-
1
-
-
0242333891
-
Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries
-
& pp. Santa Barbara, CA, November 3-8.
-
Bier, V. M., & Abhichandani, V. (2002). Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries. Risk-Based Decisionmaking in Water Resources X (pp. 59 76 Santa Barbara, CA, November 3-8.
-
(2002)
Risk-Based Decisionmaking in Water Resources X
, pp. 59-76
-
-
Bier, V.M.1
Abhichandani, V.2
-
2
-
-
0005517696
-
-
& Washington, DC: Brookings Institution.
-
O'Hanlon, M., Orszag, P., Daalder, I., Destler, M., Gunter, D., Litan, R., & Steinberg, J. (2002). Protecting the American Homeland. Washington, DC : Brookings Institution.
-
(2002)
Protecting the American Homeland.
-
-
O'Hanlon, M.1
Orszag, P.2
Daalder, I.3
Destler, M.4
Gunter, D.5
Litan, R.6
Steinberg, J.7
-
3
-
-
34447324856
-
Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries
-
&
-
Bier, V. M., Nagaraj, A., & Abhichandani, V. (2005). Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries. Reliability Engineering and System Safety, 87, 313 323.
-
(2005)
Reliability Engineering and System Safety
, vol.87
, pp. 313-323
-
-
Bier, V.M.1
Nagaraj, A.2
Abhichandani, V.3
-
4
-
-
84889967883
-
Combining game theory and risk analysis in counterterrorism: A smallpox example
-
& In. A. G. Wilson, G. D. Wilson, & D. H. Olwell (. Eds. pp.). New York: Springer.
-
Banks, D. L., & Anderson, S. (2006). Combining game theory and risk analysis in counterterrorism: A smallpox example. In A. G. Wilson, G. D. Wilson, & D. H. Olwell (Eds Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication (pp. 9 22). New York : Springer.
-
(2006)
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
, pp. 9-22
-
-
Banks, D.L.1
Anderson, S.2
-
5
-
-
33749589535
-
Advanced techniques for modelling terrorism risk
-
Major, J. A. (2002). Advanced techniques for modelling terrorism risk. Journal of Risk Finance, 4, 15 24.
-
(2002)
Journal of Risk Finance
, vol.4
, pp. 15-24
-
-
Major, J.A.1
-
6
-
-
84856696717
-
Quantitative terrorist risk assessment
-
Woo, G. (2002). Quantitative terrorist risk assessment. Journal of Risk Finance, 4, 7 14.
-
(2002)
Journal of Risk Finance
, vol.4
, pp. 7-14
-
-
Woo, G.1
-
7
-
-
34447325560
-
-
NBER Insurance Project Workshop presentation. Available at
-
Woo, G. (2003). Insuring against Al Qaeda. NBER Insurance Project Workshop presentation. Available at http://www.nber.org/confer/2003/insurance03/ woo.pdf.
-
(2003)
Insuring Against Al Qaeda
-
-
Woo, G.1
-
8
-
-
2342598277
-
Computer security impaired by legitimate users
-
&
-
Besnard, D., & Arief, B. (2004). Computer security impaired by legitimate users. Computers and Security, 23, 253 264.
-
(2004)
Computers and Security
, vol.23
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
9
-
-
34447320684
-
Choosing what to protect: Strategic defensive allocation against an unknown attacker
-
& Submitted to
-
Bier, V. M., Oliveros, S., & Samuelson, L. (2005). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Submitted to Journal of Public Economic Theory.
-
(2005)
Journal of Public Economic Theory.
-
-
Bier, V.M.1
Oliveros, S.2
Samuelson, L.3
-
10
-
-
34247121489
-
-
& Rand Corporation, MG-388-IR&D, May 2005.
-
Willis, H. H., Morral, A. R., Kelly, T. K., & Medby, J. J. (2005). Estimating Terrorism Risk. Rand Corporation, MG-388-IR&D, May 2005.
-
(2005)
Estimating Terrorism Risk
-
-
Willis, H.H.1
Morral, A.R.2
Kelly, T.K.3
Medby, J.J.4
-
11
-
-
33644783701
-
Big cities will get more in antiterrorism grants
-
December 22
-
Lipton, E. (2004). Big cities will get more in antiterrorism grants. New York Times, December 22, A20.
-
(2004)
New York Times
-
-
Lipton, E.1
-
12
-
-
33444456701
-
How we got homeland security wrong: The fortification of Wyoming, and other strange tales from the new front line
-
March 29.
-
Ripley, A. (2004). How we got homeland security wrong: The fortification of Wyoming, and other strange tales from the new front line. Time, March 29.
-
(2004)
Time
-
-
Ripley, A.1
-
18
-
-
0041771284
-
What do we know about the substitution effect in transnational terrorism?
-
& In. A. Silke. & G. Ilardi (. Eds. London: Frank Cass.
-
Enders, W., & Sandler, T. (2004). What do we know about the substitution effect in transnational terrorism? In A. Silke & G. Ilardi (Eds Researching Terrorism: Trends, Achievements, Failures. London : Frank Cass.
-
(2004)
Researching Terrorism: Trends, Achievements, Failures.
