[1] Guha B,Ashok S. Pirates and traders: Some economics of pirate-infested seas[J]. Economics Letters,2011,111: 147-150.
[2] Sevillano J C,Inusa D R,Rios J. Adversarial risk analysis the somali pirates case[J]. Decision Analysis, 2012,6:1-10.
[3] 刘金芳,徐枞巍,高波. 供应链整合创新的演化博弈分析[J]. 系统工程,2011,29(8):8-13.[LIU J F, XU C W, GAO B. Evolutionary game analysis of supply chain integration and innovation[J]. Systems Engineering, 2011, 29(8): 8-13.]
[4] 刘德海,王伟国,徐维军,等. 不同社会结构下群体性突发事件产生机理的演化博弈分析[J]. 系统工程,2010,28(6):71-74. [LIU D H, WANG W G, XU W J, et al. Evolutionary game analysis of engendering mechanism for mass emergency under social structure[J]. Systems Engineering, 2010, 28(6): 88-93.]
[5] 刘德海,王伟国,孙康. 基于演化博弈的重大突发公共卫生事件情景预测模型与防控措施[J]. 系统工程理论与实践,2012,32(5):937-946. [LIU D H, WANG W G, SUN K. Scenario forecasting model and prevention-control measurements of important public health event based evolutionary game[J]. Systems Engineering-Theory&Practice. 2012, 32(5): 937-946.]
[6] 徐岩,胡斌. 战略联盟竞合行为的随机突变分析与仿真[J]. 管理学报,2012,9(5):678-684. [XU Y, HU B. Stochastic catastrophe analysis of strategic alliances’ coopetition including simulations[J]. Chinese Journal of Management, 2012, 32(5): 937-946.]
[7] 谢识予. 经济博弈论(第三版)[M]. 上海:复旦大学出版社,2007. [XIE S Y. Economics & game theory(the third edition)[M]. Shanghai: Fudan press, 2007.]
[8] Wang L,Ye S Q,Michael C J. The evolutionary analysis of the ultimatum game based on the net-profit decision[J]. Physica A,2015,430:32-38.
[9] Liu D H,Xiao X Z,Li H Y,et al. Historical evolution and benefit-cost explanation of periodical fluctuation on coal mine safety supervision: An evolutionary game analysis framework[J]. European Journal of Operational Research,2015,243:974-984.
[10] Montet C,Serra D. Game theory & economics[M]. New York:Palgrave Macmillan,2003.
[11] 朱乐群,吕靖,李晶. Stackelberg 博弈下海盗活动地区海军护航选择优化[J]. 交通运输系统工程与信息,2014,14(6):152-157. [ZHU L Q, LU J, LI J. Optimization of zone selection of naval escort in pirates active areas based on stackelberg games [J]. Journal of Transportation Systems Engineering and Information Technology, 2014,14(6): 152-157.] |