jasper, S.; Deterring malicious behavior in cyberspace; Strateg. Stud. Q.: 2015; Volume 9 ,60-85.</td> </tr><tr> <td>[94]</td> <td class="space">Edwards, B.; Furnas, A.; Forrest, S.; Axelrod, R.; Strategic aspects of cyberattack, attribution, and blame; Proc. Natl. Acad. Sci. USA: 2017; Volume 114 ,2825-2830.</td> </tr><tr> <td>[95]</td> <td class="space">Baliga, S.; De Mesquita, E.B.; Wolitzky, A.; Deterrence with Imperfect Attribution; Am. Political Sci. Rev.: 2020; Volume 114 ,1155-1178.</td> </tr><tr> <td>[96]</td> <td class="space">Welburn, J.; Grana, J.; Schwindt, K.; Cyber deterrence with imperfect attribution and unverifiable signaling; Eur. J. Oper. Res.: 2023; Volume 306 ,1399-1416. &middot; <a href="/1541.91056" class="nowrap">Zbl 1541.91056</a></td> </tr><tr> <td>[97]</td> <td class="space">Zhu, Q.Y.; Basar, T.; Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems; IEEE Control Syst. Mag.: 2015; Volume 35 ,46-65. &middot; <a href="/1476.93098" class="nowrap">Zbl 1476.93098</a></td> </tr><tr> <td>[98]</td> <td class="space">Backhaus, S.; Bent, R.; Bono, J.; Lee, R.; Tracey, B.; Wolpert, D.; Xie, D.P.; Yildiz, Y.; Cyber-Physical Security: A Game Theory Model of Humans Interacting Over Control Systems; IEEE Trans. Smart Grid: 2013; Volume 4 ,2320-2327.</td> </tr><tr> <td>[99]</td> <td class="space">Zhang, Y.X.; Malacaria, P.; Bayesian Stackelberg games for cyber-security decision support; Decis. Support Syst.: 2021; Volume 148 ,113599.</td> </tr><tr> <td>[100]</td> <td class="space">Shukla, P.; An, L.; Chakrabortty, A.; Duel-Hallen, A.; A Robust Stackelberg Game for Cyber-Security Investment in Networked Control Systems; IEEE Trans. Control Syst. Technol.: 2023; Volume 31 ,856-871.</td> </tr><tr> <td>[101]</td> <td class="space">Shen, J.J.; Feng, D.Q.; Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems; Secur. Commun. Netw.: 2017; Volume 2017 ,9017039.</td> </tr><tr> <td>[102]</td> <td class="space">Gao, B.Y.; Shi, L.B.; Modeling an Attack-Mitigation Dynamic Game-Theoretic Scheme for Security Vulnerability Analysis in a Cyber-Physical Power System; IEEE Access: 2020; Volume 8 ,30322-30331.</td> </tr><tr> <td>[103]</td> <td class="space">Li, B.D.; Chen, Y.; Huang, S.W.; Yao, R.; Xia, Y.; Mei, S.W.; Graphical Evolutionary Game Model of Virus-Based Intrusion to Power System for Long-Term Cyber-Security Risk Evaluation; IEEE Access: 2019; Volume 7 ,178605-178617.</td> </tr><tr> <td>[104]</td> <td class="space">Hu, H.; Liu, Y.L.; Chen, C.; Zhang, H.Q.; Liu, Y.; Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game; IEEE Trans. Netw. Serv. Manag.: 2020; Volume 17 ,1683-1700.</td> </tr><tr> <td>[105]</td> <td class="space">Huang, K.X.; Zhou, C.J.; Qin, Y.Q.; Tu, W.X.; A Game-Theoretic Approach to Cross-Layer Security Decision-Making in Industrial Cyber-Physical Systems; IEEE Trans. Ind. Electron.: 2020; Volume 67 ,2371-2379.</td> </tr><tr> <td>[106]</td> <td class="space">Kolokoltsov, V.N.; Bensoussan, A.; Mean-Field-Game Model for Botnet Defense in Cyber-Security; Appl. Math. Optim.: 2016; Volume 74 ,669-692. &middot; <a href="/1372.49049" class="nowrap">Zbl 1372.49049</a></td> </tr><tr> <td>[107]</td> <td class="space">Miao, L.; Li, S.; Cyber security based on mean field game model of the defender: Attacker strategies; Int. J. Distrib. Sens. Netw.: 2017; Volume 13 ,1550147717737908.