-
1
-
-
85038476145
-
Risk analysis and intelligence communities collaborative framework
-
Arlington, VA. Accessed September 2011
-
Baker, J., M. Wool, A. Smith, J. Kahan, C. Ansel, P. Hammar, D. McGarvey, M. Phillips, R. Lark. 2009. Risk analysis and intelligence communities collaborative framework. Report, Homeland Security Institute, Arlington, VA. Accessed September 16, 2011, http://www.homelandsecurity.org/hsireports/Risk- Intel%20Collaboration%20Final%20Report.pdf.
-
(2009)
Report, Homeland Security Institute
, vol.16
-
-
Baker, J.1
Wool, M.2
Smith, A.3
Kahan, J.4
Ansel, C.5
Hammar, P.6
McGarvey, D.7
Phillips, M.8
Lark, R.9
-
2
-
-
11844260777
-
Balanced scorecard method for predicting the probability of a terrorist attack
-
Risk Analysis IV
-
Beitel, G. A., D. I. Gertman, M. M. Plum. 2004. Balanced scorecard method for predicting the probability of a terrorist attack. C. A. Brebbia, ed. Risk Analysis IV. WIT Press, Southampton, UK, 581-592. (Pubitemid 40087062)
-
(2004)
Management Information Systems
, vol.9
, pp. 581-592
-
-
Beitel, G.A.1
Gertman, D.I.2
Plum, M.M.3
-
3
-
-
34447325155
-
Choosing what to protect
-
DOI 10.1111/j.1539-6924.2007.00906.x
-
Bier, V. M. 2007. Choosing what to protect. Risk Anal. 27(3) 607-620. (Pubitemid 47063172)
-
(2007)
Risk Analysis
, vol.27
, Issue.3
, pp. 607-620
-
-
Bier, V.M.1
-
4
-
-
34547641190
-
Choosing what to protect: Strategic defensive allocation against an unknown attacker
-
Bier, V. M., S. Oliveros, L. Samuelson. 2007. Choosing what to protect: Strategic defensive allocation against an unknown attacker. J. Public Econom. Theory 9(4) 563-587.
-
(2007)
J. Public Econom. Theory
, vol.9
, Issue.4
, pp. 563-587
-
-
Bier, V.M.1
Oliveros, S.2
Samuelson, L.3
-
5
-
-
45349092442
-
Optimal resource allocation for defense of targets based on differing measures of attractiveness
-
DOI 10.1111/j.1539-6924.2008.01053.x
-
Bier, V. M., N. Haphuriwat, J. Menoyo, R. Zimmerman, A. M. Culpen. 2008. Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Anal. 28(3) 763-770. (Pubitemid 351847236)
-
(2008)
Risk Analysis
, vol.28
, Issue.3
, pp. 763-770
-
-
Bier, V.M.1
Haphuriwat, N.2
Menoyo, J.3
Zimmerman, R.4
Culpen, A.M.5
-
6
-
-
84926981926
-
-
Cambridge University Press, New York
-
Bracken, P., I. Bremmer, D. Gordon, eds. 2008. Managing Strategic Surprise, Lessons from Risk Management and Risk Assessment. Cambridge University Press, New York.
-
(2008)
Managing Strategic Surprise, Lessons from Risk Management and Risk Assessment
-
-
Bracken, P.1
Bremmer, I.2
Gordon, D.3
-
7
-
-
33845439386
-
Defending critical infrastructure
-
DOI 10.1287/inte.1060.0252
-
Brown, G., C. Matthew, J. Salmeron, K. Wood. 2006. Defending critical infrastructure. Interfaces 36(6) 530-544. (Pubitemid 44905062)
-
(2006)
Interfaces
, vol.36
, Issue.6
, pp. 530-544
-
-
Brown, G.1
Carlyle, M.2
Salmeron, J.3
Wood, K.4
-
8
-
-
38549157823
-
The economics of homeland security expenditures: Foundational expected cost-effectiveness approaches
-
Farrow, S. 2008. The economics of homeland security expenditures: Foundational expected cost-effectiveness approaches. Contemporary Econom. Policy 25(1) 14-26.
