메뉴 건너뛰기




Volumn 192, Issue 1, 2009, Pages 198-208

Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks

Author keywords

Game theory; Resource allocation; Risk analysis

Indexed keywords

GAME THEORY; OPTIMAL POLICIES; PROBABILISTIC RISK; RESOURCE ALLOCATION; RISK ANALYSIS;

EID: 50849106725     PISSN: 03772217     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ejor.2007.09.001     Document Type: Article
Times cited : (115)

References (24)
  • 1
    • 18644364822 scopus 로고    scopus 로고
    • A screening methodology for identification and ranking of infrastructure vulnerabilities due to terrorism
    • Apostolakis G.F., and Lemon D.M. A screening methodology for identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Analysis 25 (2005) 361-376
    • (2005) Risk Analysis , vol.25 , pp. 361-376
    • Apostolakis, G.F.1    Lemon, D.M.2
  • 2
    • 50849101344 scopus 로고    scopus 로고
    • M. Baveja, L.M. Wein, An effective two-finger, two-stage biometric startegy for the US-VISIT program, Working paper, Graduate School of Business, Stanford University, 2006.
    • M. Baveja, L.M. Wein, An effective two-finger, two-stage biometric startegy for the US-VISIT program, Working paper, Graduate School of Business, Stanford University, 2006.
  • 3
    • 50849121661 scopus 로고    scopus 로고
    • V.M. Bier, Should the model for security be game theory rather than reliability theory, Communications of the Fourth International Conference on Mathematical Methods in Reliability: Methodology and Practice, Santa Fe, New Mexico, 2004.
    • V.M. Bier, Should the model for security be game theory rather than reliability theory, Communications of the Fourth International Conference on Mathematical Methods in Reliability: Methodology and Practice, Santa Fe, New Mexico, 2004.
  • 4
    • 33845439386 scopus 로고    scopus 로고
    • Defending critical infrastructure
    • Brown G., Carlyle M., Salmeron J., and Wood K. Defending critical infrastructure. Interfaces 36 6 (2006) 530-544
    • (2006) Interfaces , vol.36 , Issue.6 , pp. 530-544
    • Brown, G.1    Carlyle, M.2    Salmeron, J.3    Wood, K.4
  • 5
    • 50849139494 scopus 로고    scopus 로고
    • A. Brunet, Grant funding to state and local governments and systematic assessment of vulnerability. CREATE Report 05-018. Center for Risk and Economic Analysis of Terrorism Events, University of Southern California, Los Angeles, California, 2005.
    • A. Brunet, Grant funding to state and local governments and systematic assessment of vulnerability. CREATE Report 05-018. Center for Risk and Economic Analysis of Terrorism Events, University of Southern California, Los Angeles, California, 2005.
  • 6
    • 34249837139 scopus 로고
    • Pure strategy equilibria in a class of systems defence games
    • Coughlin P.J. Pure strategy equilibria in a class of systems defence games. International Journal of Game Theory 20 (1992) 195-210
    • (1992) International Journal of Game Theory , vol.20 , pp. 195-210
    • Coughlin, P.J.1
  • 7
    • 50849107821 scopus 로고    scopus 로고
    • Department of Homeland Security, FY2006 Homeland Security Grant Program, Program Guidelines and Application Kit, December 2005.
    • Department of Homeland Security, FY2006 Homeland Security Grant Program, Program Guidelines and Application Kit, December 2005.
  • 8
    • 4544332530 scopus 로고    scopus 로고
    • Mathematical methods in combatting terrorism
    • Harris B. Mathematical methods in combatting terrorism. Risk Analysis 24 (2004) 985-991
    • (2004) Risk Analysis , vol.24 , pp. 985-991
    • Harris, B.1
  • 10
    • 50849137783 scopus 로고    scopus 로고
    • E. Kardes, R. Halls, Survey of the literature on strategic decision making in the presence of adversaries, unpublished manuscript, 2005.
