-
1
-
-
0032909908
-
Assessing and managing the risk of extremes
-
V. M. Bier, Y. Y. Haimes, J. H. Lambert, N. C. Matalas, and R. Zimmerman, Assessing and managing the risk of extremes, Risk Analysis 19, 83-94 (1999).
-
(1999)
Risk Analysis
, vol.19
, pp. 83-94
-
-
Bier, V.M.1
Haimes, Y.Y.2
Lambert, J.H.3
Matalas, N.C.4
Zimmerman, R.5
-
2
-
-
27744599748
-
An overview of probabilistic risk analysis for complex engineered systems
-
V. Molak, editor, Boca Raton, FL: Lewis Publishers
-
V. M. Bier, An overview of probabilistic risk analysis for complex engineered systems, in Fundamentals of Risk Analysis and Risk Management (V. Molak, editor), Boca Raton, FL: Lewis Publishers (1997).
-
(1997)
Fundamentals of Risk Analysis and Risk Management
-
-
Bier, V.M.1
-
5
-
-
34548177934
-
Risk of extreme and rare events: Lessons from a selection of approaches
-
T. McDaniels and M. J. Small, editors, Cambridge, UK: Cambridge University Press
-
V. M. Bier, S. Ferson, Y. Y. Haimes, J. H. Lambert, and M. J. Small, Risk of extreme and rare events: Lessons from a selection of approaches, in Risk Analysis and Society: Interdisciplinary Perspectives (T. McDaniels and M. J. Small, editors), Cambridge, UK: Cambridge University Press (2004).
-
(2004)
Risk Analysis and Society: Interdisciplinary Perspectives
-
-
Bier, V.M.1
Ferson, S.2
Haimes, Y.Y.3
Lambert, J.H.4
Small, M.J.5
-
6
-
-
44949169050
-
-
Columbia-Wharton/Penn Roundtable on “Risk Management Strategies in an Uncertain World,”
-
R. Zimmerman and V. M. Bier, Risk assessment of extreme events, Columbia-Wharton/Penn Roundtable on “Risk Management Strategies in an Uncertain World,” http://www.ldeo.columbia.edu/CHRR/Roundtable/ZimmermanW-P.pdf (2003).
-
(2003)
Risk assessment of extreme events
-
-
Zimmerman, R.1
Bier, V.M.2
-
8
-
-
0023090831
-
Risk analysis of terrorist attacks
-
H. F. Martz and M. E. Johnson, Risk analysis of terrorist attacks, Risk Analysis 7, 35-47 (1987).
-
(1987)
Risk Analysis
, vol.7
, pp. 35-47
-
-
Martz, H.F.1
Johnson, M.E.2
-
9
-
-
0345881000
-
A probabilistic risk assessment program for analyzing security risks
-
L. A. Cox and P. F. Ricci, editors, New York: Plenum Press
-
L. A. Cox, A probabilistic risk assessment program for analyzing security risks, in New Risks: Issues and Management (L. A. Cox and P. F. Ricci, editors). New York: Plenum Press (1990).
-
(1990)
New Risks: Issues and Management
-
-
Cox, L.A.1
-
10
-
-
0005001185
-
Probabilistic modeling of terrorist threats:A systems analysis approach to setting priorities among countermeasures
-
December
-
E. Pate-Cornell and S. Guikema, Probabilistic modeling of terrorist threats:A systems analysis approach to setting priorities among countermeasures, Military Operations Research 7, 5-20 (December 2002).
-
(2002)
Military Operations Research
, vol.7
, pp. 5-20
-
-
Pate-Cornell, E.1
Guikema, S.2
-
11
-
-
0036085545
-
Perspectives on the use of risk assessment to address terrorism
-
B. J. Garrick, Perspectives on the use of risk assessment to address terrorism, Risk Analysis 22, 421-424 (2003).
-
(2003)
Risk Analysis
, vol.22
, pp. 421-424
-
-
Garrick, B.J.1
-
13
-
-
4544362748
-
A discussion of findings and their possible implications from a workshop on bioterrorism threat assessment and risk management
-
R. A. Zilinskas, B. Hope, and D. W. North, A discussion of findings and their possible implications from a workshop on bioterrorism threat assessment and risk management, Risk Analysis 24, 901-908 (2004).
