-
1
-
-
78649800959
-
Mathematical and Statistical Methods in Reliability, Series on Quality, Reliability and Engineering Statistics
-
Wilson A, Limnios N, Keller-McNulty S, Armijo Y (eds). Singapore, World Scientific.
-
Bier VM. Game-theoretic and reliability methods in counter-terrorism and security. Pp. 17-28 in Wilson A, Limnios N, Keller-McNulty S, Armijo Y (eds). Mathematical and Statistical Methods in Reliability, Series on Quality, Reliability and Engineering Statistics. Singapore World Scientific, 2005.
-
(2005)
Game-theoretic and reliability methods in counter-terrorism and security
, pp. 17-28
-
-
Bier, V.M.1
-
2
-
-
38549098290
-
Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort
-
Zhuang J, Bier VM. Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort. Operations Research, 2007; 55(5):976-991.
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
3
-
-
34547336458
-
Decision making procedures for committees of careerist experts
-
Levy G. Decision making procedures for committees of careerist experts. American Economic Review, 2007; 97(2):306-310.
-
(2007)
American Economic Review
, vol.97
, Issue.2
, pp. 306-310
-
-
Levy, G.1
-
6
-
-
78649774438
-
-
Porter Goss' Op-Ed: "Ignoturn per Ignotius"!, 2006. Available at, Accessed March 2010.
-
Edmonds S. Porter Goss' Op-Ed: "Ignoturn per Ignotius"!, 2006. Available at:, Accessed March 2010.
-
-
-
Edmonds, S.1
-
7
-
-
78649769882
-
-
Joint Chiefs of Staff. Joint Publication 3-13.4. Joint Doctrine for Military Deception, 1996. Available at, Accessed March 2010.
-
Joint Chiefs of Staff. Joint Publication 3-13.4. Joint Doctrine for Military Deception, 1996. Available at:, Accessed March 2010.
-
-
-
-
8
-
-
0038127072
-
Verbal and nonverbal dynamics of privacy, secrecy, and deceit
-
DePaulo BM, Wetzel C, Sternglanz RW, Wilson MJW. Verbal and nonverbal dynamics of privacy, secrecy, and deceit. Journal of Social Issues, 2003; 59(2):391-410.
-
(2003)
Journal of Social Issues
, vol.59
, Issue.2
, pp. 391-410
-
-
DePaulo, B.M.1
Wetzel, C.2
Sternglanz, R.W.3
Wilson, M.J.W.4
-
9
-
-
78649773582
-
-
ArXiv Computer Science E-Prints. What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory, 2001. Available at, Accessed March 2010.
-
Swire PP. ArXiv Computer Science E-Prints. What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory, 2001. Available at:, Accessed March 2010.
-
-
-
Swire, P.P.1
-
10
-
-
33646075395
-
A model for when disclosure helps security: What is different about computer and network security?
-
Swire PP. A model for when disclosure helps security: What is different about computer and network security? Journal on Telecommunications and High Technology Law, 2004; 2:1-38.
-
(2004)
Journal on Telecommunications and High Technology Law
, vol.2
, pp. 1-38
-
-
Swire, P.P.1
-
13
-
-
78649793101
-
-
Merriam-Webster, Inc. Merriam-Webster Online Dictionary, 2009. Available at, Accessed March 2010.
-
Merriam-Webster, Inc. Merriam-Webster Online Dictionary, 2009. Available at:, Accessed March 2010.
-
-
-
-
14
-
-
0003674114
-
Secrets: On the Ethics of Concealment and Revelation
-
New York, Pantheon Books.
-
Bok S. Secrets: On the Ethics of Concealment and Revelation. New York Pantheon Books, 1982.
-
(1982)
-
-
Bok, S.1
-
15
-
-
78649765668
-
Secrecy: A Cross-Cultural Perspective
-
Tefft SK (ed). New York, Human Sciences Press.
-
Tefft SK (ed). Secrecy: A Cross-Cultural Perspective. New York Human Sciences Press, 1997.
-
(1997)
-
-
-
16
-
-
78649789828
-
-
Merriam-Webster, Inc. Merriam-Webster Online Dictionary, 2009. Available at, Accessed March 2010.
-
Merriam-Webster, Inc. Merriam-Webster Online Dictionary, 2009. Available at:, Accessed March 2010.
-
-
-
-
18
-
-
78649777157
-
-
Equilibrium bluffs: A model of rational feints., University of California-Berkeley, Haas School of Business, Working paper.
-
Oliveros S. Equilibrium bluffs: A model of rational feints. University of California-Berkeley, Haas School of Business, Working paper, 2010.
-
(2010)
-
-
Oliveros, S.1
-
19
-
-
27344439516
-
A two-sided optimization for theater ballistic missile defense
-
Brown G, Carlyle M, Diehl D, Kline J, Wood K. A two-sided optimization for theater ballistic missile defense. Operations Research, 2005; 53(5):263-275.
-
(2005)
Operations Research
, vol.53
, Issue.5
, pp. 263-275
-
-
Brown, G.1
Carlyle, M.2
Diehl, D.3
Kline, J.4
Wood, K.5
-
20
-
-
0042385597
-
The deception of the Greeks: Generalizing the information structure of extensive form games
-
Board OJ. The deception of the Greeks: Generalizing the information structure of extensive form games. Greek Economic Review, 2002; 22:1-16.
-
(2002)
Greek Economic Review
, vol.22
, pp. 1-16
-
-
Board, O.J.1
-
21
-
-
0009340590
-
Secrecy and Publicity: Dilemmas of Democracy
-
Baltimore, MD, Johns Hopkins Press.
