-
2
-
-
33947634937
-
Terrorist Signalling and the Value of Intelligence
-
Arce, D., and Sandler, T. (2007), "Terrorist Signalling and the Value of Intelligence," British Journal of Political Science, 37, 573-586.
-
(2007)
British Journal of Political Science
, vol.37
, pp. 573-586
-
-
Arce, D.1
Sandler, T.2
-
3
-
-
84889967883
-
Game Theory and Risk Analysis in the Context of the Smallpox Threat
-
eds. A. Wilson, G. Wilson, and D. Olwell, Springer, New York, pp
-
Banks, D., and Anderson, S. (2006), "Game Theory and Risk Analysis in the Context of the Smallpox Threat," in Statistical Methods in Counterterrorism, eds. A. Wilson, G. Wilson, and D. Olwell, Springer, New York, pp. 9-22.
-
(2006)
Statistical Methods in Counterterrorism
, pp. 9-22
-
-
Banks, D.1
Anderson, S.2
-
4
-
-
66549085162
-
-
Bedford, T., and Cooke, R. (2001), Probabilistic Risk Analysis: Foundations and Methods, Cambridge, U.K: Cambridge University Press. Bielza, C., Muller, P., and Rios Insua, D. (1999), Decision Analysis by Augmented Probability Simulation, Management Science, 45, 995-1008.
-
Bedford, T., and Cooke, R. (2001), Probabilistic Risk Analysis: Foundations and Methods, Cambridge, U.K: Cambridge University Press. Bielza, C., Muller, P., and Rios Insua, D. (1999), "Decision Analysis by Augmented Probability Simulation," Management Science, 45, 995-1008.
-
-
-
-
5
-
-
65349160114
-
-
Bier, V., and Cox, L. A., Jr. (2007), Probabilistic Risk Analysis for Engineered Systems. in Advances in Decision Analysis, eds.W. Edwards, D. vonWinterfeldt, and R. Mles, New York: Cambridge University Press, pp. 279-301.
-
Bier, V., and Cox, L. A., Jr. (2007), "Probabilistic Risk Analysis for Engineered Systems. in Advances in Decision Analysis, eds.W. Edwards, D. vonWinterfeldt, and R. Mles, New York: Cambridge University Press, pp. 279-301.
-
-
-
-
6
-
-
34547641190
-
Choosing What to Protect
-
Bier, V., Oliveros, S., and Samuelson, L. (2007), "Choosing What to Protect," Journal of Economic Literature, 9, 563-587.
-
(2007)
Journal of Economic Literature
, vol.9
, pp. 563-587
-
-
Bier, V.1
Oliveros, S.2
Samuelson, L.3
-
7
-
-
33845439386
-
Defending Critical Infrastructure
-
Brown, G., Carlyle, M., Salmeron, J., and Wood, K. (2006), "Defending Critical Infrastructure," Interfaces, 36, 530-544.
-
(2006)
Interfaces
, vol.36
, pp. 530-544
-
-
Brown, G.1
Carlyle, M.2
Salmeron, J.3
Wood, K.4
-
8
-
-
66549114519
-
-
Brown, G., Carlyle, W. M., and Wood, R. (2008), Optimizing Department of Homeland Security Defense Investments: Applying Defender-Attacker (-Defender) Optimization to Terror Risk Assessment and Mitigation, Appendix E, in Washington DC: National Academies Press.
-
Brown, G., Carlyle, W. M., and Wood, R. (2008), "Optimizing Department of Homeland Security Defense Investments: Applying Defender-Attacker (-Defender) Optimization to Terror Risk Assessment and Mitigation," Appendix E, in Washington DC: National Academies Press.
-
-
-
-
9
-
-
85008351234
-
-
Princeton, NJ: Princeton University Press
-
Camerer, C. (2003), Behavioral Game Theory, Princeton, NJ: Princeton University Press.
-
(2003)
Behavioral Game Theory
-
-
Camerer, C.1
-
13
-
-
0000725056
-
GamesWith Incomplete Information Played by "Bayesian" Players, I-III. Part I. The Basic Model
-
Harsanyi, J. (1967), "GamesWith Incomplete Information Played by "Bayesian" Players, I-III. Part I. The Basic Model," Management Science, 14, 159-182.
-
(1967)
Management Science
, vol.14
, pp. 159-182
-
-
Harsanyi, J.1
-
14
-
-
0347408438
-
Subjective Probability and the Theory of Games: Comments on Kadane and Larkey's Paper
-
Harsanyi, J. (1982), "Subjective Probability and the Theory of Games: Comments on Kadane and Larkey's Paper," Management Science, 28, 120-124.
-
(1982)
Management Science
, vol.28
, pp. 120-124
-
-
Harsanyi, J.1
-
15
-
-
0036202354
-
Probabilistic Risk Analysis and Game Theory
-
Hausken, K. (2002), "Probabilistic Risk Analysis and Game Theory," Risk Analysis, 22, 17-27.
