-
1
-
-
18644364822
-
A screening methodology for identification and ranking of infrastructure vulnerabilities due to terrorism
-
Apostolakis G.F., and Lemon D.M. A screening methodology for identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Analysis 25 (2005) 361-376
-
(2005)
Risk Analysis
, vol.25
, pp. 361-376
-
-
Apostolakis, G.F.1
Lemon, D.M.2
-
2
-
-
50849101344
-
-
M. Baveja, L.M. Wein, An effective two-finger, two-stage biometric startegy for the US-VISIT program, Working paper, Graduate School of Business, Stanford University, 2006.
-
M. Baveja, L.M. Wein, An effective two-finger, two-stage biometric startegy for the US-VISIT program, Working paper, Graduate School of Business, Stanford University, 2006.
-
-
-
-
3
-
-
50849121661
-
-
V.M. Bier, Should the model for security be game theory rather than reliability theory, Communications of the Fourth International Conference on Mathematical Methods in Reliability: Methodology and Practice, Santa Fe, New Mexico, 2004.
-
V.M. Bier, Should the model for security be game theory rather than reliability theory, Communications of the Fourth International Conference on Mathematical Methods in Reliability: Methodology and Practice, Santa Fe, New Mexico, 2004.
-
-
-
-
4
-
-
33845439386
-
Defending critical infrastructure
-
Brown G., Carlyle M., Salmeron J., and Wood K. Defending critical infrastructure. Interfaces 36 6 (2006) 530-544
-
(2006)
Interfaces
, vol.36
, Issue.6
, pp. 530-544
-
-
Brown, G.1
Carlyle, M.2
Salmeron, J.3
Wood, K.4
-
5
-
-
50849139494
-
-
A. Brunet, Grant funding to state and local governments and systematic assessment of vulnerability. CREATE Report 05-018. Center for Risk and Economic Analysis of Terrorism Events, University of Southern California, Los Angeles, California, 2005.
-
A. Brunet, Grant funding to state and local governments and systematic assessment of vulnerability. CREATE Report 05-018. Center for Risk and Economic Analysis of Terrorism Events, University of Southern California, Los Angeles, California, 2005.
-
-
-
-
6
-
-
34249837139
-
Pure strategy equilibria in a class of systems defence games
-
Coughlin P.J. Pure strategy equilibria in a class of systems defence games. International Journal of Game Theory 20 (1992) 195-210
-
(1992)
International Journal of Game Theory
, vol.20
, pp. 195-210
-
-
Coughlin, P.J.1
-
7
-
-
50849107821
-
-
Department of Homeland Security, FY2006 Homeland Security Grant Program, Program Guidelines and Application Kit, December 2005.
-
Department of Homeland Security, FY2006 Homeland Security Grant Program, Program Guidelines and Application Kit, December 2005.
-
-
-
-
8
-
-
4544332530
-
Mathematical methods in combatting terrorism
-
Harris B. Mathematical methods in combatting terrorism. Risk Analysis 24 (2004) 985-991
-
(2004)
Risk Analysis
, vol.24
, pp. 985-991
-
-
Harris, B.1
-
10
-
-
50849137783
-
-
E. Kardes, R. Halls, Survey of the literature on strategic decision making in the presence of adversaries, unpublished manuscript, 2005.
-
E. Kardes, R. Halls, Survey of the literature on strategic decision making in the presence of adversaries, unpublished manuscript, 2005.
-
-
-
-
11
-
-
0001797772
-
A linear-time algorithm for solving continuous maximum knapsack problems
-
Kuno T., Konno H., and Zemel E. A linear-time algorithm for solving continuous maximum knapsack problems. Operations Research Letters 10 (1991) 23-26
-
(1991)
Operations Research Letters
, vol.10
, pp. 23-26
-
-
Kuno, T.1
Konno, H.2
Zemel, E.3
-
12
-
-
4544219729
-
A risk-based approach to setting priorities in protecting bridges against terrorist attacks
-
Leung M., Lambert J.H., and Mosenthal A. A risk-based approach to setting priorities in protecting bridges against terrorist attacks. Risk Analysis 24 (2004) 963-984
-
(2004)
Risk Analysis
, vol.24
, pp. 963-984
-
-
Leung, M.1
Lambert, J.H.2
Mosenthal, A.3
-
13
-
-
50849129871
-
-
National Commission on Terrorist Attacks, The 9/11 Commission Report, Norton, New York, 2004.
-
National Commission on Terrorist Attacks, The 9/11 Commission Report, Norton, New York, 2004.
-
-
-
-
15
-
-
50849141058
-
-
S. Reese, Risk-Based Funding in Holmeland Security Grant Legislation: Analysis of Issues for the 109th Congress, CRS Report (Order Code: RL33050), 2005.
-
S. Reese, Risk-Based Funding in Holmeland Security Grant Legislation: Analysis of Issues for the 109th Congress, CRS Report (Order Code: RL33050), 2005.
-
-
-
-
17
-
-
0028399573
-
Optimality of cut/expand across the board' rule for constrained optimization problems with an application to an inventory model
-
Rosenblatt M.J., and Rothblum U.G. Optimality of cut/expand across the board' rule for constrained optimization problems with an application to an inventory model. IIE Transactions 26 (1994) 102-108
-
(1994)
IIE Transactions
, vol.26
, pp. 102-108
-
-
Rosenblatt, M.J.1
Rothblum, U.G.2
-
19
-
-
0042665807
-
Vulnerability and risk: some thoughts from a political and policy perspective
-
Sarewitz D., Pielke Jr. R., and Keykhah M. Vulnerability and risk: some thoughts from a political and policy perspective. Risk Analysis 23 (2003) 805-810
-
(2003)
Risk Analysis
, vol.23
, pp. 805-810
-
-
Sarewitz, D.1
Pielke Jr., R.2
Keykhah, M.3
-
21
-
-
50849104736
-
-
M. Shubik, R. Weber, Competitive valuation of cooperative games, Discussion Paper No. 482, Cowles Foundation For Research in Economics, Yale University, 1978.
-
M. Shubik, R. Weber, Competitive valuation of cooperative games, Discussion Paper No. 482, Cowles Foundation For Research in Economics, Yale University, 1978.
-
-
-
-
22
-
-
0019572879
-
Systems defense games: Colonel Blotto, command and control
-
Shubik M., and Weber R. Systems defense games: Colonel Blotto, command and control. Naval Research Logistics Quarterly 28 (1981) 281-287
-
(1981)
Naval Research Logistics Quarterly
, vol.28
, pp. 281-287
-
-
Shubik, M.1
Weber, R.2
-
24
-
-
19644391137
-
Using fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indication Technology Program
-
Wein L.M., and Baveja M. Using fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indication Technology Program. Proceedings of the National Academy of Sciences 1020 21 (2005) 7772-7775
-
(2005)
Proceedings of the National Academy of Sciences
, vol.1020
, Issue.21
, pp. 7772-7775
-
-
Wein, L.M.1
Baveja, M.2
|