-
1
-
-
33947146473
-
Optimal resource allocation for security in reliability systems
-
DOI 10.1016/j.ejor.2006.03.057, PII S0377221706004747
-
Azaiez, N., Bier, V.M., 2007. Optimal Resource Allocation for Security in Reliability Systems. European Journal of Operational Research, 181, 773-786. (Pubitemid 46413583)
-
(2007)
European Journal of Operational Research
, vol.181
, Issue.2
, pp. 773-786
-
-
Azaiez, M.N.1
Bier, V.M.2
-
2
-
-
79955750542
-
The interplay between preemptive and defensive counterterrorism measures: A two- Stage game
-
forthcoming.
-
Bandyopadhyay, S., and Sandler, T. 2011. The interplay between preemptive and defensive counterterrorism measures: A two- Stage game. Economica, Vol 78, forthcoming.
-
(2011)
Economica
, vol.78
-
-
Bandyopadhyay, S.1
Sandler, T.2
-
3
-
-
33645877390
-
The timing of ETA terrorist attacks
-
DOI 10.1016/j.jpolmod.2005.12.001, PII S0161893806000032
-
Barros, C.P, Passos, J., and Gil-Alana, L. A. 2006. The timing of ETA terrorist attacks. Journal of Policy Modeling 28, 3, 335-346. (Pubitemid 43573913)
-
(2006)
Journal of Policy Modeling
, vol.28
, Issue.3
, pp. 335-346
-
-
Barros, C.P.1
Passos, J.2
Gil-Alana, L.A.3
-
4
-
-
33750490397
-
Location of terror response facilities: A game between state and terrorist
-
DOI 10.1016/j.ejor.2005.12.022, PII S0377221705009409
-
Berman, O. and Gavious, A. 2007. Location of terror response facilities: A game between state and terrorist. European Journal of Operational Research 177, 2, 1113-1133. (Pubitemid 44647639)
-
(2006)
European Journal of Operational Research
, vol.177
, Issue.2
, pp. 1113-1133
-
-
Berman, O.1
Gavious, A.2
-
5
-
-
33947206094
-
How does terrorism risk vary across space and time? An analysis based on the Israeli experience
-
Berrebi, C. and Lakdawalla, D. (2007) How does terrorism risk vary across space and time? An analysis based on the Israeli experience. Defence and Peace Economics 18, 2, 113-131.
-
(2007)
Defence and Peace Economics
, vol.18
, Issue.2
, pp. 113-131
-
-
Berrebi, C.1
Lakdawalla, D.2
-
6
-
-
34547641190
-
Choosing what to protect: Strategic defensive allocation against an unknown attacker
-
Bier, V.M., Oliveros S., Samuelson L. 2007. Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory 9, 563-587.
-
(2007)
Journal of Public Economic Theory
, vol.9
, pp. 563-587
-
-
Bier, V.M.1
Oliveros, S.2
Samuelson, L.3
-
8
-
-
9444279581
-
Protection of simple series and parallel systems with components of different values
-
Bier, V.M., Nagaraj, A., Abhichandani, V., 2005. Protection of Simple Series and Parallel Systems with Components of Different Values. Reliability Engineering and System Safety 87, 315-323.
-
(2005)
Reliability Engineering and System Safety
, vol.87
, pp. 315-323
-
-
Bier, V.M.1
Nagaraj, A.2
Abhichandani, V.3
-
9
-
-
34547641190
-
Choosing what to protect: Strategic defense allocation against an unknown attacker
-
Bier, V.M., Oliveros, S., Samuelson, L., 2007. Choosing What to Protect: Strategic Defense Allocation Against an Unknown Attacker. Journal of Public Economic Theory 9 (4), 563-587.
-
(2007)
Journal of Public Economic Theory
, vol.9
, Issue.4
, pp. 563-587
-
-
Bier, V.M.1
Oliveros, S.2
Samuelson, L.3
-
10
-
-
45349092442
-
Optimal resource allocation for defense of targets based on differing measures of attractiveness
-
DOI 10.1111/j.1539-6924.2008.01053.x
-
Bier, V.M., Haphuriwat, N., Menoyo, J., Zimmerman, R. and Culpen, A. 2008. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness. Risk Analysis 28(3), 763-770. (Pubitemid 351847236)
-
(2008)
Risk Analysis
, vol.28
, Issue.3
, pp. 763-770
-
-
Bier, V.M.1
Haphuriwat, N.2
Menoyo, J.3
Zimmerman, R.4
Culpen, A.M.5
-
11
-
-
33845439386
-
Defending critical infrastructure
-
DOI 10.1287/inte.1060.0252
-
Brown, G., Carlyle, M., Salmeron, J. and Wood, K. 2006. Defending Critical Infrastructure. Interfaces 36, 530-544. (Pubitemid 44905062)
-
(2006)
Interfaces
, vol.36
, Issue.6
, pp. 530-544
-
-
Brown, G.1
Carlyle, M.2
Salmeron, J.3
Wood, K.4
-
12
-
-
64549092443
-
Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
-
Dighe, N., Zhuang J., and Bier V.M., 2009. Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence, International Journal of Performability Engineering, special issue on System Survivability and Defense against External Impacts, 5(1): 31-43.