-
(2002)
Risk Analysis
, vol.22
, pp. 17-27
-
-
Hausken, K.1
-
16
-
-
66549129017
-
-
Heal, G., and Kunreuther, H. (2006), You Can Only Die Once: Interdependent Security in an Uncertain World. in The Economic Impacts of Terrorist Attacks, eds. H.W. Richardson, P. Gordon, and J. E. Moore III, Northampton, MA: Edward Elgar Publishers. Heyes, A. (2000), Implementing Environmental Regulation: Enforcement and Compliance, Journal of Regulatory Economics, 17, 107-129.
-
Heal, G., and Kunreuther, H. (2006), "You Can Only Die Once: Interdependent Security in an Uncertain World. in The Economic Impacts of Terrorist Attacks, eds. H.W. Richardson, P. Gordon, and J. E. Moore III, Northampton, MA: Edward Elgar Publishers. Heyes, A. (2000), "Implementing Environmental Regulation: Enforcement and Compliance," Journal of Regulatory Economics, 17, 107-129.
-
-
-
-
17
-
-
51249163831
-
Several Bayesians: A Review
-
Kadane, J. B. (1993), "Several Bayesians: A Review," Test, 2, 1-32.
-
(1993)
Test
, vol.2
, pp. 1-32
-
-
Kadane, J.B.1
-
18
-
-
0010298686
-
Subjective Probability and the Theory of Games
-
28, Rreply: p
-
Kadane, J. B., and Larkey, P. D. (1982), "Subjective Probability and the Theory of Games," Management Science, 28, 113-120, Rreply: p. 124.
-
(1982)
Management Science
-
-
Kadane, J.B.1
Larkey, P.D.2
-
19
-
-
0019540987
-
On a Qualitative Definition of Risk
-
Kaplan, S., and Garrick, J. (1981), "On a Qualitative Definition of Risk," Risk Analysis, 1, 11-27.
-
(1981)
Risk Analysis
, vol.1
, pp. 11-27
-
-
Kaplan, S.1
Garrick, J.2
-
20
-
-
66549115514
-
Robust Stochastic Games and Applications to Counter-Terrorism Strategies
-
Kardes, E. (2005), "Robust Stochastic Games and Applications to Counter-Terrorism Strategies, CREATE report.
-
(2005)
CREATE report
-
-
Kardes, E.1
-
21
-
-
79958018720
-
Survey of Literature on Strategic Decision Making in Presence of Adversaries
-
Kardes, E. and R. Hall (2005), "Survey of Literature on Strategic Decision Making in Presence of Adversaries, CREATE report.
-
(2005)
CREATE report
-
-
Kardes, E.1
Hall, R.2
-
22
-
-
2442671273
-
Development and Use of a Modeling System to Aid a Major Oil Company in Allocating Bidding Capital
-
Keefer, D., Beckley, F., and Back, H. (1991), "Development and Use of a Modeling System to Aid a Major Oil Company in Allocating Bidding Capital," Operations Research, 39, 28-41.
-
(1991)
Operations Research
, vol.39
, pp. 28-41
-
-
Keefer, D.1
Beckley, F.2
Back, H.3
-
23
-
-
4544276923
-
A Defense-Centric Taxonomy Based on Attack Manifestations
-
DSN-04, Los Alamitos, CA: IEEE Computer Society Press, pp
-
Killourhy, K., Maxion, R., and Tan, K. (2004), "A Defense-Centric Taxonomy Based on Attack Manifestations," in International Conference on Dependable Systems & Networks (DSN-04), Los Alamitos, CA: IEEE Computer Society Press, pp. 102-111.
-
(2004)
International Conference on Dependable Systems & Networks
, pp. 102-111
-
-
Killourhy, K.1
Maxion, R.2
Tan, K.3
-
24
-
-
0000176346
-
Equilibrium Points of Bimatrix Games
-
Lemke, C. E., and Howson, J. T., Jr. (1964), "Equilibrium Points of Bimatrix Games," Journal of the Society for Industrial and Applied Mathematics, 12, 413-423.
-
(1964)
Journal of the Society for Industrial and Applied Mathematics
, vol.12
, pp. 413-423
-
-
Lemke, C.E.1
Howson Jr., J.T.2
-
25
-
-
0000738339
-
Auctions and Bidding
-
McAfee, R., and McMillan, J. (1996), "Auctions and Bidding," Journal of Economic Literature, 25, 699-738.
-
(1996)
Journal of Economic Literature
, vol.25
, pp. 699-738
-
-
McAfee, R.1
McMillan, J.2
-
26
-
-
21344463948
-
Competition and Game Theory
-
McAfee, R. P., and McMillan, J. (1996), "Competition and Game Theory," Journal of Marketing Research, 33, 263-267.
