-
1
-
-
18644364822
-
A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism
-
Apostolakis, G. E., D. M. Lemon. 2005. A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. RiskAnal. 25(2) 361-376.
-
(2005)
RiskAnal.
, vol.25
, Issue.2
, pp. 361-376
-
-
Apostolakis, G.E.1
Lemon, D.M.2
-
2
-
-
78651314211
-
A decision tree model for evaluating countermeasures to secure cargo at United States southwestern ports of entry
-
Bakir, N. O. 2008. A decision tree model for evaluating countermeasures to secure cargo at United States southwestern ports of entry. Decision Anal. 5(4) 230-248.
-
(2008)
Decision Anal.
, vol.5
, Issue.4
, pp. 230-248
-
-
Bakir, N.O.1
-
5
-
-
78649800959
-
Game-theoretic and reliability methods in counterterrorism and security
-
A. Wilson, N. Limnios, S. Keller- McNulty, Y. Armijo, eds, Series on Quality, Reliability and Engineering Statistics. World Scientific, Singapore
-
Bier, V. M. 2005. Game-theoretic and reliability methods in counterterrorism and security. A. Wilson, N. Limnios, S. Keller- McNulty, Y. Armijo, eds. Mathematical and Statistical Methods in Reliability, Series on Quality, Reliability and Engineering Statistics. World Scientific, Singapore, 17-28.
-
(2005)
Mathematical and Statistical Methods in Reliability
, pp. 17-28
-
-
Bier, V.M.1
-
6
-
-
34547641190
-
Choosing what to protect: Strategic defensive allocation against an unknown attacker
-
Bier, V. M., S. Oliveros, L. Samuelson. 2007a. Choosing what to protect: Strategic defensive allocation against an unknown attacker. J. Public Econom. Theory 9(4) 563-587.
-
(2007)
J. Public Econom. Theory
, vol.9
, Issue.4
, pp. 563-587
-
-
Bier, V.M.1
Oliveros, S.2
Samuelson, L.3
-
7
-
-
33847360123
-
Methodology for identifying near-optimal interdiction strategies for a power transmission system
-
Bier, V. M., E. R. Gratz, N. J. Haphuriwat, W. Magua, K. R. Wierzbicki. 2007b. Methodology for identifying near-optimal interdiction strategies for a power transmission system. Reliability Engrg. System Safety 92(9) 1155-1161.
-
(2007)
Reliability Engrg. System Safety
, vol.92
, Issue.9
, pp. 1155-1161
-
-
Bier, V.M.1
Gratz, E.R.2
Haphuriwat, N.J.3
Magua, W.4
Wierzbicki, K.R.5
-
8
-
-
78651343452
-
-
Statement of Robert C. Bonner-Hearing before the Permanent Subcommittee on Investigations, Senate Committee on Homeland Security and Governmental Affairs, May 26.
-
Bonner, R. C. 2005. Statement of Robert C. Bonner-Hearing before the Permanent Subcommittee on Investigations, Senate Committee on Homeland Security and Governmental Affairs, May 26. http://hsgac.senate.gov/public/index.cfm? FuseAction=Files.View&FileStore-id=80694a1a-17c0-4d48-a105- 190af6edca26.
-
(2005)
-
-
Bonner, R.C.1
-
9
-
-
78651328216
-
Dirty bomb would cause panic, cost billions: Study
-
(July 2)
-
Bronskill, J., S. Bailey. 2007. Dirty bomb would cause panic, cost billions: Study. TheStar.com (July 2), http://www.thestar.com/ article/231670.
-
(2007)
TheStar.com
-
-
Bronskill, J.1
Bailey, S.2
-
11
-
-
78651307430
-
-
American Enterprise Institute for Public Policy Research, Washington, DC
-
de Rugy, V. 2005. Is Port Security Making Us Safer? American Enterprise Institute for Public Policy Research, Washington, DC.
-
(2005)
Is Port Security Making Us Safer?
-
-
De Rugy, V.1
-
12
-
-
77952583654
-
Evolution of a box
-
Ebeling, C. E. 2009. Evolution of a box. Invention Tech. 23(4) 8-9.
