Skip to main content
A Department of Homeland Security Emeritus Center of Excellence led by the University of Maryland
Search form
Search
Research
Terrorism and Violent Extremism
Counterterrorism and Countering Violent Extremism
Radicalization and Deradicalization
Risk Communication and Resilience
Unconventional Weapons and Technology
Projects (A-Z)
Topics (A-Z)
Investigators
All Affiliated Researchers
Education
MPS in Security & Terrorism Studies
FAQ
Tuition & Fees
Faculty & Staff
Required Coursework
Request More Info
Undergraduate Students
Global Terrorism Studies Minor Program
Internships
Study Abroad
Summer/Winter Courses
Graduate Students
Graduate Certificate (online)
Internships
Study Abroad
Summer/Winter Courses
Professional Development
Graduate Certificate (online)
Training
Subscribe to receive notifications about START Training Opportunities
Online Courses
Internships
Course List
Training
Training Overview
Publicly Availalbe Trainings
Using the Global Terrorism Database
Microlearnings: Countering Violent Extremism (CVE)
Microlearnings: Terrorism and Targeted Violence (T2V)
Publications
Search All Publications
Academic Publications
START Publications
START Newsletters
Data & Tools
START Datasets
IVEO Knowledge Matrix
Global Terrorism Database
Big Allied and Dangerous (BAAD)
TEVUS Portal
PIRUS dataset
QAnon Crime Maps
ICONS simulations
Nuclear Facilities Attack Database (NuFAD)
News & Media
News
Events
Newsletters
Multimedia
START In The News
Media Contact
Search Experts
START-OUP Book Series
Terrorism 360 Podcast
About
Overview and History
Mission and Vision
Careers
Jobs at START
Internships
Other Opportunities
Headquarters Staff
Supporting START
Contact Us
Partners
Funders
Jun Zhuang
Jun Zhuang
Former Investigator
Lead Investigator on START Research Projects
Validating Models of Adversary Behavior
July 2012
to
December 2013
Selected Publications
Modeling Multi-target Defender-attacker Games with Quantal Response Attack Strategies
(Journal Article)
Defender–Attacker Games with Asymmetric Player Utilities
(Journal Article)
Modeling a Multi-target Attacker-defender Game with Multiple Attack Types
(Journal Article)
A Study on a Sequential One‐Defender‐N‐Attacker Game
(Journal Article)
Modeling and Validating Public–Private Partnerships in Disaster Management
(Journal Article)
Rumor Response, Debunking Response, and Decision Makings of Misinformed Twitter Users during Disasters
(Journal Article)
The True Meaning of Terrorism and Response to Terrorism
(Journal Article)
N-stage Security Screening Strategies in the Face of Strategic Applicants
(Journal Article)
Partner Selection in Disaster Relief: Partnership Formation in the Presence of Incompatible Agencies
(Journal Article)
Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach
(Journal Article)
Security Screening Queues with Impatient Applicants: A New Model with A Case Study
(Journal Article)
The Role of Risk Preferences in a Multi-Target Defender-Attacker Resource Allocation Game
(Journal Article)
A Three-Stage Evacuation Decision-Making and Behavior Model for the Onset of an Attack
(Journal Article)
Driving-Forces Model on Individual Behavior in Scenarios Considering Moving Threat Agents
(Journal Article)
Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts
(Journal Article)
New Framework That Uses Patterns and Relations to Understand Terrorist Behaviors
(Journal Article)
Introducing Terrorist Archetypes: Using Terrorist Objectives and Behavior to Predict New, Complex, and Changing Threats
(Journal Article)
Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time-Series and Intervention Analysis
(Journal Article)
How Companies and Governments React to Disasters
(Journal Article)
Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat
(Journal Article)
Introductions to Adversary Behavior: Validating the Models
(Journal Article)
Balancing Pre-disaster Preparedness and Post-disaster Relief
(Journal Article)
Modeling Public-Private Partnerships in Disaster Management via Centralized and Decentralized Models
(Journal Article)
Countering the Inhumane: Modeling Probable Pathways for Human Smuggling and Trafficking Along the U.S.-Mexico Border
(Research Brief)
On the Value of Exposure and Secrecy of Defense System: First-Move Advantage vs. Robustness
(Journal Article)
Modeling Costly Learning and Counter-Learning in a Defender-Attacker Game with Private Defender Information
(Journal Article)
Decisions in disaster recovery operations
(Book Chapter)
News References
Researcher Spotlight: Dr. Jun Zhuang
(People Spotlight)
The tradeoffs between protecting against man-made and natural disasters
(News)