Skip to main navigation
Skip to search
Skip to main content
VTT's Research Information Portal Home
Home
Profiles
Research output
Projects
Datasets
Research units
Research Infrastructures
Activities
Prizes
Press/Media
Impacts
Search by expertise, name or affiliation
Bayesian games for security assesment: Basic assumptions and limitations
Tony Rosqvist
Research output
:
Contribution to journal
›
Article
›
Professional
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Bayesian games for security assesment: Basic assumptions and limitations'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
ATHENA
100%
Bayesian Game
100%
Security Assesment
100%
Environmental Analysis
25%
Roadside
25%
Threat Environment
25%
Game Theory
25%
Advanced Tool
25%
Organized Crime
25%
Threat Model
25%
Improvised Explosive Device
25%
Mission Planning
25%
Mission Training
25%
Asymmetric Threat
25%
Civil Security
25%
Threat Scenarios
25%
Computer Science
Threat Environment
100%
Threat Scenario
100%
Threat Model
100%
Organized Crime
100%
Mission Planning
100%
Basic Assumption
100%
INIS
asymmetry
100%
security
100%
tools
50%
environment
50%
devices
50%
planning
50%
explosives
50%
game theory
50%
crime
50%
Engineering
Roadsides
100%
Improvised Explosive Device
100%
Bayesian Game
100%
Limitations
100%
Earth and Planetary Sciences
Mission Planning
100%
Game Theory
100%