-
(2009)
International Journal of Performability Engineering, Special Issue on System Survivability and Defense Against External Impacts
, vol.5
, Issue.1
, pp. 31-43
-
-
Dighe, N.1
Zhuang, J.2
Bier, V.M.3
-
14
-
-
84906628863
-
What do we know about the substitution effect in transnational terrorism?
-
A. Silke and G. Ilardi (eds) Frank Cass.
-
Enders, W. and Sandler, T. 2003. What do we know about the substitution effect in transnational terrorism?. In A. Silke and G. Ilardi (eds) Research on Terrorism: Trends, Achievements and Failures, Frank Cass.
-
(2003)
Research on Terrorism: Trends, Achievements and Failures
-
-
Enders, W.1
Sandler, T.2
-
15
-
-
16644364092
-
After 9/11 IS IT all different now?
-
DOI 10.1177/0022002704272864, Political Economy of Transnational Terrorism
-
Enders, W. and Sandler, T. 2005. After 9/11 Is it all different now? Journal of Conflict Resolution 49, 2, 259-277. (Pubitemid 40482842)
-
(2005)
Journal of Conflict Resolution
, vol.49
, Issue.2
, pp. 259-277
-
-
Enders, W.1
Sandler, T.2
-
16
-
-
55649083124
-
Terror and counterterror operations: Differential game with cyclical nash solution
-
Feichtinger, G. and Novak, A. 2008. Terror and Counterterror Operations: Differential Game with Cyclical Nash Solution. Journal of Optimization Theory and Applications 139, 3, 541-556.
-
(2008)
Journal of Optimization Theory and Applications
, vol.139
, Issue.3
, pp. 541-556
-
-
Feichtinger, G.1
Novak, A.2
-
19
-
-
0041589854
-
How to fight terrorismAlternatives to deterrence
-
Frey, B.S., Luechinger, S. 2003. How to fight terrorismAlternatives to deterrence. Defense and Peace Economics 14, 237-249.
-
(2003)
Defense and Peace Economics
, vol.14
, pp. 237-249
-
-
Frey, B.S.1
Luechinger, S.2
-
20
-
-
79954506568
-
Robustness of optimal defensive resource allocations in the face of less than fully rational attackers
-
Hao, M., Jin, S. and Zhuang, J. 2009. Robustness of optimal defensive resource allocations in the face of less than fully rational attackers, Proceedings of the 2009 Industrial Engineering Research Conference, p.p. 886-891.
-
(2009)
Proceedings of the 2009 Industrial Engineering Research Conference
, pp. 886-891
-
-
Hao, M.1
Jin, S.2
Zhuang, J.3
-
21
-
-
33751256271
-
Income, interdependence, and substitution effects affecting incentives for security investment
-
DOI 10.1016/j.jaccpubpol.2006.09.001, PII S027842540600086X
-
Hausken, K. 2006. Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy 25, 629-665. (Pubitemid 44783207)
-
(2006)
Journal of Accounting and Public Policy
, vol.25
, Issue.6
, pp. 629-665
-
-
Hausken, K.1
-
22
-
-
55349145945
-
Whether to attack a terrorist's resource stock today or tomorrow
-
Hausken, K. 2008. Whether to Attack a Terrorist's Resource Stock Today or Tomorrow. Games and Economic Behavior 64, 2, 548-564.
-
(2008)
Games and Economic Behavior
, vol.64
, Issue.2
, pp. 548-564
-
-
Hausken, K.1
-
23
-
-
84954516300
-
Defending against terrorism, natural disaster, and all hazards
-
Bier, V.M. and Azaiez, M.N. (eds.), Springer, New York
-
Hausken, K., Bier, V. and Zhuang, J. 2009. Defending against Terrorism, Natural Disaster, and All Hazards," in Bier, V.M. and Azaiez, M.N. (eds.), Game Theoretic Risk Analysis of Security Threats, Springer, New York, 65-97.
-
(2009)
Game Theoretic Risk Analysis of Security Threats
, pp. 65-97
-
-
Hausken, K.1
Bier, V.2
Zhuang, J.3
-
26
-
-
34047142655
-
Optimal defense strategy against intentional attacks
-
Levitin, G., 2007. Optimal Defense Strategy Against Intentional Attacks. IEEE Transactions on Reliability 56(1), 148-156.
-
(2007)
IEEE Transactions on Reliability
, vol.56
, Issue.1
, pp. 148-156
-
-
Levitin, G.1
-
27
-
-
43249094557
-
Protection vs. redundancy in homogeneous parallel systems
-
Levitin, G. and Hausken, K. 2008. Protection vs. Redundancy in Homogeneous Parallel Systems. Reliability Engineering & System Safety 93, 10, 1444-1451.