    • E. Kardes, R. Halls, Survey of the literature on strategic decision making in the presence of adversaries, unpublished manuscript, 2005.
  • 11
    • 0001797772 scopus 로고
    • A linear-time algorithm for solving continuous maximum knapsack problems
    • Kuno T., Konno H., and Zemel E. A linear-time algorithm for solving continuous maximum knapsack problems. Operations Research Letters 10 (1991) 23-26
    • (1991) Operations Research Letters , vol.10 , pp. 23-26
    • Kuno, T.1    Konno, H.2    Zemel, E.3
  • 12
    • 4544219729 scopus 로고    scopus 로고
    • A risk-based approach to setting priorities in protecting bridges against terrorist attacks
    • Leung M., Lambert J.H., and Mosenthal A. A risk-based approach to setting priorities in protecting bridges against terrorist attacks. Risk Analysis 24 (2004) 963-984
    • (2004) Risk Analysis , vol.24 , pp. 963-984
    • Leung, M.1    Lambert, J.H.2    Mosenthal, A.3
  • 13
    • 50849129871 scopus 로고    scopus 로고
    • National Commission on Terrorist Attacks, The 9/11 Commission Report, Norton, New York, 2004.
    • National Commission on Terrorist Attacks, The 9/11 Commission Report, Norton, New York, 2004.
  • 15
    • 50849141058 scopus 로고    scopus 로고
    • S. Reese, Risk-Based Funding in Holmeland Security Grant Legislation: Analysis of Issues for the 109th Congress, CRS Report (Order Code: RL33050), 2005.
    • S. Reese, Risk-Based Funding in Holmeland Security Grant Legislation: Analysis of Issues for the 109th Congress, CRS Report (Order Code: RL33050), 2005.
  • 17
    • 0028399573 scopus 로고
    • Optimality of cut/expand across the board' rule for constrained optimization problems with an application to an inventory model
    • Rosenblatt M.J., and Rothblum U.G. Optimality of cut/expand across the board' rule for constrained optimization problems with an application to an inventory model. IIE Transactions 26 (1994) 102-108
    • (1994) IIE Transactions , vol.26 , pp. 102-108
    • Rosenblatt, M.J.1    Rothblum, U.G.2
  • 19
    • 0042665807 scopus 로고    scopus 로고
    • Vulnerability and risk: some thoughts from a political and policy perspective
    • Sarewitz D., Pielke Jr. R., and Keykhah M. Vulnerability and risk: some thoughts from a political and policy perspective. Risk Analysis 23 (2003) 805-810
    • (2003) Risk Analysis , vol.23 , pp. 805-810
    • Sarewitz, D.1    Pielke Jr., R.2    Keykhah, M.3
  • 21
    • 50849104736 scopus 로고    scopus 로고
    • M. Shubik, R. Weber, Competitive valuation of cooperative games, Discussion Paper No. 482, Cowles Foundation For Research in Economics, Yale University, 1978.
    • M. Shubik, R. Weber, Competitive valuation of cooperative games, Discussion Paper No. 482, Cowles Foundation For Research in Economics, Yale University, 1978.
  • 22
    • 0019572879 scopus 로고
    • Systems defense games: Colonel Blotto, command and control
    • Shubik M., and Weber R. Systems defense games: Colonel Blotto, command and control. Naval Research Logistics Quarterly 28 (1981) 281-287
    • (1981) Naval Research Logistics Quarterly , vol.28 , pp. 281-287
    • Shubik, M.1    Weber, R.2
  • 24
    • 19644391137 scopus 로고    scopus 로고
    • Using fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indication Technology Program
    • Wein L.M., and Baveja M. Using fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indication Technology Program. Proceedings of the National Academy of Sciences 1020 21 (2005) 7772-7775
    • (2005) Proceedings of the National Academy of Sciences , vol.1020 , Issue.21 , pp. 7772-7775
    • Wein, L.M.1    Baveja, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.