-
(2008)
Contemporary Econom. Policy
, vol.25
, Issue.1
, pp. 14-26
-
-
Farrow, S.1
-
9
-
-
84954529870
-
Game theory models of intelligent actors in reliability analysis: An overview of the state of the art
-
V. M. Bier, M. N. Azaiez, eds., Springer, New York
-
Guikema, S. D. 2009. Game theory models of intelligent actors in reliability analysis: An overview of the state of the art. V. M. Bier, M. N. Azaiez, eds. Game Theoretic Risk Analysis of Security Threats. Springer, New York, 13-32.
-
(2009)
Game Theoretic Risk Analysis of Security Threats
, pp. 13-32
-
-
Guikema, S.D.1
-
11
-
-
60649102048
-
Dynamic Bayesian network for predicting the likelihood of a terrorist attack at critical transportation infrastructure facilities
-
Jha, M. K. 2009. Dynamic Bayesian network for predicting the likelihood of a terrorist attack at critical transportation infrastructure facilities. J. Infrastructure Systems 15(1) 31-39.
-
(2009)
J. Infrastructure Systems
, vol.15
, Issue.1
, pp. 31-39
-
-
Jha, M.K.1
-
13
-
-
33749589535
-
Advanced techniques for modeling terrorism risk
-
Major, J. 2002. Advanced techniques for modeling terrorism risk. J. Risk Finance 4(1) 15-24.
-
(2002)
J. Risk Finance
, vol.4
, Issue.1
, pp. 15-24
-
-
Major, J.1
-
14
-
-
34547479862
-
Defending against terrorist attacks with limited resources
-
Powell, R. 2007a. Defending against terrorist attacks with limited resources. Amer. Political Sci. Rev. 101(3) 527-541.
-
(2007)
Amer. Political Sci. Rev.
, vol.101
, Issue.3
, pp. 527-541
-
-
Powell, R.1
-
15
-
-
36049023055
-
Allocating defensive resources with private information about vulnerability
-
Powell, R. 2007b. Allocating defensive resources with private information about vulnerability. Amer. Political Sci. Rev. 101(4) 799-809.
-
(2007)
Amer. Political Sci. Rev.
, vol.101
, Issue.4
, pp. 799-809
-
-
Powell, R.1
-
16
-
-
84877870467
-
Decision analysis by proxy for the rational terrorist
-
TEAMCORE Research Group, University of Southern California, Los Angeles. Accessed September 16, 2011
-
Rosoff, H., R. John. 2009. Decision analysis by proxy for the rational terrorist. Proc. Internat. Joint Conf. Artificial Intelligence (IJCAI-09), Workshop on Quant. Risk Anal. Security Appl., TEAMCORE Research Group, University of Southern California, Los Angeles. Accessed September 16, 2011, http://teamcore.usc.edu/QRASA-09/SubmissionsFinal/Paper-4.pdf.
-
(2009)
Proc. Internat. Joint Conf. Artificial Intelligence (IJCAI-09), Workshop on Quant. Risk Anal. Security Appl
-
-
Rosoff, H.1
John, R.2
-
17
-
-
63449108250
-
Games and terrorism: Recent developments
-
Sandler, T., K. Siqueira. 2009. Games and terrorism: Recent developments. Simulation and Gaming 40(2) 164-192.
-
(2009)
Simulation and Gaming
, vol.40
, Issue.2
, pp. 164-192
-
-
Sandler, T.1
Siqueira, K.2
-
18
-
-
0034179713
-
Nested partitions method for global optimization
-
Shi, L., S. Ólafsson. 2000. Nested partitions method for global optimization. Oper. Res. 48(3) 390-407. (Pubitemid 32415966)
-
(2000)
Operations Research
, vol.48
, Issue.3
, pp. 390-407
-
-
Shi, L.1
Olafsson, S.2
-
19
-
-
33750558925
-
Terrorists versus the government: Strategic interaction, support, and sponsorship
-
Siqueira, K., T. Sandler. 2006. Terrorists versus the government: Strategic interaction, support, and sponsorship. J. Conflict Resolution 50(6) 1-21.
