메뉴 건너뛰기




Volumn , Issue , 2005, Pages 17-28

GAME-THEORETIC AND RELIABILITY METHODS IN COUNTER-TERRORISM AND SECURITY

Author keywords

[No Author keywords available]

Indexed keywords


EID: 78649800959     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (30)

References (42)
  • 2
    • 27744599748 scopus 로고    scopus 로고
    • An overview of probabilistic risk analysis for complex engineered systems
    • V. Molak, editor, Boca Raton, FL: Lewis Publishers
    • V. M. Bier, An overview of probabilistic risk analysis for complex engineered systems, in Fundamentals of Risk Analysis and Risk Management (V. Molak, editor), Boca Raton, FL: Lewis Publishers (1997).
    • (1997) Fundamentals of Risk Analysis and Risk Management
    • Bier, V.M.1
  • 5
    • 34548177934 scopus 로고    scopus 로고
    • Risk of extreme and rare events: Lessons from a selection of approaches
    • T. McDaniels and M. J. Small, editors, Cambridge, UK: Cambridge University Press
    • V. M. Bier, S. Ferson, Y. Y. Haimes, J. H. Lambert, and M. J. Small, Risk of extreme and rare events: Lessons from a selection of approaches, in Risk Analysis and Society: Interdisciplinary Perspectives (T. McDaniels and M. J. Small, editors), Cambridge, UK: Cambridge University Press (2004).
    • (2004) Risk Analysis and Society: Interdisciplinary Perspectives
    • Bier, V.M.1    Ferson, S.2    Haimes, Y.Y.3    Lambert, J.H.4    Small, M.J.5
  • 6
    • 44949169050 scopus 로고    scopus 로고
    • Columbia-Wharton/Penn Roundtable on “Risk Management Strategies in an Uncertain World,”
    • R. Zimmerman and V. M. Bier, Risk assessment of extreme events, Columbia-Wharton/Penn Roundtable on “Risk Management Strategies in an Uncertain World,” http://www.ldeo.columbia.edu/CHRR/Roundtable/ZimmermanW-P.pdf (2003).
    • (2003) Risk assessment of extreme events
    • Zimmerman, R.1    Bier, V.M.2
  • 8
    • 0023090831 scopus 로고
    • Risk analysis of terrorist attacks
    • H. F. Martz and M. E. Johnson, Risk analysis of terrorist attacks, Risk Analysis 7, 35-47 (1987).
    • (1987) Risk Analysis , vol.7 , pp. 35-47
    • Martz, H.F.1    Johnson, M.E.2
  • 9
    • 0345881000 scopus 로고
    • A probabilistic risk assessment program for analyzing security risks
    • L. A. Cox and P. F. Ricci, editors, New York: Plenum Press
    • L. A. Cox, A probabilistic risk assessment program for analyzing security risks, in New Risks: Issues and Management (L. A. Cox and P. F. Ricci, editors). New York: Plenum Press (1990).
    • (1990) New Risks: Issues and Management
    • Cox, L.A.1
  • 10
    • 0005001185 scopus 로고    scopus 로고
    • Probabilistic modeling of terrorist threats:A systems analysis approach to setting priorities among countermeasures
    • December
    • E. Pate-Cornell and S. Guikema, Probabilistic modeling of terrorist threats:A systems analysis approach to setting priorities among countermeasures, Military Operations Research 7, 5-20 (December 2002).
    • (2002) Military Operations Research , vol.7 , pp. 5-20
    • Pate-Cornell, E.1    Guikema, S.2
  • 11
    • 0036085545 scopus 로고    scopus 로고
    • Perspectives on the use of risk assessment to address terrorism
    • B. J. Garrick, Perspectives on the use of risk assessment to address terrorism, Risk Analysis 22, 421-424 (2003).
    • (2003) Risk Analysis , vol.22 , pp. 421-424
    • Garrick, B.J.1
  • 13
    • 4544362748 scopus 로고    scopus 로고
    • A discussion of findings and their possible implications from a workshop on bioterrorism threat assessment and risk management
    • R. A. Zilinskas, B. Hope, and D. W. North, A discussion of findings and their possible implications from a workshop on bioterrorism threat assessment and risk management, Risk Analysis 24, 901-908 (2004).
    • (2004) Risk Analysis , vol.24 , pp. 901-908
    • Zilinskas, R.A.1    Hope, B.2    North, D.W.3
  • 14
  • 15
    • 0036089074 scopus 로고    scopus 로고
    • The role of risk analysis in the protection of critical infrastructure against terrorism
    • Y. Y. Haimes and T. Longstaff, The role of risk analysis in the protection of critical infrastructure against terrorism, Risk Analysis 22, 439-444 (2002).
    • (2002) Risk Analysis , vol.22 , pp. 439-444
    • Haimes, Y.Y.1    Longstaff, T.2
  • 18
    • 0034283429 scopus 로고    scopus 로고
    • Infrastructure risk analysis of municipal water distribution system
    • B. C. Ezell, J. V. Farr, and I. Wiese, Infrastructure risk analysis of municipal water distribution system, Journal of Infrastructure Systems 6, 118-122 (2000b).
    • (2000) Journal of Infrastructure Systems , vol.6 , pp. 118-122
    • Ezell, B.C.1    Farr, J.V.2    Wiese, I.3
  • 20
    • 0038141825 scopus 로고    scopus 로고
    • Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes
    • G. Levitin, Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes, European Journal of Operational Research 150, 406-419 (2003).