-
-
Enders, W.1
Sandler, T.2
-
19
-
-
33745577728
-
Defense R&D in the anti-terrorist era
-
Trajtenberg, M. (2006). Defense R&D in the anti-terrorist era. Defence and Peace Economics, 17 (3 177 199.
-
(2006)
Defence and Peace Economics
, vol.17
, Issue.3
, pp. 177-199
-
-
Trajtenberg, M.1
-
21
-
-
0142251710
-
An economic perspective on transnational terrorism
-
&
-
Sandler, T., & Enders, W. (2004). An economic perspective on transnational terrorism. European Journal of Political Economy, 20 (2 301 316.
-
(2004)
European Journal of Political Economy
, vol.20
, Issue.2
, pp. 301-316
-
-
Sandler, T.1
Enders, W.2
-
22
-
-
33745998894
-
U.S. to spend billions more to alter security systems
-
May 8
-
Lipton, E. (2005). U.S. to spend billions more to alter security systems. New York Times, May 8, A1.
-
(2005)
New York Times
-
-
Lipton, E.1
-
25
-
-
12844256450
-
Policy watch: Challenges for terrorism risk insurance in the United States
-
&
-
Kunreuther, H., & Michel-Kerjan, E. (2004). Policy watch: Challenges for terrorism risk insurance in the United States. Journal of Economic Perspectives, 18 (4 201 214.
-
(2004)
Journal of Economic Perspectives
, vol.18
, Issue.4
, pp. 201-214
-
-
Kunreuther, H.1
Michel-Kerjan, E.2
-
27
-
-
0038514203
-
Transnational public goods: Strategies and institutions
-
&
-
Arce, D. G., & Sandler, T. (2001). Transnational public goods: Strategies and institutions. European Journal of Political Economy, 17, 493 516.
-
(2001)
European Journal of Political Economy
, vol.17
, pp. 493-516
-
-
Arce, D.G.1
Sandler, T.2
-
28
-
-
23244450105
-
Insurance, self protection, and the economics of terrorism
-
&
-
Lakdawalla, D., & Zanjani, G. (2005). Insurance, self protection, and the economics of terrorism. Journal of Public Economics, 89, 1891 1905.
-
(2005)
Journal of Public Economics
, vol.89
, pp. 1891-1905
-
-
Lakdawalla, D.1
Zanjani, G.2
-
30
-
-
33746818540
-
A false sense of insecurity?
-
Mueller, J. (2004). A false sense of insecurity? Regulation, 42 46.
-
(2004)
Regulation
, pp. 42-46
-
-
Mueller, J.1
-
31
-
-
0041589854
-
How to fight terrorism: Alternatives to deterrence
-
&
-
Frey, B. S., & Luechinger, S. (2003). How to fight terrorism: Alternatives to deterrence. Defence and Peace Economics, 14, 237 249.
-
(2003)
Defence and Peace Economics
, vol.14
, pp. 237-249
-
-
Frey, B.S.1
Luechinger, S.2
-
32
-
-
0036609708
-
Roadmap for modeling risks of terrorism to the homeland
-
Haimes, Y. Y. (2002). Roadmap for modeling risks of terrorism to the homeland. Journal of Infrastructure Systems, 8 (2 35 41.
-
(2002)
Journal of Infrastructure Systems
, vol.8
, Issue.2
, pp. 35-41
-
-
Haimes, Y.Y.1
-
33
-
-
64549164035
-
Air marshals' secrecy ruined by dress code
-
July 9.
-
Hudson, A. (2004). Air marshals' secrecy ruined by dress code. Washington Times, July 9.
-
(2004)
Washington Times
-
-
Hudson, A.1
-
34
-
-
22544439080
-
-
The SANS (SysAdmin, Audit, Network, Security) Institute, Bethesda, Maryland, May 2001.
-
Martin, W. W. (2001). Honey Pots and Honey Nets - Security Through Deception. The SANS (SysAdmin, Audit, Network, Security) Institute, Bethesda, Maryland, May 2001.
-
(2001)
Honey Pots and Honey Nets - Security Through Deception
-
-
Martin, W.W.1
-
36
-
-
34447319584
-
Extending the nation's zone of security
-
U.S. Bureau of Customs and Border Protection, March 2004.
-
Myers, M. (2004). Extending the nation's zone of security. Customs and Border Protection Today. U.S. Bureau of Customs and Border Protection, March 2004.
-
(2004)
Customs and Border Protection Today.
-
-
Myers, M.1
-
37
-
-
34447314387
-
-
U.S. Bureau of Customs and Border Protection. Available at
-
U.S. Bureau of Customs and Border Protection 2005). Container Security Initiative Fact Sheet. Available at http://www.cbp.gov/linkhandler/cgov/ border_security/international_activities/csi/csi_fact_sheet.ctt/csi_fact_sheet. doc.
-
(2005)
Container Security Initiative Fact Sheet
-
-
-
38
-
-
21244449577
-
U.S. report lists possibilities for terrorist attacks and likely toll
-
March 16.
-
Lipton, E. (2005). U.S. report lists possibilities for terrorist attacks and likely toll. New York Times, March 16.
-
(2005)
New York Times
-
-
Lipton, E.1
|