메뉴 건너뛰기




Volumn , Issue , 2006, Pages 130-135

Risk identification, assessment, and management for the 2006 Virginia gubernatorial inauguration

Author keywords

[No Author keywords available]

Indexed keywords

RISK ANALYSIS; RISK MANAGEMENT; SECURITY SYSTEMS; STRATEGIC PLANNING;

EID: 41949107912     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SIEDS.2006.278726     Document Type: Conference Paper
Times cited : (2)

References (16)
  • 1
    • 18644364822 scopus 로고    scopus 로고
    • A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism
    • Apostolakis, O. & D.Lemon. (2005) A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Analysis 25(2). 361-376.
    • (2005) Risk Analysis , vol.25 , Issue.2 , pp. 361-376
    • Apostolakis, O.1    Lemon, D.2
  • 2
    • 41949124417 scopus 로고    scopus 로고
    • Center for Risk Management of Engineering Systems, University of Virginia, Charlottesville, VA
    • Center for Risk Management of Engineering Systems. (2005) Adaptive Two-Player Hierarchical Holographic Modeling (ATP-HHM). University of Virginia, Charlottesville, VA.
    • (2005) Adaptive Two-Player Hierarchical Holographic Modeling (ATP-HHM)
  • 3
    • 41949138855 scopus 로고    scopus 로고
    • Retrieved April 3, 2006 from the World Wide Web
    • David, R. (2002). Homeland Security: Building a National Strategy. National Academy of Engineering. Retrieved April 3, 2006 from the World Wide Web: http://www.nae.edu/nae/bridgecom.nsf/weblinks/CGOZ-58NLJY?OpenDocument.
    • (2002) Homeland Security: Building a National Strategy
    • David, R.1
  • 4
    • 41949101996 scopus 로고    scopus 로고
    • Haimes, Y. (2005). Deployment of the Adaptive Multiplayer HHM Game for the 2006 Virginia Gubernatorial Inauguration. SEAS Proposal No. SE-VTRC-2683-06.
    • Haimes, Y. (2005). Deployment of the Adaptive Multiplayer HHM Game for the 2006 Virginia Gubernatorial Inauguration. SEAS Proposal No. SE-VTRC-2683-06.
  • 5
    • 13444304425 scopus 로고    scopus 로고
    • Adaptive two-player hierarchical holographic modeling game for counterterrorism intelligence analysis
    • Haimes, Y. & B. Horowitz. (2004a). Adaptive two-player hierarchical holographic modeling game for counterterrorism intelligence analysis. Journal of Homeland Security and Emergency Management 1(3).
    • (2004) Journal of Homeland Security and Emergency Management , vol.1 , Issue.3
    • Haimes, Y.1    Horowitz, B.2
  • 6
    • 85001560455 scopus 로고    scopus 로고
    • Modeling interdependent infrastructures for sustainable counterterrorism
    • Haimes, Y. & B. Horowitz. (2004b). Modeling interdependent infrastructures for sustainable counterterrorism. Journal of Infrastructure Systems, 33-42.
    • (2004) Journal of Infrastructure Systems , pp. 33-42
    • Haimes, Y.1    Horowitz, B.2
  • 8
    • 0242621136 scopus 로고    scopus 로고
    • Risk-based methodology for scenario tracking, intelligence gathering, and analysis for countering terrorism
    • Horowitz, B. & Y. Haimes. (2003). Risk-based methodology for scenario tracking, intelligence gathering, and analysis for countering terrorism. Systems Engineering 6(3). 152-169.
    • (2003) Systems Engineering , vol.6 , Issue.3 , pp. 152-169
    • Horowitz, B.1    Haimes, Y.2
  • 9
    • 36849087537 scopus 로고    scopus 로고
    • Retrieved April 3, 2006 from the World Wide Web
    • Howe, D. (2004). Homeland Security Council: Planning Scenarios. Retrieved April 3, 2006 from the World Wide Web: http://www.voiceoffreedom.com/ archives/homelandsecurity/15-attacks_the_hawiaa_disclosure.htm.
    • (2004) Homeland Security Council: Planning Scenarios
    • Howe, D.1
  • 11
    • 24744438851 scopus 로고    scopus 로고
    • Assessing and managing risks to information assurance: A methodological approach
    • Lamm, G. & Y. Haimes. (2002). Assessing and managing risks to information assurance: a methodological approach. Systems Engineering 5(4). 286-314.
    • (2002) Systems Engineering , vol.5 , Issue.4 , pp. 286-314
    • Lamm, G.1    Haimes, Y.2
  • 12
    • 4544219729 scopus 로고    scopus 로고
    • A risk-based approach to setting priorities in protecting bridges against terrorist attacks. (2004)
    • Leung, M., J. Lambert, & A. Mosenthal. (2004) A risk-based approach to setting priorities in protecting bridges against terrorist attacks. (2004). Risk Analysis 24(4). 963-984.
    • (2004) Risk Analysis , vol.24 , Issue.4 , pp. 963-984
    • Leung, M.1    Lambert, J.2    Mosenthal, A.3
  • 15
    • 13444313012 scopus 로고    scopus 로고
    • Can the risk of terrorism be calculated by insurers? game theory might do it
    • April 8, Retrieved October 19, 2005 from the World Wide Web
    • Oster, C. (2002, April 8). Can the risk of terrorism be calculated by insurers? game theory might do it. Wallstreet Journal Online. Retrieved October 19, 2005 from the World Wide Web: www.gametheory.net/news/Items/011.html
    • (2002) Wallstreet Journal Online
    • Oster, C.1
  • 16
    • 8844234423 scopus 로고    scopus 로고
    • Modeling the demand reduction input-output (I-O) inoperability due to terrorism of interconnected infrastructures
    • Santos, J. & Y. Haimes. (2004). Modeling the demand reduction input-output (I-O) inoperability due to terrorism of interconnected infrastructures. Risk Analysis 24(6). 1437-1451.
    • (2004) Risk Analysis , vol.24 , Issue.6 , pp. 1437-1451
    • Santos, J.1    Haimes, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.