-
(1996)
Journal of Marketing Research
, vol.33
, pp. 263-267
-
-
McAfee, R.P.1
McMillan, J.2
-
28
-
-
85016966585
-
-
New York: Wiley
-
O'Hagan, A., Buck, C., Daneshkhah, A., Eiser, J., Garthwaite, P., Jenkinson, D., Oakley, J., and Rakow, T. (2006), Uncertain Judgements: Eliciting Experts' Probabilities, New York: Wiley.
-
(2006)
Uncertain Judgements: Eliciting Experts' Probabilities
-
-
O'Hagan, A.1
Buck, C.2
Daneshkhah, A.3
Eiser, J.4
Garthwaite, P.5
Jenkinson, D.6
Oakley, J.7
Rakow, T.8
-
30
-
-
66549119961
-
-
Parnell, G., Banks, D., Borio, L., Brown, G., Cox, L. A., Gannon, J., Harvill, E., Kunreuther, H., Morse, S., Pappaioanou, M., Pollack, S., Singpurwalla, N., and Wilson, A. (2008), Report on Methodological Improvements to the Department of Homeland Security's Biological Agent Risk Analysis, Washington DC: National Academies Press.
-
Parnell, G., Banks, D., Borio, L., Brown, G., Cox, L. A., Gannon, J., Harvill, E., Kunreuther, H., Morse, S., Pappaioanou, M., Pollack, S., Singpurwalla, N., and Wilson, A. (2008), Report on Methodological Improvements to the Department of Homeland Security's Biological Agent Risk Analysis, Washington DC: National Academies Press.
-
-
-
-
31
-
-
0005001185
-
Probabilistic Modeling or Terrorist Threats: A Systematic Analysis Approach to Setting Priorities among Countermeasures
-
Paté-Cornell, E., and Guikema, S. (2002), "Probabilistic Modeling or Terrorist Threats: A Systematic Analysis Approach to Setting Priorities among Countermeasures," Military Operations Research, 7, 5-23.
-
(2002)
Military Operations Research
, vol.7
, pp. 5-23
-
-
Paté-Cornell, E.1
Guikema, S.2
-
32
-
-
34548038217
-
Influence Diagrams - Historical and Personal Perspectives
-
Pearl, J. (2005), "Influence Diagrams - Historical and Personal Perspectives," Decision Analysis, 2, 232-234.
-
(2005)
Decision Analysis
, vol.2
, pp. 232-234
-
-
Pearl, J.1
-
33
-
-
38549176250
-
An Analysis of Short-Term Responses to Threats of Terrorism
-
Pinker, E. J. (2007), "An Analysis of Short-Term Responses to Threats of Terrorism," Management Science, 53, 865-880.
-
(2007)
Management Science
, vol.53
, pp. 865-880
-
-
Pinker, E.J.1
-
34
-
-
36049023055
-
Allocating Defensive Resources With Private Information About Vulnerability
-
Powell, R. (2007), "Allocating Defensive Resources With Private Information About Vulnerability," The American Political Science Review, 101, 799-809.
-
(2007)
The American Political Science Review
, vol.101
, pp. 799-809
-
-
Powell, R.1
-
36
-
-
0242674765
-
-
Cambridge, MA: Harvard University Press
-
Raiffa, H. (2002), Negotiation Analysis, Cambridge, MA: Harvard University Press.
-
(2002)
Negotiation Analysis
-
-
Raiffa, H.1
-
38
-
-
52249100458
-
Decision Analysis: The Right Tool for Auctions
-
Rothkopf, M. (2007), "Decision Analysis: The Right Tool for Auctions," Decision Analysis, 4, 167-172.
-
(2007)
Decision Analysis
, vol.4
, pp. 167-172
-
-
Rothkopf, M.1
-
40
-
-
33750558925
-
Terrorists vs the Government: Strategic Intervention, Support and Sponsorship
-
Siqueira, K., and Sandler, T. (2006), "Terrorists vs the Government: Strategic Intervention, Support and Sponsorship," The Journal of Conflict Resolution, 50, 878-898.
-
(2006)
The Journal of Conflict Resolution
, vol.50
, pp. 878-898
-
-
Siqueira, K.1
Sandler, T.2
-
41
-
-
34447322230
-
Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists
-
von Winterfeldt, D., and O'Sullivan, T. M. (2006), "Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists," Decision Analysis, 3, 63-75.
-
(2006)
Decision Analysis
, vol.3
, pp. 63-75
-
-
von Winterfeldt, D.1
O'Sullivan, T.M.2
-
43
-
-
38549098290
-
Balancing Terrorism and Natural Disasters. Defensive Strategy with Endogenous Attack Effort
-
Zhuang, J., and Bier, V. (2007), "Balancing Terrorism and Natural Disasters. Defensive Strategy with Endogenous Attack Effort," Operations Research, 55, 976-991.
-
(2007)
Operations Research
, vol.55
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.2
|