</td> </tr><tr> <td>[108]</td> <td class="space">Miao, F.; Zhu, Q.Y.; Pajic, M.; Pappas, G.J.; A hybrid stochastic game for secure control of cyber-physical systems; Automatica: 2018; Volume 93 ,55-63. &middot; <a href="/1400.93332" class="nowrap">Zbl 1400.93332</a></td> </tr><tr> <td>[109]</td> <td class="space">Miao, L.; Wang, L.N.; Li, S.; Xu, H.T.; Zhou, X.W.; Optimal defense strategy based on the mean field game model for cyber security; Int. J. Distrib. Sens. Netw.: 2019; Volume 15 ,1550147719831180.</td> </tr><tr> <td>[110]</td> <td class="space">Orojloo, N.; Azgomi, M.A.; A Stochastic Game Model for Evaluating the Impacts of Security Attacks against Cyber-Physical Systems; J. Netw. Syst. Manag.: 2018; Volume 26 ,929-965.</td> </tr><tr> <td>[111]</td> <td class="space">Singh, M.T.; Borkotokey, S.; Lahcen, R.A.M.; Mohapatra, R.N.; A generic scheme for cyber security in resource constraint network using incomplete information game; Evol. Intell.: 2023; Volume 16 ,819-832.</td> </tr><tr> <td>[112]</td> <td class="space">Xing, W.; Zhao, X.D.; Basar, T.; Xia, W.G.; Security Investment in Cyber-Physical Systems: Stochastic Games with Asymmetric Information and Resource-Constrained Players; IEEE Trans. Autom. Control: 2022; Volume 67 ,5384-5391. &middot; <a href="/1537.93734" class="nowrap">Zbl 1537.93734</a></td> </tr><tr> <td>[113]</td> <td class="space">Zhang, Y.C.; Liu, J.; Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning; Secur. Commun. Netw.: 2019; Volume 2019 ,3038586.</td> </tr><tr> <td>[114]</td> <td class="space">Huo, Y.; Dong, W.; Qian, J.; Jing, T.; Coalition Game-Based Secure and Effective Clustering Communication in Vehicular Cyber-Physical System (VCPS); Sensors: 2017; Volume 17 .</td> </tr><tr> <td>[115]</td> <td class="space">Sanjab, A.; Saad, W.; Basar, T.; A Game of Drones: Cyber-Physical Security of Time-Critical UAV Applications with Cumulative Prospect Theory Perceptions and Valuations; IEEE Trans. Commun.: 2020; Volume 68 ,6990-7006.</td> </tr><tr> <td>[116]</td> <td class="space">Sedjelmaci, H.; Brahmi, I.H.; Ansari, N.; Rehmani, M.H.; Cyber Security Framework for Vehicular Network Based on a Hierarchical Game; IEEE Trans. Emerg. Top. Comput.: 2021; Volume 9 ,429-440.</td> </tr><tr> <td>[117]</td> <td class="space">Wu, Z.J.; Dong, R.C.; Wang, P.; Research on Game Theory of Air Traffic Management Cyber Physical System Security; Aerospace: 2022; Volume 9 .</td> </tr><tr> <td>[118]</td> <td class="space">Yang, Z.; Xiang, Y.P.; Liao, K.; Yang, J.W.; Research on Security Defense of Coupled Transportation and Cyber-Physical Power System Based on the Static Bayesian Game; IEEE Trans. Intell. Transp. Syst.: 2023; Volume 24 ,3571-3583.</td> </tr><tr> <td>[119]</td> <td class="space">Cone, B.D.; Irvine, C.E.; Thompson, M.F.; Nguyen, T.D.; A video game for cyber security training and awareness; Comput. Secur.: 2007; Volume 26 ,63-72.