-
(2009)
Invention Tech.
, vol.23
, Issue.4
, pp. 8-9
-
-
Ebeling, C.E.1
-
13
-
-
68349135897
-
A multiple-objective decision analysis for terrorism protection: Potassium iodide distribution in nuclear incidents
-
Feng, T., L. R. Keller. 2006. A multiple-objective decision analysis for terrorism protection: Potassium iodide distribution in nuclear incidents. Decision Anal. 3(2) 76-93.
-
(2006)
Decision Anal.
, vol.3
, Issue.2
, pp. 76-93
-
-
Feng, T.1
Keller, L.R.2
-
14
-
-
78651285026
-
Al-Qaeda "was making dirty bomb"
-
January 31
-
Gardner, F. 2003. Al-Qaeda "was making dirty bomb." BBC News Online (January 31), http://news.bbc.co.uk/2/hi/uk-news/ 2711645.stm.
-
(2003)
BBC News Online
-
-
Gardner, F.1
-
15
-
-
0036090498
-
Risk filtering, ranking, and management framework using hierarchical holographic modeling
-
Haimes, Y. Y., S. Kaplan, J. H. Lambert. 2002. Risk filtering, ranking, and management framework using hierarchical holographic modeling. RiskAnal. 22(2) 383-397.
-
(2002)
RiskAnal.
, vol.22
, Issue.2
, pp. 383-397
-
-
Haimes, Y.Y.1
Kaplan, S.2
Lambert, J.H.3
-
16
-
-
16644390753
-
IDSmodels of airline security
-
Heal, G., H. Kunreuther. 2005. IDSmodels of airline security. J. Conflict Resolution 49(2) 201-217.
-
(2005)
J. Conflict Resolution
, vol.49
, Issue.2
, pp. 201-217
-
-
Heal, G.1
Kunreuther, H.2
-
17
-
-
34447335639
-
Modeling values for anti-terrorism analysis
-
Keeney, R. L. 2007. Modeling values for anti-terrorism analysis. Risk Anal. 27(3) 585-596.
-
(2007)
Risk Anal.
, vol.27
, Issue.3
, pp. 585-596
-
-
Keeney, R.L.1
-
18
-
-
0004001439
-
-
John Wiley & Sons, New York
-
Keeney, R., H. Raiffa. 1976. Decisions with Multiple Objectives, Preferences, and Value Tradeoffs. John Wiley & Sons, New York.
-
(1976)
Decisions with Multiple Objectives, Preferences, and Value Tradeoffs
-
-
Keeney, R.1
Raiffa, H.2
-
20
-
-
0037786763
-
Interdependent security
-
Kunreuther, H., G. Heal. 2002. Interdependent security. J. Risk Uncertainty 26(2-3) 231-249.
-
(2002)
J. Risk Uncertainty
, vol.26
, Issue.2-3
, pp. 231-249
-
-
Kunreuther, H.1
Heal, G.2
-
21
-
-
4544219729
-
A risk-based approach to setting priorities in protecting bridges against terrorist attacks
-
Leung, M., J. H. Lambert, A. Mosenthal. 2004. A risk-based approach to setting priorities in protecting bridges against terrorist attacks. RiskAnal. 24(4) 963-984.
-
(2004)
RiskAnal.
, vol.24
, Issue.4
, pp. 963-984
-
-
Leung, M.1
Lambert, J.H.2
Mosenthal, A.3
-
22
-
-
0242657910
-
Optimization approaches for efficient container security operations at transshipment seaports
-
Lewis, B. M., A. L. Erera, C. C. White III. 2003. Optimization approaches for efficient container security operations at transshipment seaports. Transportation Res. Record 1822 1-8.
-
(2003)
Transportation Res. Record
, vol.1822
, pp. 1-8
-
-
Lewis, B.M.1
Erera, A.L.2
White III, C.C.3
-
23
-
-
34748846925
-
Sequential decision making algorithms for port of entry inspection: Overcoming computational challenges
-
IEEE, Los Alamitos, CA
-
Madigan, D., S. Mittal, F. Roberts. 2007. Sequential decision making algorithms for port of entry inspection: Overcoming computational challenges. Proc. 2007 IEEE Intelligence and Security Informatics Conf., IEEE, Los Alamitos, CA, 1-7.
