Mostrando 1 - 12 Resultados de 12 Para Buscar '"extortion"', tiempo de consulta: 0.05s Limitar resultados
  1. 1
    ... of the interaction can facilitate the Generous and Extortionate ZD strategies as predicted....
    Enlace del recurso
    article
  2. 2
    ... collective-risk scenario, reporting the emergence of extortionate zero-determinant (ZD) strategies....
    Enlace del recurso
    article
  3. 3
    por Lutz Becks, Manfred Milinski
    Publicado 2019
    ...In game theory, ‘extortionate’ tactics in two-player games are predicted to give way to ‘generous...
    Enlace del recurso
    article
  4. 4
    ... for the repeated prisoner’s dilemma (extortionate strategies) that secure for themselves a payoff that is never...
    Enlace del recurso
    article
  5. 5
    por Ian Wishart
    Publicado 1996
    ..., alleged extortion, arms dealing, corruption, coverups and criminal fraud, billion dollar deals, kidnap...
    Enlace del recurso
    article
  6. 6
    ... to exploit users for advertising, extortion, and theft. Notably, most Android malware detection tools depend...
    Enlace del recurso
    article
  7. 7
    ... to exploit users for advertising, extortion, and theft. Notably, most Android malware detection tools depend...
    Enlace del recurso
    article
  8. 8
    por Zuly Qodir, Adil Hasan Ibrahim
    Publicado 2021
    ..., it is acceptable for this kind of study. The findings show that, embezzlement, extortion, exploitation of public...
    Enlace del recurso
    article
  9. 9
  10. 10
  11. 11
    ...Ransomware is a special malware designed to extort money in return for unlocking the device...
    Enlace del recurso
    article
  12. 12
    por Maheen Zaman
    Publicado 2018
    ... on the backs of voluntary donations, rather than extortions like their rival tribal warlords, which in turn...
    Enlace del recurso
    article