-
1
-
-
34447322230
-
Should we protect commercial airplanes against surface-to-air missile attacks by terrorists?
-
von Winterfeldt D, Sullivan TM. Should we protect commercial airplanes against surface-to-air missile attacks by terrorists? Decision Analysis, 2006; 3(2):63-75.
-
(2006)
Decision Analysis
, vol.3
, Issue.2
, pp. 63-75
-
-
von Winterfeldt, D.1
Sullivan, T.M.2
-
2
-
-
78651314211
-
A decision tree model for evaluating countermeasures to secure cargo at United States southwestern ports of entry
-
Bakir NO. A decision tree model for evaluating countermeasures to secure cargo at United States southwestern ports of entry. Decision Analysis, 2008; 5(4):230-248.
-
(2008)
Decision Analysis
, vol.5
, Issue.4
, pp. 230-248
-
-
Bakir, N.O.1
-
3
-
-
78651269932
-
Is screening cargo containers for smuggled nuclear threats worthwhile?
-
Merrick JRW, McLay LA. Is screening cargo containers for smuggled nuclear threats worthwhile? Decision Analysis, 2010; 7(2):155-171.
-
(2010)
Decision Analysis
, vol.7
, Issue.2
, pp. 155-171
-
-
Merrick, J.R.W.1
McLay, L.A.2
-
5
-
-
78649800959
-
Game-theoretic and reliability methods in counter-terrorism and security
-
in Wilson A, Limnios N, Keller-McNulty S, Armijo Y (eds). Singapore World Scientific
-
Bier VM. Game-theoretic and reliability methods in counter-terrorism and security. Pp. 17-28 in Wilson A, Limnios N, Keller-McNulty S, Armijo Y (eds). Mathematical and Statistical Methods in Reliability, Series on Quality, Reliability, and Engineering Statistics. Singapore World Scientific, 2005.
-
(2005)
Mathematical and Statistical Methods in Reliability, Series on Quality, Reliability, and Engineering Statistics
, pp. 17-28
-
-
Bier, V.M.1
-
6
-
-
38549098290
-
Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort
-
Zhuang J, Bier VM. Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort. Operations Research, 2007; 55(5):976-991.
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
7
-
-
34547641190
-
Choosing what to protect: Strategic defensive allocation against an unknown attacker
-
Bier VM, Oliveros S, Samuelson L. Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 2007; 9(4):563-587.
-
(2007)
Journal of Public Economic Theory
, vol.9
, Issue.4
, pp. 563-587
-
-
Bier, V.M.1
Oliveros, S.2
Samuelson, L.3
-
8
-
-
33847259790
-
Subsidies in interdependent security with heterogeneous discount rates
-
Zhuang J, Bier VM, Gupta A. Subsidies in interdependent security with heterogeneous discount rates. Engineering Economist, 2007; 52(1):1-19.
-
(2007)
Engineering Economist
, vol.52
, Issue.1
, pp. 1-19
-
-
Zhuang, J.1
Bier, V.M.2
Gupta, A.3
-
9
-
-
33847360123
-
Methodology for identifying near-optimal interdiction strategies for a power transmission system
-
Bier VM, Gratz ER, Haphuriwat NJ, Magua W, Wierzbicki KR. Methodology for identifying near-optimal interdiction strategies for a power transmission system. Reliability Engineering & System Safety, 2007; 92:1155-1161.
-
(2007)
Reliability Engineering & System Safety
, vol.92
, pp. 1155-1161
-
-
Bier, V.M.1
Gratz, E.R.2
Haphuriwat, N.J.3
Magua, W.4
Wierzbicki, K.R.5
-
11
-
-
0005001185
-
Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures
-
Paté-Cornell ME, Guikema S. Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures. Military Operations Research, 2002; 7(4):5-20.
-
(2002)
Military Operations Research
, vol.7
, Issue.4
, pp. 5-20
-
-
Paté-Cornell, M.E.1
Guikema, S.2
-
12
-
-
73649115679
-
Intelligent adversary risk analysis: A bioterrorism risk management model
-
Parnell GS, Smith CM, Moxley FI. Intelligent adversary risk analysis: A bioterrorism risk management model. Risk Analysis, 2010; 30(1):32-48.
-
(2010)
Risk Analysis
, vol.30
, Issue.1
, pp. 32-48
-
-
Parnell, G.S.1
Smith, C.M.2
Moxley, F.I.3
-
14
-
-
77950821955
-
Probabilistic risk analysis and terrorism
-
Ezell BC, Bennett SP, von Winterfeldt D, Sokolowski J, Collins AJ. Probabilistic risk analysis and terrorism. Risk Analysis, 2010; 30(4):575-589.
-
(2010)
Risk Analysis
, vol.30
, Issue.4
, pp. 575-589
-
-
Ezell, B.C.1
Bennett, S.P.2
von Winterfeldt, D.3
Sokolowski, J.4
Collins, A.J.5
-
16
-
-
78651285026
-
Al Qaeda "was making dirty bomb."
-
Gardner F. Al Qaeda "was making dirty bomb." BBC News Online, 2003.
-
(2003)
BBC News Online
-
-
Gardner, F.1
-
18
-
-
84889967883
-
Game theory and risk analysis in the context of the smallpox threat
-
in Wilson A, Wilson G, Olwell, D (eds). New York Springer
-
Banks D, Anderson S. Game theory and risk analysis in the context of the smallpox threat. Pp. 9-22 in Wilson A, Wilson G, Olwell, D (eds). Statistical Methods in Counterterrorism. New York Springer, 2006.
-
(2006)
Statistical Methods in Counterterrorism
, pp. 9-22
-
-
Banks, D.1
Anderson, S.2
-
20
-
-
0000351891
-
The reliability of subjective probabilities obtained through decomposition
-
Ravinder HV, Kleinmuntz DN, Dyer J. The reliability of subjective probabilities obtained through decomposition. Management Science, 1988; 34(2):186-199.
-
(1988)
Management Science
, vol.34
, Issue.2
, pp. 186-199
-
-
Ravinder, H.V.1
Kleinmuntz, D.N.2
Dyer, J.3
-
21
-
-
0001152402
-
Knowledge maps
-
Howard RA. Knowledge maps. Management Science, 1989; 35(8):903-922.
-
(1989)
Management Science
, vol.35
, Issue.8
, pp. 903-922
-
-
Howard, R.A.1
-
22
-
-
84855352605
-
Eliciting subjective probabilities and correcting for biases from individuals
-
in Cochran J (ed). New York John Wiley & Sons
-
Mihajlovits BH, Merrick JRW. Eliciting subjective probabilities and correcting for biases from individuals. Pp. 1-13 in Cochran J (ed). Wiley Encyclopedia of Operations Research and Management Science. New York John Wiley & Sons, 2011.
-
(2011)
Wiley Encyclopedia of Operations Research and Management Science
, pp. 1-13
-
-
Mihajlovits, B.H.1
Merrick, J.R.W.2
|