-
2
-
-
33847259790
-
Subsidies in interdependent security with heterogeneous discount rates
-
Zhuang J., Bier V.M., and Gupta A. Subsidies in interdependent security with heterogeneous discount rates. Engineering Economist 52 1 (2007) 1-19
-
(2007)
Engineering Economist
, vol.52
, Issue.1
, pp. 1-19
-
-
Zhuang, J.1
Bier, V.M.2
Gupta, A.3
-
3
-
-
33751256271
-
Income, interdependence, and substitution effects affecting incentives for security investment
-
Hausken K. Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy 25 6 (2006) 629-665
-
(2006)
Journal of Accounting and Public Policy
, vol.25
, Issue.6
, pp. 629-665
-
-
Hausken, K.1
-
4
-
-
84906628863
-
What do we know about the substitution effect in transnational terrorism?
-
Silke A, Ilardi G, editors, UK: Frank Cass
-
Enders W, Sandler T. What do we know about the substitution effect in transnational terrorism? In: Silke A, Ilardi G, editors. Researching terrorism: trends, achievements, failures. Ilfords, UK: Frank Cass, 2003.
-
(2003)
Researching terrorism: Trends, achievements, failures. Ilfords
-
-
Enders, W.1
Sandler, T.2
-
7
-
-
33947146473
-
Optimal resource allocation for security in reliability systems
-
Azaiez M.N., and Bier V.M. Optimal resource allocation for security in reliability systems. European Journal of Operational Research 181 (2007) 773-786
-
(2007)
European Journal of Operational Research
, vol.181
, pp. 773-786
-
-
Azaiez, M.N.1
Bier, V.M.2
-
9
-
-
84954529870
-
Game theory models of intelligent actors in reliability analysis: a state of the art review
-
Bier V.M., and Azaiez M.N. (Eds), Springer, New York
-
Guikema S.D. Game theory models of intelligent actors in reliability analysis: a state of the art review. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 13-31
-
(2009)
Game theoretic risk analysis of security threats
, pp. 13-31
-
-
Guikema, S.D.1
-
10
-
-
84954502885
-
Optimizing defense strategies for complex multi-state systems
-
Bier V.M., and Azaiez M.N. (Eds), Springer, New York
-
Levitin G. Optimizing defense strategies for complex multi-state systems. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 33-64
-
(2009)
Game theoretic risk analysis of security threats
, pp. 33-64
-
-
Levitin, G.1
-
11
-
-
84954516300
-
Defending against terrorism, natural disaster, and all hazards
-
Bier V.M., and Azaiez M.N. (Eds), Springer, New York
-
Hausken K., Bier V., and Zhuang J. Defending against terrorism, natural disaster, and all hazards. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 65-97
-
(2009)
Game theoretic risk analysis of security threats
, pp. 65-97
-
-
Hausken, K.1
Bier, V.2
Zhuang, J.3
-
12
-
-
84954501198
-
A Bayesian model for a game of information in optimal attack/defense strategies
-
Bier V.M., and Azaiez M.N. (Eds), Springer, New York
-
Azaiez M.N. A Bayesian model for a game of information in optimal attack/defense strategies. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 99-123
-
(2009)
Game theoretic risk analysis of security threats
, pp. 99-123
-
-
Azaiez, M.N.1
-
13
-
-
84954471197
-
Search for a malevolent needle in a Benign Haystack
-
Bier V.M., and Azaiez M.N. (Eds), Springer, New York
-
Gaver D.P., Glazebrook K.D., and Jacobs P.A. Search for a malevolent needle in a Benign Haystack. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 125-146
-
(2009)
Game theoretic risk analysis of security threats
, pp. 125-146
-
-
Gaver, D.P.1
Glazebrook, K.D.2
Jacobs, P.A.3
-
14
-
-
84954528259
-
Games and risk analysis: three examples of single and alternate moves
-
Bier V.M., and Azaiez M.N. (Eds), Springer, New York
-
Paté-Cornell M.E., Garber R., Guikema S., and Kucik P. Games and risk analysis: three examples of single and alternate moves. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 147-173
-
(2009)
Game theoretic risk analysis of security threats
, pp. 147-173
-
-
Paté-Cornell, M.E.1
Garber, R.2
Guikema, S.3
Kucik, P.4
-
15
-
-
84954565890
-
Making telecommunications networks resilient against terrorist attacks
-
Bier V.M., and Azaiez M.N. (Eds), Springer, New York
-
Cox T. Making telecommunications networks resilient against terrorist attacks. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 175-197
-
(2009)
Game theoretic risk analysis of security threats
, pp. 175-197
-
-
Cox, T.1
-
16
-
-
84954474479
