-
1“... of the interaction can facilitate the Generous and Extortionate ZD strategies as predicted....”
Enlace del recurso
article -
2por Manfred Milinski, Christian Hilbe, Dirk Semmann, Ralf Sommerfeld, Jochem Marotzke“... collective-risk scenario, reporting the emergence of extortionate zero-determinant (ZD) strategies....”
Publicado 2016
Enlace del recurso
article -
3“...In game theory, ‘extortionate’ tactics in two-player games are predicted to give way to ‘generous...”
Enlace del recurso
article -
4“... for the repeated prisoner’s dilemma (extortionate strategies) that secure for themselves a payoff that is never...”
Enlace del recurso
article -
5por Ian Wishart“..., alleged extortion, arms dealing, corruption, coverups and criminal fraud, billion dollar deals, kidnap...”
Publicado 1996
Enlace del recurso
article -
6“... to exploit users for advertising, extortion, and theft. Notably, most Android malware detection tools depend...”
Enlace del recurso
article -
7“... to exploit users for advertising, extortion, and theft. Notably, most Android malware detection tools depend...”
Enlace del recurso
article -
8“..., it is acceptable for this kind of study. The findings show that, embezzlement, extortion, exploitation of public...”
Enlace del recurso
article -
9por Michele R Decker, Shannon N Wood, Mary Thiongo, Meagan E Byrne, Bianca Devoto, Rosemary Morgan, Kristin Bevilacqua, Anaise Williams, H Colleen Stuart, Grace Wamue-Ngare, Lori Heise, Nancy Glass, Philip Anglewicz, Elizabeth Gummerson, Peter Gichangi“... experienced police interactions (60.1%, 55.2% of which included extortion). Gender-specific concerns for women...”
Publicado 2021
Enlace del recurso
article -
10por Michele R. Decker, Shannon N. Wood, Mary Thiongo, Meagan E. Byrne, Bianca Devoto, Rosemary Morgan, Kristin Bevilacqua, Anaise Williams, H. Colleen Stuart, Grace Wamue- Ngare, Lori Heise, Nancy Glass, Philip Anglewicz, Elizabeth Gummerson, Peter Gichangi“... experienced police interactions (60.1%, 55.2% of which included extortion). Gender-specific concerns for women...”
Publicado 2021
Enlace del recurso
article -
11por Tanya Gera, Jaiteg Singh, Abolfazl Mehbodniya, Julian L. Webber, Mohammad Shabaz, Deepak Thakur“...Ransomware is a special malware designed to extort money in return for unlocking the device...”
Publicado 2021
Enlace del recurso
article -
12por Maheen Zaman“... on the backs of voluntary donations, rather than extortions like their rival tribal warlords, which in turn...”
Publicado 2018
Enlace del recurso
article