</td> </tr><tr> <td>[120]</td> <td class="space">Frey, S.; Rashid, A.; Anthonysamy, P.; Pinto-Albuquerque, M.; Naqvi, S.A.; The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game; IEEE Trans. Softw. Eng.: 2019; Volume 45 ,521-536.</td> </tr><tr> <td>[121]</td> <td class="space">Futter, A.; War Games redux? Cyberthreats, US-Russian strategic stability, and new challenges for nuclear security and arms control; Eur. Secur.: 2016; Volume 25 ,163-180.</td> </tr><tr> <td>[122]</td> <td class="space">Harta, S.; Margheri, A.; Paci, F.; Sassonea, V.; Riskio: A Serious Game for Cyber Security Awareness and Education; Comput. Secur.: 2020; Volume 95 ,101827.</td> </tr><tr> <td>[123]</td> <td class="space">Jin, Z.W.; Zhang, S.T.; Hu, Y.Y.; Zhang, Y.N.; Sun, C.Y.; Security State Estimation for Cyber-Physical Systems against DoS Attacks via Reinforcement Learning and Game Theory; Actuators: 2022; Volume 11 .</td> </tr><tr> <td>[124]</td> <td class="space">Kanellopoulos, A.; Vamvoudakis, K.G.; Non-equilibrium dynamic games and cyber-physical security: A cognitive hierarchy approach; Syst. Control Lett.: 2019; Volume 125 ,59-66. &middot; <a href="/1426.91042" class="nowrap">Zbl 1426.91042</a></td> </tr><tr> <td>[125]</td> <td class="space">Maqbool, Z.; Aggarwal, P.; Pammi, V.S.C.; Dutt, V.; Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling; Front. Psychol.: 2020; Volume 11 .</td> </tr><tr> <td>[126]</td> <td class="space">Nicho, M.; Modelling serious games for enhancing end user cyber security awareness; Iadis-Int. J. Comput. Sci. Inf. Syst.: 2020; Volume 15 ,91-106.</td> </tr><tr> <td>[127]</td> <td class="space">O’Connor, S.; Hasshu, S.; Bielby, J.; Colreavy-Donnelly, S.; Kuhn, S.; Caraffini, F.; Smith, R.; SCIPS: A serious game using a guidance mechanic to scaffold effective training for cyber security; Inf. Sci.: 2021; Volume 580 ,524-540.</td> </tr><tr> <td>[128]</td> <td class="space">Ravishankar, M.; Rao, D.V.; Kumar, C.R.S.; A Game Theoretic Software Test-bed for Cyber Security Analysis of Critical Infrastructure; Def. Sci. J.: 2018; Volume 68 ,54-63.</td> </tr><tr> <td>[129]</td> <td class="space">Shah, P.; Agarwal, A.; Cyber Suraksha: A card game for smartphone security awareness; Inf. Comput. Secur.: 2023; Volume 31 ,576-600.</td> </tr><tr> <td>[130]</td> <td class="space">Tseng, S.S.; Yang, T.Y.; Shih, W.C.; Shan, B.Y.; Building a self-evolving iMonsters board game for cyber-security education; Interact. Learn. Environ.: 2022; Volume 32 ,1300-1318.</td> </tr><tr> <td>[131]</td> <td class="space">Yamin, M.M.; Katt, B.; Nowostawski, M.; Serious games as a tool to model attack and defense scenarios for cyber-security exercises; Comput. Secur.: 2021; Volume 110 ,102450.</td> </tr><tr> <td>[132]</td> <td class="space">Yasin, A.; Liu, L.; Li, T.; Wang, J.M.; Zowghi, D.; Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG); Inf. Softw. Technol.: 2018; Volume 95 ,179-200.</td> </tr><tr> <td>[133]</td> <td class="space">Zeijlemaker, S.; Rouwette, E.; Cunico, G.; Armenia, S.; von Kutzschenbach, M.; Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers; Systems: 2022; Volume 10 .</td> </tr><tr> <td>[134]</td> <td class="space">Simon, H.A.; ; The Sciences of the Artificial: Cambridge, MA, USA 1969; .