-
2
-
-
33847386386
-
Identification of critical locations across multiple infrastructures for terrorist actions
-
Patterson S., and Apostolakis G. Identification of critical locations across multiple infrastructures for terrorist actions. Reliability Engineering and System Safety 92 9 (2007) 1183-1203
-
(2007)
Reliability Engineering and System Safety
, vol.92
, Issue.9
, pp. 1183-1203
-
-
Patterson, S.1
Apostolakis, G.2
-
3
-
-
39449115370
-
Tolerance of intentional attacks in complex communication networks
-
Xiao S., Xiao G.X., and Cheng T.H. Tolerance of intentional attacks in complex communication networks. IEEE Communications Magazine 46 1 (2008) 146-152
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.1
, pp. 146-152
-
-
Xiao, S.1
Xiao, G.X.2
Cheng, T.H.3
-
4
-
-
64549092443
-
Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
-
Dighe N., Zhuang J., and Bier V.M. Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performance Engineering 5 1 (2009) 31-43
-
(2009)
International Journal of Performance Engineering
, vol.5
, Issue.1
, pp. 31-43
-
-
Dighe, N.1
Zhuang, J.2
Bier, V.M.3
-
5
-
-
36049023055
-
Allocating defensive resources with private information about vulnerability
-
Powell R. Allocating defensive resources with private information about vulnerability. American Potical Science Review 101 4 (2007) 799-809
-
(2007)
American Potical Science Review
, vol.101
, Issue.4
, pp. 799-809
-
-
Powell, R.1
-
6
-
-
34547479862
-
Defending against terrorist attacks with limited resources
-
Powell R. Defending against terrorist attacks with limited resources. American Political Science Review 101 3 (2007) 527-541
-
(2007)
American Political Science Review
, vol.101
, Issue.3
, pp. 527-541
-
-
Powell, R.1
-
8
-
-
77949656356
-
-
Blanks KS. An effectiveness analysis of the tactical employment of decoys. Master's thesis, Pentagon, Army Command and General Staff Coll Fort Leavenworth KS. Accession number: ADA284608. Available from: 〈http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA284608; http://www.stormingmedia.us/80/8064/A806482.html〉.
-
Blanks KS. An effectiveness analysis of the tactical employment of decoys. Master's thesis, Pentagon, Army Command and General Staff Coll Fort Leavenworth KS. Accession number: ADA284608. Available from: 〈http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA284608; http://www.stormingmedia.us/80/8064/A806482.html〉.
-
-
-
-
9
-
-
77949658032
-
-
Bier V, Abhichandani V. Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries. In: Proceedings of the engineering foundation conference on risk-based decision making in water resources X. Santa Barbara, CA: American Society of Civil Engineers; 2002.
-
Bier V, Abhichandani V. Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries. In: Proceedings of the engineering foundation conference on risk-based decision making in water resources X. Santa Barbara, CA: American Society of Civil Engineers; 2002.
-
-
-
-
10
-
-
44349153674
-
Strategic defense and attack for reliability systems
-
Hausken K. Strategic defense and attack for reliability systems. Reliability Engineering and System Safety 93 (2008) 1740-1750
-
(2008)
Reliability Engineering and System Safety
, vol.93
, pp. 1740-1750
-
-
Hausken, K.1
-
11
-
-
0003235145
-
Analysis of the impact of reliability, availability and maintainability on ship survivability
-
Norwegian Society of Chartered Engineers, September, Available from
-
Malakhoff A, Klinkhamer D, McKesson C. Analysis of the impact of reliability, availability and maintainability on ship survivability. In: Proceedings of the sixth international conference on high speed marine craft, Norwegian Society of Chartered Engineers, September 1998. Available from 〈http://www.hurricane.net/∼chrism/availability.htm〉.
-
(1998)
Proceedings of the sixth international conference on high speed marine craft
-
-
Malakhoff, A.1
Klinkhamer, D.2
McKesson, C.3
-
13
-
-
63149134856
-
Redundancy versus protection versus false targets for systems under attack
-
Levitin G., and Hausken K. Redundancy versus protection versus false targets for systems under attack. IEEE Transactions on Reliability 58 1 (2009) 58-68
-
(2009)
IEEE Transactions on Reliability
, vol.58
, Issue.1
, pp. 58-68
-
-
Levitin, G.1
Hausken, K.2
-
14
-
-
33947146473
-
Optimal resource allocation for security in reliability systems
-
Azaiez M.N., and Bier V.M. Optimal resource allocation for security in reliability systems. European Journal of Operational Research 181 (2007) 773-786
-
(2007)
European Journal of Operational Research
, vol.181
, pp. 773-786
-
-
Azaiez, M.N.1
Bier, V.M.2
-
16
-
-
0002782259
-
Efficient rent-seeking
-
Buchanan J.M., Tollison R.D., and Tulluck G. (Eds), Texas A&M University Press, College Station, TX
-
Tullock G. Efficient rent-seeking. In: Buchanan J.M., Tollison R.D., and Tulluck G. (Eds). Toward a theory of the rent-seeking society (1980), Texas A&M University Press, College Station, TX 97-112
-
(1980)
Toward a theory of the rent-seeking society
, pp. 97-112
-
-
Tullock, G.1
-
17
-
-
0030304298
-
Contest success functions
-
Skaperdas S. Contest success functions. Economic Theory 7 (1996) 283-290
-
(1996)
Economic Theory
, vol.7
, pp. 283-290
-
-
Skaperdas, S.1
-
18
-
-
22544461899
-
Production and conflict models versus rent seeking models
-
Hausken K. Production and conflict models versus rent seeking models. Public Choice 123 (2005) 59-93
-
(2005)
Public Choice
, vol.123
, pp. 59-93
-
-
Hausken, K.1
|