-
(2006)
J. Conflict Resolution
, vol.50
, Issue.6
, pp. 1-21
-
-
Siqueira, K.1
Sandler, T.2
-
20
-
-
85038471161
-
Apollo: An analytical tool for predicting a subject's decision making
-
MITRE Corporation, McLean, VA. Accessed September 16, 2011
-
Sticha, P. J., D. Buede, R. L. Rees. 2005. Apollo: An analytical tool for predicting a subject's decision making. Proc. Internat. Conf. Intelligence Anal. (IA-05), MITRE Corporation, McLean, VA. Accessed September 16, 2011, http://analysis.mitre.org/proceedings/Final-Papers-Files/143-Camera-Ready-Paper. pdf.
-
(2005)
Proc. Internat. Conf. Intelligence Anal. (IA-05)
-
-
Sticha, P.J.1
Buede, D.2
Rees, R.L.3
-
21
-
-
79951923270
-
-
U.S. Department of Homeland Security, Report, U.S. Department of Homeland Security, Washington, DC. Accessed September 16, 2011
-
U.S. Department of Homeland Security. 2009. Homeland Security grant program overview. Report, U.S. Department of Homeland Security, Washington, DC. Accessed September 16, 2011, http://www.dhs.gov/xlibrary/assets/grant-program- overview-fy2009.pdf.
-
(2009)
Homeland Security Grant Program Overview
-
-
-
22
-
-
0011450426
-
-
U.S. Department of Homeland Security., Report, U.S. Department of Homeland Security, Washington, DC. Accessed September 16, 2011
-
U.S. Department of Homeland Security. 2002. National strategy for homeland security. Report, U.S. Department of Homeland Security, Washington, DC. Accessed September 16, 2011, http://www.dhs.gov/xlibrary/assets/nat-strat-hls. pdf.
-
(2002)
National Strategy for Homeland Security
-
-
-
23
-
-
34247121489
-
-
RAND Corporation, Santa Monica, CA. Accessed September 16, 2011
-
Willis, H. H., A. R. Morral, T. K. Kelly, J. J. Medby. 2005. Estimating Terrorism Risk. RAND Corporation, Santa Monica, CA. Accessed September 16, 2011, http://www.rand.org/pubs/ monographs/2005/RAND-MG388.pdf.
-
(2005)
Estimating Terrorism Risk
-
-
Willis, H.H.1
Morral, A.R.2
Kelly, T.K.3
Medby, J.J.4
-
24
-
-
70449714332
-
Using risk analysis to inform intelligence analysis
-
RAND Corporation, Santa Monica, CA. Accessed September 16, 2011
-
Willis, H. H. 2007. Using risk analysis to inform intelligence analysis. Working paper, RAND Corporation, Santa Monica, CA. Accessed September 16, 2011, http://www.rand.org/pubs/working-papers/2007/RAND-WR464.pdf.
-
(2007)
Working Paper
-
-
Willis, H.H.1
-
25
-
-
38549098290
-
Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
-
DOI 10.1287/opre.1070.0434
-
Zhuang, J., V. M. Bier. 2007. Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort. Oper. Res. 55(5) 976-991. (Pubitemid 351159542)
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
26
-
-
70350704685
-
Modeling secrecy and deception in a multiple-period attacker-defender signaling game
-
Zhuang, J., V. M. Bier, O. Alagoz. 2010. Modeling secrecy and deception in a multiple-period attacker-defender signaling game. Eur. J. Oper. Res. 203(2) 409-418.
-
(2010)
Eur. J. Oper. Res.
, vol.203
, Issue.2
, pp. 409-418
-
-
Zhuang, J.1
Bier, V.M.2
Alagoz, O.3
|