-
(2004)
Risk Analysis
, vol.24
, pp. 901-908
-
-
Zilinskas, R.A.1
Hope, B.2
North, D.W.3
-
14
-
-
85001821045
-
Strategic responses to risks of terrorism to water resources
-
Y. Y. Haimes, Strategic responses to risks of terrorism to water resources, Journal of Water Resources Planning and Management 128, 383-389 (2002).
-
(2002)
Journal of Water Resources Planning and Management
, vol.128
, pp. 383-389
-
-
Haimes, Y.Y.1
-
15
-
-
0036089074
-
The role of risk analysis in the protection of critical infrastructure against terrorism
-
Y. Y. Haimes and T. Longstaff, The role of risk analysis in the protection of critical infrastructure against terrorism, Risk Analysis 22, 439-444 (2002).
-
(2002)
Risk Analysis
, vol.22
, pp. 439-444
-
-
Haimes, Y.Y.1
Longstaff, T.2
-
16
-
-
0032311739
-
Reducing vulnerability of water supply systems to attack
-
Y. Y. Haimes, N. C. Matalas, J. H. Lambert, B. A. Jackson, and J. F. R. Fellows, Reducing vulnerability of water supply systems to attack, Journal of Infrastructure Systems 4, 164-177 (1998).
-
(1998)
Journal of Infrastructure Systems
, vol.4
, pp. 164-177
-
-
Haimes, Y.Y.1
Matalas, N.C.2
Lambert, J.H.3
Jackson, B.A.4
Fellows, J.F.R.5
-
17
-
-
0034283049
-
Infrastructure risk analysis model
-
B. C. Ezell, J. V. Farr, and I. Wiese, Infrastructure risk analysis model, Journal of Infrastmcture Systems 6, 114-117 (2000a).
-
(2000)
Journal of Infrastmcture Systems
, vol.6
, pp. 114-117
-
-
Ezell, B.C.1
Farr, J.V.2
Wiese, I.3
-
18
-
-
0034283429
-
Infrastructure risk analysis of municipal water distribution system
-
B. C. Ezell, J. V. Farr, and I. Wiese, Infrastructure risk analysis of municipal water distribution system, Journal of Infrastructure Systems 6, 118-122 (2000b).
-
(2000)
Journal of Infrastructure Systems
, vol.6
, pp. 118-122
-
-
Ezell, B.C.1
Farr, J.V.2
Wiese, I.3
-
20
-
-
0038141825
-
Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes
-
G. Levitin, Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes, European Journal of Operational Research 150, 406-419 (2003).
-
(2003)
European Journal of Operational Research
, vol.150
, pp. 406-419
-
-
Levitin, G.1
-
22
-
-
0043031379
-
Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm
-
G. Levitin, Y. Dai, M. Xie, and K. L. Poh, Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm, Reliability Engineering and System Safety 82, 93-104 (2003).
-
(2003)
Reliability Engineering and System Safety
, vol.82
, pp. 93-104
-
-
Levitin, G.1
Dai, Y.2
Xie, M.3
Poh, K.L.4
-
25
-
-
85198597049
-
-
October 21-24, Alberta, Canada; also the 17th Annual Computer Security Applications Conference, December 10-14, New Orleans, Louisiana
-
R. Anderson, Why information security is hard: An economic perspective, Presented at the 18th Symposium on Operating Systems Principles, October 21-24, Alberta, Canada; also the 17th Annual Computer Security Applications Conference, December 10-14, New Orleans, Louisiana; http://www.ftp.cl.cam.ac.uk/ftp/users/rjal4/econ.pdf. (2001).
-
(2001)
Why information security is hard: An economic perspective, Presented at the 18th Symposium on Operating Systems Principles
-
-
Anderson, R.1
-
26
-
-
84889955470
-
Managing network security: Attack and defense strategies
-
Fred Cohen and Associates
-
F. Cohen, Managing network security: Attack and defense strategies, Technical Report 9907, Fred Cohen and Associates (1999).
-
(1999)
Technical Report 9907
-
-
Cohen, F.1
-
28
-
-
0038514203
-
Transnational public goods: Strategies and institutions
-
D. G. Arce M. and T. Sandler. Transnational public goods: Strategies and institutions, European Journal of Political Economy 17 (3), 493-516 (2001).
