-
1
-
-
18644364822
-
A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism
-
Apostolakis, O. & D.Lemon. (2005) A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Analysis 25(2). 361-376.
-
(2005)
Risk Analysis
, vol.25
, Issue.2
, pp. 361-376
-
-
Apostolakis, O.1
Lemon, D.2
-
2
-
-
41949124417
-
-
Center for Risk Management of Engineering Systems, University of Virginia, Charlottesville, VA
-
Center for Risk Management of Engineering Systems. (2005) Adaptive Two-Player Hierarchical Holographic Modeling (ATP-HHM). University of Virginia, Charlottesville, VA.
-
(2005)
Adaptive Two-Player Hierarchical Holographic Modeling (ATP-HHM)
-
-
-
3
-
-
41949138855
-
-
Retrieved April 3, 2006 from the World Wide Web
-
David, R. (2002). Homeland Security: Building a National Strategy. National Academy of Engineering. Retrieved April 3, 2006 from the World Wide Web: http://www.nae.edu/nae/bridgecom.nsf/weblinks/CGOZ-58NLJY?OpenDocument.
-
(2002)
Homeland Security: Building a National Strategy
-
-
David, R.1
-
4
-
-
41949101996
-
-
Haimes, Y. (2005). Deployment of the Adaptive Multiplayer HHM Game for the 2006 Virginia Gubernatorial Inauguration. SEAS Proposal No. SE-VTRC-2683-06.
-
Haimes, Y. (2005). Deployment of the Adaptive Multiplayer HHM Game for the 2006 Virginia Gubernatorial Inauguration. SEAS Proposal No. SE-VTRC-2683-06.
-
-
-
-
5
-
-
13444304425
-
Adaptive two-player hierarchical holographic modeling game for counterterrorism intelligence analysis
-
Haimes, Y. & B. Horowitz. (2004a). Adaptive two-player hierarchical holographic modeling game for counterterrorism intelligence analysis. Journal of Homeland Security and Emergency Management 1(3).
-
(2004)
Journal of Homeland Security and Emergency Management
, vol.1
, Issue.3
-
-
Haimes, Y.1
Horowitz, B.2
-
6
-
-
85001560455
-
Modeling interdependent infrastructures for sustainable counterterrorism
-
Haimes, Y. & B. Horowitz. (2004b). Modeling interdependent infrastructures for sustainable counterterrorism. Journal of Infrastructure Systems, 33-42.
-
(2004)
Journal of Infrastructure Systems
, pp. 33-42
-
-
Haimes, Y.1
Horowitz, B.2
-
8
-
-
0242621136
-
Risk-based methodology for scenario tracking, intelligence gathering, and analysis for countering terrorism
-
Horowitz, B. & Y. Haimes. (2003). Risk-based methodology for scenario tracking, intelligence gathering, and analysis for countering terrorism. Systems Engineering 6(3). 152-169.
-
(2003)
Systems Engineering
, vol.6
, Issue.3
, pp. 152-169
-
-
Horowitz, B.1
Haimes, Y.2
-
9
-
-
36849087537
-
-
Retrieved April 3, 2006 from the World Wide Web
-
Howe, D. (2004). Homeland Security Council: Planning Scenarios. Retrieved April 3, 2006 from the World Wide Web: http://www.voiceoffreedom.com/ archives/homelandsecurity/15-attacks_the_hawiaa_disclosure.htm.
-
(2004)
Homeland Security Council: Planning Scenarios
-
-
Howe, D.1
-
10
-
-
0035369021
-
Identification, ranking, and management of risks in a major system acquisition
-
Lambert, J., Y. Haimes, D. Li, R. Schooff, & V. Tulsiani. (2001). Identification, ranking, and management of risks in a major system acquisition. Reliability Engineering & System Safety 72(3). 315-325.
-
(2001)
Reliability Engineering & System Safety
, vol.72
, Issue.3
, pp. 315-325
-
-
Lambert, J.1
Haimes, Y.2
Li, D.3
Schooff, R.4
Tulsiani, V.5
-
11
-
-
24744438851
-
Assessing and managing risks to information assurance: A methodological approach
-
Lamm, G. & Y. Haimes. (2002). Assessing and managing risks to information assurance: a methodological approach. Systems Engineering 5(4). 286-314.
-
(2002)
Systems Engineering
, vol.5
, Issue.4
, pp. 286-314
-
-
Lamm, G.1
Haimes, Y.2
-
12
-
-
4544219729
-
A risk-based approach to setting priorities in protecting bridges against terrorist attacks. (2004)
-
Leung, M., J. Lambert, & A. Mosenthal. (2004) A risk-based approach to setting priorities in protecting bridges against terrorist attacks. (2004). Risk Analysis 24(4). 963-984.
-
(2004)
Risk Analysis
, vol.24
, Issue.4
, pp. 963-984
-
-
Leung, M.1
Lambert, J.2
Mosenthal, A.3
-
15
-
-
13444313012
-
Can the risk of terrorism be calculated by insurers? game theory might do it
-
April 8, Retrieved October 19, 2005 from the World Wide Web
-
Oster, C. (2002, April 8). Can the risk of terrorism be calculated by insurers? game theory might do it. Wallstreet Journal Online. Retrieved October 19, 2005 from the World Wide Web: www.gametheory.net/news/Items/011.html
-
(2002)
Wallstreet Journal Online
-
-
Oster, C.1
-
16
-
-
8844234423
-
Modeling the demand reduction input-output (I-O) inoperability due to terrorism of interconnected infrastructures
-
Santos, J. & Y. Haimes. (2004). Modeling the demand reduction input-output (I-O) inoperability due to terrorism of interconnected infrastructures. Risk Analysis 24(6). 1437-1451.
-
(2004)
Risk Analysis
, vol.24
, Issue.6
, pp. 1437-1451
-
-
Santos, J.1
Haimes, Y.2
|