    • (2003) European Journal of Operational Research , vol.150 , pp. 406-419
    • Levitin, G.1
  • 22
    • 0043031379 scopus 로고    scopus 로고
    • Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm
    • G. Levitin, Y. Dai, M. Xie, and K. L. Poh, Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm, Reliability Engineering and System Safety 82, 93-104 (2003).
    • (2003) Reliability Engineering and System Safety , vol.82 , pp. 93-104
    • Levitin, G.1    Dai, Y.2    Xie, M.3    Poh, K.L.4
  • 26
    • 84889955470 scopus 로고    scopus 로고
    • Managing network security: Attack and defense strategies
    • Fred Cohen and Associates
    • F. Cohen, Managing network security: Attack and defense strategies, Technical Report 9907, Fred Cohen and Associates (1999).
    • (1999) Technical Report 9907
    • Cohen, F.1
  • 28
    • 0038514203 scopus 로고    scopus 로고
    • Transnational public goods: Strategies and institutions
    • D. G. Arce M. and T. Sandler. Transnational public goods: Strategies and institutions, European Journal of Political Economy 17 (3), 493-516 (2001).
    • (2001) European Journal of Political Economy , vol.17 , Issue.3 , pp. 493-516
    • Arce, D.G.M.1    Sandler, T.2
  • 29
    • 0041771284 scopus 로고    scopus 로고
    • What do we know about the substitution effect in transnational terrorism?
    • A. Silke and G. Ilardi (editors), London: Frank Cass
    • W. Enders and T. Sandler, What do we know about the substitution effect in transnational terrorism? in A. Silke and G. Ilardi (editors), Researching Terrorism: Trends, Achievements, Failures. London: Frank Cass (2004).
    • (2004) Researching Terrorism: Trends, Achievements, Failures
    • Enders, W.1    Sandler, T.2
  • 32
    • 85198591720 scopus 로고    scopus 로고
    • Insurance Project Workshop, National Bureau of Economic Research, Inc
    • G. Woo, Insuring against Al-Qaeda, Insurance Project Workshop, National Bureau of Economic Research, Inc. http://www.nber.org/~confer/2003/insurance03/woo.pdf (2003).
    • (2003) Insuring against Al-Qaeda
    • Woo, G.1
  • 33
    • 9444279581 scopus 로고    scopus 로고
    • Protection of simple series and parallel systems with components of different values
    • V. M. Bier, A. Nagaraj, and V. Abhichandani, Protection of simple series and parallel systems with components of different values, Reliability Engineering and System Safety 87, 313-323 (2005).
    • (2005) Reliability Engineering and System Safety , vol.87 , pp. 313-323
    • Bier, V.M.1    Nagaraj, A.2    Abhichandani, V.3
  • 34
    • 33749589535 scopus 로고    scopus 로고
    • Advanced techniques for modeling terrorism risk
    • J. Major, Advanced techniques for modeling terrorism risk, Journal of Risk Finance 4, 15-24 (2002).
    • (2002) Journal of Risk Finance , vol.4 , pp. 15-24
    • Major, J.1
  • 35
    • 85104633275 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defensive allocation against an unknown attacker
    • submitted to
    • V. M. Bier, S. Oliveros, and L. Samuelson, Choosing what to protect: Strategic defensive allocation against an unknown attacker, submitted to Journal of Risk and Uncertainty (2005).
    • (2005) Journal of Risk and Uncertainty
    • Bier, V.M.1    Oliveros, S.2    Samuelson, L.3
  • 38
    • 85198602345 scopus 로고    scopus 로고
    • Subsidized security and stability of equilibrium solutions in an N-player game with errors
    • submitted to
    • J. Zhuang and V. M. Bier, Subsidized security and stability of equilibrium solutions in an N-player game with errors, submitted to ZIE Transactions (2005).
    • (2005) ZIE Transactions
    • Zhuang, J.1    Bier, V.M.2
  • 39
    • 0036202354 scopus 로고    scopus 로고
    • Probabilistic risk analysis and game theory
    • K. Hausken, Probabilistic risk analysis and game theory, Risk Analysis 22, 17-27 (2002).
    • (2002) Risk Analysis , vol.22 , pp. 17-27
    • Hausken, K.1
  • 40
    • 1642307310 scopus 로고    scopus 로고
    • Vulnerability to terrorism: Addressing the human variables
    • Reston, VA: American Society of Civil Engineers
    • W. D. Rowe, Vulnerability to terrorism: Addressing the human variables, Risk-Based Decision Making in Water Resources X, pp. 155-159. Reston, VA: American Society of Civil Engineers (2002).
    • (2002) Risk-Based Decision Making in Water Resources , vol.10 , pp. 155-159
    • Rowe, W.D.1
  • 42
    • 56149108872 scopus 로고    scopus 로고
    • Optimal resource allocation for security in reliability systems
    • submitted to
    • N. Azaiez and V. M. Bier, Optimal resource allocation for security in reliability systems, submitted to European Journal of Operational Research (2005).
    • (2005) European Journal of Operational Research
    • Azaiez, N.1    Bier, V.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.