</td> </tr><tr> <td>[135]</td> <td class="space">Hausken, K.; Special Versus General Protection and Attack of Parallel and Series Components; Reliab. Eng. Syst. Saf.: 2017; Volume 165 ,239-256.</td> </tr></table> <div class="reference_disclaimer"> This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH&nbsp;Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching. </div> </div></article> </div></div> </div> </div> <div class="clearfix"></div> </div> </div> <div id="foot"><div class="copyright"> &copy; 2025 <a target="fiz" href="https://www.fiz-karlsruhe.de/en">FIZ Karlsruhe GmbH</a> <a href="/privacy-policy/">Privacy Policy</a> <a href="/legal-notices/">Legal Notices</a> <a href="/terms-conditions/">Terms &amp; Conditions</a> <div class="info"> <ul class="nav"> <li class="mastodon"> <a href="https://mathstodon.xyz/@zbMATH" target="_blank" class="no-new-tab-icon"> <img src="/static/mastodon.png" title="zbMATH at Mathstodon (opens in new tab)" alt="Mastodon logo"> </a> </li> </ul> </div> </div> <div class="clearfix" style="height: 0px;"></div> </div> </div> <script src="https://static.zbmath.org/contrib/jquery/1.9.1/jquery.min.js"></script> <script src="https://static.zbmath.org/contrib/jquery-caret/1.5.2/jquery.caret.min.js"></script> <script src="/static/js/jquery-ui-1.10.1.custom.min.js"></script> <script src="https://static.zbmath.org/contrib/bootstrap/v3.3.7zb1/js/bootstrap.min.js"></script> <script src="https://static.zbmath.org/contrib/bootstrap-lightbox/v0.7.0/bootstrap-lightbox.min.js"></script> <script src="https://static.zbmath.org/contrib/retina/unknown/retina.js"></script> <script src="https://static.zbmath.org/contrib/bootstrap-select/v1.13.14/js/bootstrap-select.min.js"></script> <script> var SCRIPT_ROOT = ""; </script> <script src="/static/scripts.js?v=20240926"> </script> <script src="https://static.zbmath.org/contrib/mathjax/2.7.1/MathJax.js?config=TeX-AMS-MML_HTMLorMML"></script> <script type="text/x-mathjax-config"> MathJax.Hub.Config({ "HTML-CSS": { preferredFont: "TeX", availableFonts: [ "STIX", "TeX" ], linebreaks: { automatic: true }, EqnChunk: (MathJax.Hub.Browser.isMobile ? 10 : 50) }, tex2jax: { processEscapes: true, ignoreClass: "tex2jax_ignore|dno" }, TeX: { Macros: { Aut: "\\operatorname{Aut}", Hom: "\\operatorname{Hom}" }, noUndefined: { attributes: { mathcolor: "#039", //"red", mathbackground: "white", //"#FFEEEE", mathsize: "90%" } } }, messageStyle: "none" }); </script> <script type="text/javascript"> $(document).ready(function() { $("#MathInput").stop(true, true).keyup(function() { $.ajax({ url: "/mwsq/", type: "POST", data: { query : $("#MathInput").val() }, dataType: "text" }) .done(function(xml) { $("#MathPreview").html(xml); $(window).resize(); }); }); var press = jQuery.Event("keyup"); press.ctrlKey = false; press.which = 40; $("#MathInput").trigger(press); }); </script> <div id="new_tab_icon" style="display: none">&nbsp;<span class="glyphicon glyphicon-new-window" aria-hidden="true"></span><span class="sr-only">(opens in new tab)</span></div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10