-
(2008)
Reliability Engineering & System Safety
, vol.93
, Issue.10
, pp. 1444-1451
-
-
Levitin, G.1
Hausken, K.2
-
28
-
-
33751078297
-
Methodology for ranking the elements of water-supply networks
-
DOI 10.1061/(ASCE)1076-0342(2006)12:4(230)
-
Michaud, D. Apostolakis, G. 2006, Methodology for ranking the elements of water- Supply networks, Journal of Infrastructure Systems, 12(4), pp.230-242. (Pubitemid 44768337)
-
(2006)
Journal of Infrastructure Systems
, vol.12
, Issue.4
, pp. 230-242
-
-
Michaud, D.1
Apostolakis, G.E.2
-
29
-
-
33847386386
-
Identification of critical locations across multiple infrastructures for terrorist actions
-
DOI 10.1016/j.ress.2006.08.004, PII S0951832006001840
-
Patterson, S. Apostolakis, G. 2007, Identification of critical locations across multiple infrastructures for terrorist actions, Reliability Engineering & System Safety 92(9), pp. 1183-1203. (Pubitemid 46341795)
-
(2007)
Reliability Engineering and System Safety
, vol.92
, Issue.9
, pp. 1183-1203
-
-
Patterson, S.A.1
Apostolakis, G.E.2
-
30
-
-
3042546359
-
Simulation of the dynamic interactions between terror and anti- Terror organizational structures
-
Raczynski, S. 2004. Simulation of the dynamic interactions between terror and anti- Terror organizational structures. Journal of Artificial Societies and Social Simulation 7, 2.
-
(2004)
Journal of Artificial Societies and Social Simulation
, vol.7
, pp. 2
-
-
Raczynski, S.1
-
35
-
-
61249435399
-
-
ca. 145-ca. 86 B.C. Translated from the Shih chi of Ssu-ma Ch'ien by Burton Watson. New York: Columbia University Press
-
Sima, Qian, ca. 145-ca. 86 B.C. Records of the grand historian of China. Translated from the Shih chi of Ssu-ma Ch'ien by Burton Watson. New York: Columbia University Press, 1971.
-
(1971)
Records of the Grand Historian of China
-
-
Qian, S.1
-
36
-
-
0030304298
-
Contest success functions
-
Skaperdas S. 1996. Contest success functions. Economic Theory 7, 283-290.
-
(1996)
Economic Theory
, vol.7
, pp. 283-290
-
-
Skaperdas, S.1
-
39
-
-
0002782259
-
Efficient rent- seeking
-
Buchanan, J.M., Tollison, R.D., and Tullock, G., Texas A. & M. University Press, College Station
-
Tullock, G. 1980. Efficient Rent- Seeking, in Buchanan, J.M., Tollison, R.D., and Tullock, G., Toward a Theory of the Rent-Seeking Society, Texas A. & M. University Press, College Station, 97-112.
-
(1980)
Toward A Theory of the Rent-Seeking Society
, pp. 97-112
-
-
Tullock, G.1
-
40
-
-
33749454448
-
A dynamical model of terrorism
-
Article ID 85653, doi:10.1155/DDNS/2006/85653.
-
Udwadia, F., Leitmann, G., and Lambertini, L. 2006 A dynamical model of terrorism. Discrete Dynamics in Nature and Society, Article ID 85653, doi:10.1155/DDNS/2006/85653.
-
(2006)
Discrete Dynamics in Nature and Society
-
-
Udwadia, F.1
Leitmann, G.2
Lambertini, L.3
-
41
-
-
38549098290
-
Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
-
DOI 10.1287/opre.1070.0434
-
Zhuang, J. and Bier, V.M. 2007. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attack Effort. Operations Research 55(5), 976-991. (Pubitemid 351159542)
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
42
-
-
79251511489
-
Secrecy and deception at equilibrium, with applications to anti- terrorism resource allocation
-
2011.
-
Zhuang, J. and Bier, V.M. 2011. Secrecy and Deception at Equilibrium, with Applications to Anti- Terrorism Resource Allocation, Defence and Peace Economics, 22(1), 43-61, 2011.
-
(2011)
Defence and Peace Economics
, vol.22
, Issue.1
, pp. 43-61
-
-
Zhuang, J.1
Bier, V.M.2
-
43
-
-
70350704685
-
Modeling secrecy and deception in a multiple- period attacker- period attackerdefender signaling game
-
Zhuang, J., Bier, V.M., and Alagoz, O. 2010. Modeling Secrecy and Deception in a Multiple- Period Attacker- Period AttackerDefender Signaling Game, European Journal of Operational Research, 203(2): 409-418.
-
(2010)
European Journal of Operational Research
, vol.203
, Issue.2
, pp. 409-418
-
-
Zhuang, J.1
Bier, V.M.2
Alagoz, O.3
|