-
(2001)
European Journal of Political Economy
, vol.17
, Issue.3
, pp. 493-516
-
-
Arce, D.G.M.1
Sandler, T.2
-
29
-
-
0041771284
-
What do we know about the substitution effect in transnational terrorism?
-
A. Silke and G. Ilardi (editors), London: Frank Cass
-
W. Enders and T. Sandler, What do we know about the substitution effect in transnational terrorism? in A. Silke and G. Ilardi (editors), Researching Terrorism: Trends, Achievements, Failures. London: Frank Cass (2004).
-
(2004)
Researching Terrorism: Trends, Achievements, Failures
-
-
Enders, W.1
Sandler, T.2
-
31
-
-
0005517696
-
-
Washington, DC: Brookings Institution
-
M. O’Hanlon, P. Orszag, I. Daalder, M. Destler, D. Gunter, R. Litan, and J. Steinberg, Protecting the American Homeland, Washington, DC: Brookings Institution (2002).
-
(2002)
Protecting the American Homeland
-
-
O’Hanlon, M.1
Orszag, P.2
Daalder, I.3
Destler, M.4
Gunter, D.5
Litan, R.6
Steinberg, J.7
-
32
-
-
85198591720
-
-
Insurance Project Workshop, National Bureau of Economic Research, Inc
-
G. Woo, Insuring against Al-Qaeda, Insurance Project Workshop, National Bureau of Economic Research, Inc. http://www.nber.org/~confer/2003/insurance03/woo.pdf (2003).
-
(2003)
Insuring against Al-Qaeda
-
-
Woo, G.1
-
33
-
-
9444279581
-
Protection of simple series and parallel systems with components of different values
-
V. M. Bier, A. Nagaraj, and V. Abhichandani, Protection of simple series and parallel systems with components of different values, Reliability Engineering and System Safety 87, 313-323 (2005).
-
(2005)
Reliability Engineering and System Safety
, vol.87
, pp. 313-323
-
-
Bier, V.M.1
Nagaraj, A.2
Abhichandani, V.3
-
34
-
-
33749589535
-
Advanced techniques for modeling terrorism risk
-
J. Major, Advanced techniques for modeling terrorism risk, Journal of Risk Finance 4, 15-24 (2002).
-
(2002)
Journal of Risk Finance
, vol.4
, pp. 15-24
-
-
Major, J.1
-
35
-
-
85104633275
-
Choosing what to protect: Strategic defensive allocation against an unknown attacker
-
submitted to
-
V. M. Bier, S. Oliveros, and L. Samuelson, Choosing what to protect: Strategic defensive allocation against an unknown attacker, submitted to Journal of Risk and Uncertainty (2005).
-
(2005)
Journal of Risk and Uncertainty
-
-
Bier, V.M.1
Oliveros, S.2
Samuelson, L.3
-
38
-
-
85198602345
-
Subsidized security and stability of equilibrium solutions in an N-player game with errors
-
submitted to
-
J. Zhuang and V. M. Bier, Subsidized security and stability of equilibrium solutions in an N-player game with errors, submitted to ZIE Transactions (2005).
-
(2005)
ZIE Transactions
-
-
Zhuang, J.1
Bier, V.M.2
-
39
-
-
0036202354
-
Probabilistic risk analysis and game theory
-
K. Hausken, Probabilistic risk analysis and game theory, Risk Analysis 22, 17-27 (2002).
-
(2002)
Risk Analysis
, vol.22
, pp. 17-27
-
-
Hausken, K.1
-
40
-
-
1642307310
-
Vulnerability to terrorism: Addressing the human variables
-
Reston, VA: American Society of Civil Engineers
-
W. D. Rowe, Vulnerability to terrorism: Addressing the human variables, Risk-Based Decision Making in Water Resources X, pp. 155-159. Reston, VA: American Society of Civil Engineers (2002).
-
(2002)
Risk-Based Decision Making in Water Resources
, vol.10
, pp. 155-159
-
-
Rowe, W.D.1
-
42
-
-
56149108872
-
Optimal resource allocation for security in reliability systems
-
submitted to
-
N. Azaiez and V. M. Bier, Optimal resource allocation for security in reliability systems, submitted to European Journal of Operational Research (2005).
-
(2005)
European Journal of Operational Research
-
-
Azaiez, N.1
Bier, V.M.2
|