-
Rourke FE. Secrecy and Publicity: Dilemmas of Democracy. Baltimore, MD Johns Hopkins Press, 1961.
-
(1961)
-
-
Rourke, F.E.1
-
22
-
-
0003487308
-
Secrets and Lies: Digital Security in a Networked World
-
Hoboken, NJ, John Wiley & Sons.
-
Schneier B. Secrets and Lies: Digital Security in a Networked World. Hoboken, NJ John Wiley & Sons, 2000.
-
(2000)
-
-
Schneier, B.1
-
23
-
-
77955845921
-
The politician and the judge: Accountability in government
-
Maskin E, Tirole J. The politician and the judge: Accountability in government. American Economic Review, 2004; 94(4):1034-1054.
-
(2004)
American Economic Review
, vol.94
, Issue.4
, pp. 1034-1054
-
-
Maskin, E.1
Tirole, J.2
-
24
-
-
77951635530
-
Is this paper dangerous? Balancing secrecy and openness in counterterrorism
-
Shapiro JN, Siegel DA. Is this paper dangerous? Balancing secrecy and openness in counterterrorism. Security Studies, 2010; 19(1):66-98.
-
(2010)
Security Studies
, vol.19
, Issue.1
, pp. 66-98
-
-
Shapiro, J.N.1
Siegel, D.A.2
-
25
-
-
78649798617
-
-
Modeling Secrecy and Deception in Homeland Security Resource Allocation, Ph.D. dissertation, Department of Industrial and Systems Engineering, University of Wisconsin-Madison
-
Zhuang J. Modeling Secrecy and Deception in Homeland Security Resource Allocation, Ph.D. dissertation, Department of Industrial and Systems Engineering, University of Wisconsin-Madison, 2008.
-
(2008)
-
-
Zhuang, J.1
-
26
-
-
78649798366
-
-
Robustness of optimal defensive resource allocations in the face of less than fully rational attackers. Proceedings of the 2009 Industrial Engineering Research Conference.
-
Hao M, Jin S, Zhuang J. Robustness of optimal defensive resource allocations in the face of less than fully rational attackers. Pp. 886-891 in Proceedings of the 2009 Industrial Engineering Research Conference, 2009.
-
(2009)
, pp. 886-891
-
-
Hao, M.1
Jin, S.2
Zhuang, J.3
-
27
-
-
69949102998
-
Interdicting a nuclear-weapons project
-
Brown GG, Carlyle WM, Harney RC, Skroch EM, Wood RK. Interdicting a nuclear-weapons project. Operations Research, 2009; 57(4):866-877.
-
(2009)
Operations Research
, vol.57
, Issue.4
, pp. 866-877
-
-
Brown, G.G.1
Carlyle, W.M.2
Harney, R.C.3
Skroch, E.M.4
Wood, R.K.5
-
28
-
-
36049023055
-
Allocating defensive resources with private information about vulnerability
-
Powell R. Allocating defensive resources with private information about vulnerability. American Political Science Review, 2007; 101(4):799-809.
-
(2007)
American Political Science Review
, vol.101
, Issue.4
, pp. 799-809
-
-
Powell, R.1
-
30
-
-
77953205441
-
Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation
-
Zhuang J, Bier VM. Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation. Defence and Peace Economics, 2010.
-
(2010)
Defence and Peace Economics
-
-
Zhuang, J.1
Bier, V.M.2
-
31
-
-
64549092443
-
Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
-
Dighe NS, Zhuang J, Bier VM. Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering, 2009; 5(1):31-43.
-
(2009)
International Journal of Performability Engineering
, vol.5
, Issue.1
, pp. 31-43
-
-
Dighe, N.S.1
Zhuang, J.2
Bier, V.M.3
-
32
-
-
0040679785
-
Measuring the positive externalities from unobservable victim precaution: An empirical analysis of Lojack
-
Ayres I, Levitt S. Measuring the positive externalities from unobservable victim precaution: An empirical analysis of Lojack. Quarterly Journal of Economics, 1998; 113(1):43-77.
-
(1998)
Quarterly Journal of Economics
, vol.113
, Issue.1
, pp. 43-77
-
-
Ayres, I.1
Levitt, S.2
-
33
-
-
78649790301
-
-
Washington Times. Air Marshals-Secrecy Ruined by Dress Code, July 9, 2004. Available at, Accessed March 2010.
-
Hudson A. Washington Times. Air Marshals-Secrecy Ruined by Dress Code, July 9, 2004. Available at:, Accessed March 2010.
-
-
-
Hudson, A.1
-
34
-
-
78649798367
-
-
Cover blown, but air marshal still flies. USA Today, June 1, 2006.
-
Frank T. Cover blown, but air marshal still flies. USA Today, June 1, 2006.
-
-
-
Frank, T.1
-
35
-
-
78649801675
-
-
Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks., DOI: Available at.
-
Bier VM, Haphuriwat N. Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks. DOI: Available at.
-
-
-
Bier, V.M.1
Haphuriwat, N.2
-
36
-
-
70350704685
-
Modeling secrecy and deception in a multiple-period attacker-defender signaling game
-
Zhuang J, Bier VM, Alagoz O. Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 2010; 203(2):409-418.
-
(2010)
European Journal of Operational Research
, vol.203
, Issue.2
, pp. 409-418
-
-
Zhuang, J.1
Bier, V.M.2
Alagoz, O.3
|