-
Improving reliability through multi-path routing and link defence: an application of game theory to transport
-
Bier V.M., and Azaiez M.N. (Eds), Springer, New York
-
Kanturska U., Schmöcker J.D., Fonzone A., and Bell M.G.H. Improving reliability through multi-path routing and link defence: an application of game theory to transport. In: Bier V.M., and Azaiez M.N. (Eds). Game theoretic risk analysis of security threats (2009), Springer, New York 199-227
-
(2009)
Game theoretic risk analysis of security threats
, pp. 199-227
-
-
Kanturska, U.1
Schmöcker, J.D.2
Fonzone, A.3
Bell, M.G.H.4
-
19
-
-
0002782259
-
Efficient rent-seeking
-
Buchanan J.M., Tollison R.D., and Tullock G. (Eds), Texas A&M University Press, College Station
-
Tullock G. Efficient rent-seeking. In: Buchanan J.M., Tollison R.D., and Tullock G. (Eds). Toward a theory of the rent-seeking society (1980), Texas A&M University Press, College Station 97-112
-
(1980)
Toward a theory of the rent-seeking society
, pp. 97-112
-
-
Tullock, G.1
-
20
-
-
5244284341
-
Perfect aggregation for a class of general reliability models with Bayesian updating
-
Azaiez M.N., and Bier V.M. Perfect aggregation for a class of general reliability models with Bayesian updating. Applied Mathematics and Computation 73 (1995) 281-302
-
(1995)
Applied Mathematics and Computation
, vol.73
, pp. 281-302
-
-
Azaiez, M.N.1
Bier, V.M.2
-
24
-
-
33847386386
-
Identification of critical locations across multiple infrastructures for terrorist actions
-
Patterson S.A., and Apostolakis G.E. Identification of critical locations across multiple infrastructures for terrorist actions. Reliability Engineering and System Safety 92 9 (2007) 1183-1203
-
(2007)
Reliability Engineering and System Safety
, vol.92
, Issue.9
, pp. 1183-1203
-
-
Patterson, S.A.1
Apostolakis, G.E.2
-
25
-
-
38549098290
-
Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
-
Zhuang J., and Bier V.M. Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Operations Research 55 5 (2007) 976-991
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
27
-
-
63149134856
-
Redundancy vs. protection vs. false targets for systems under attack
-
Levitin G., and Hausken K. Redundancy vs. protection vs. false targets for systems under attack. IEEE Transactions on Reliability 58 1 (2009) 58-68
-
(2009)
IEEE Transactions on Reliability
, vol.58
, Issue.1
, pp. 58-68
-
-
Levitin, G.1
Hausken, K.2
-
28
-
-
36049023055
-
Allocating defensive resources with private information about vulnerability
-
Powell R. Allocating defensive resources with private information about vulnerability. American Political Science Review 101 (2007) 799-809
-
(2007)
American Political Science Review
, vol.101
, pp. 799-809
-
-
Powell, R.1
-
29
-
-
63449108250
-
Games and terrorism: recent developments
-
Sandler T., and Siqueira K. Games and terrorism: recent developments. Simulation and Gaming 40 2 (2009) 164-192
-
(2009)
Simulation and Gaming
, vol.40
, Issue.2
, pp. 164-192
-
-
Sandler, T.1
Siqueira, K.2
-
30
-
-
70349455194
-
-
Idaho National Engineering and Environmental Laboratory, Idaho Falls, Idaho, USA
-
Beitel G.A., Gertman D.I., and Plum M.M. Balanced scorecard method for predicting the probability of a terrorist attack (2004), Idaho National Engineering and Environmental Laboratory, Idaho Falls, Idaho, USA
-
(2004)
Balanced scorecard method for predicting the probability of a terrorist attack
-
-
Beitel, G.A.1
Gertman, D.I.2
Plum, M.M.3
-
31
-
-
70349457138
-
-
Harsanyi J. Games with incomplete information played by 'Bayesian players' I-III. Management Science 1967/1968; 14:159-83, 320-34, 486-501.
-
Harsanyi J. Games with incomplete information played by 'Bayesian players' I-III. Management Science 1967/1968; 14:159-83, 320-34, 486-501.
-
-
-
-
32
-
-
0030304298
-
Contest success functions
-
Skaperdas S. Contest success functions. Economic Theory 7 (1996) 283-290
-
(1996)
Economic Theory
, vol.7
, pp. 283-290
-
-
Skaperdas, S.1
-
34
-
-
33751078297
-
Methodology for ranking the elements of water-supply networks
-
Michaud D., and Apostolakis G. Methodology for ranking the elements of water-supply networks. Journal of infrastructure systems 12 4 (2006) 230-242
-
(2006)
Journal of infrastructure systems
, vol.12
, Issue.4
, pp. 230-242
-
-
Michaud, D.1
Apostolakis, G.2
|