-
(2007)
Proc. 2007 IEEE Intelligence and Security Informatics Conf.
, pp. 1-7
-
-
Madigan, D.1
Mittal, S.2
Roberts, F.3
-
24
-
-
73649115679
-
Intelligent adversary risk analysis: A bioterrorism risk management model
-
Parnell, G. S., C. M. Smith, D. I. Moxley. 2010. Intelligent adversary risk analysis: A bioterrorism risk management model. Risk Anal. 30(1) 32-48.
-
(2010)
Risk Anal.
, vol.30
, Issue.1
, pp. 32-48
-
-
Parnell, G.S.1
Smith, C.M.2
Moxley, D.I.3
-
25
-
-
0036089039
-
Fusion of intelligence information
-
Paté-Cornell, E. 2002. Fusion of intelligence information. RiskAnal. 22(3) 445-454.
-
(2002)
RiskAnal.
, vol.22
, Issue.3
, pp. 445-454
-
-
Paté-Cornell, E.1
-
26
-
-
0005001185
-
Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures
-
Paté-Cornell, E., S. Guikema. 2002. Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures. Military Oper. Res. 7(4) 5-20.
-
(2002)
Military Oper. Res.
, vol.7
, Issue.4
, pp. 5-20
-
-
Paté-Cornell, E.1
Guikema, S.2
-
27
-
-
44549088740
-
Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach
-
Ramirez-Marquez, J. E. 2008. Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach. Reliability Engrg. System Safety 93 1698-1709.
-
(2008)
Reliability Engrg. System Safety
, vol.93
, pp. 1698-1709
-
-
Ramirez-Marquez, J.E.1
-
29
-
-
34447315072
-
A risk and economic analysis of dirty bomb attacks on the ports of Los Angeles and Long Beach
-
Rosoff, H., D. von Winterfeldt. 2007. A risk and economic analysis of dirty bomb attacks on the ports of Los Angeles and Long Beach. RiskAnal. 27(3) 533-546.
-
(2007)
RiskAnal.
, vol.27
, Issue.3
, pp. 533-546
-
-
Rosoff, H.1
Von Winterfeldt, D.2
-
30
-
-
78651341177
-
-
U.S. Government Accountability Office (U.S. GAO). 2006. Combating nuclear smuggling: Challenges facing U.S. efforts to deploy radiation detection equipment in other countries and in the United States. GAO-06-558T, U.S. Government Accountability Office, Washington, DC
-
U.S. Government Accountability Office (U.S. GAO). 2006. Combating nuclear smuggling: Challenges facing U.S. efforts to deploy radiation detection equipment in other countries and in the United States. GAO-06-558T, U.S. Government Accountability Office, Washington, DC.
-
-
-
-
31
-
-
34447322230
-
Should we protect commercial airplanes against surface-to-air missile attacks by terrorists?
-
von Winterfeldt, D., T. M. Sullivan. 2006. Should we protect commercial airplanes against surface-to-air missile attacks by terrorists? Decision Anal. 3(2) 63-75.
-
(2006)
Decision Anal.
, vol.3
, Issue.2
, pp. 63-75
-
-
Von Winterfeldt, D.1
Sullivan, T.M.2
-
32
-
-
38549098290
-
Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort
-
Zhuang, J., V. M. Bier. 2007. Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort. Oper. Res. 55(5) 976-991.
-
(2007)
Oper. Res.
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
33
-
-
33847259790
-
Subsidies in interdependent security with heterogeneous discount rates
-
Zhuang, J., V. M. Bier, A. Gupta. 2007. Subsidies in interdependent security with heterogeneous discount rates. Engrg. Economist 52(1) 1-19.
-
(2007)
Engrg. Economist
, vol.52
, Issue.1
, pp. 1-19
-
-
Zhuang, J.1
Bier, V.M.2
Gupta, A.3
|