-
1
-
-
33947146473
-
Optimal resource allocation for security in reliability systems
-
DOI 10.1016/j.ejor.2006.03.057, PII S0377221706004747
-
Azaiez,N. and Bier, V.M. (2007) Optimal resource allocation for security in reliability systems. European Journal of Operational Research, 181, 773-786. (Pubitemid 46413583)
-
(2007)
European Journal of Operational Research
, vol.181
, Issue.2
, pp. 773-786
-
-
Azaiez, M.N.1
Bier, V.M.2
-
2
-
-
77249147433
-
Securing the containerized supply chain: Analysis of government incentives for private investment
-
Bakshi, N. and Gans, N. (2010) Securing the containerized supply chain: Analysis of government incentives for private investment. Management Science, 56(2), 219-233.
-
(2010)
Management Science
, vol.56
, Issue.2
, pp. 219-233
-
-
Bakshi, N.1
Gans, N.2
-
3
-
-
79955750542
-
The interplay between preemptive and defensive counterterrorism measures: A two-stage game
-
Bandyopadhyay, S. and Sandler, T. (2011) The interplay between preemptive and defensive counterterrorism measures: A two-stage game. Economica, 78(311), 546-564.
-
(2011)
Economica
, vol.78
, Issue.311
, pp. 546-564
-
-
Bandyopadhyay, S.1
Sandler, T.2
-
4
-
-
33645877390
-
The timing of ETA terrorist attacks
-
DOI 10.1016/j.jpolmod.2005.12.001, PII S0161893806000032
-
Barros, C.P., Passos, J. and Gil-Alana, L.A. (2006) The timing of ETA terrorist attacks. Journal of Policy Modeling, 28(3), 335-346. (Pubitemid 43573913)
-
(2006)
Journal of Policy Modeling
, vol.28
, Issue.3
, pp. 335-346
-
-
Barros, C.P.1
Passos, J.2
Gil-Alana, L.A.3
-
5
-
-
33750490397
-
Location of terror response facilities: A game between state and terrorist
-
DOI 10.1016/j.ejor.2005.12.022, PII S0377221705009409
-
Berman, O. and Gavious, A. (2007) Location of terror response facilities: A game between state and terrorist. European Journal of Operational Research, 177(2), 1113-1133. (Pubitemid 44647639)
-
(2006)
European Journal of Operational Research
, vol.177
, Issue.2
, pp. 1113-1133
-
-
Berman, O.1
Gavious, A.2
-
6
-
-
33947206094
-
How does terrorism risk vary across space and time? An analysis based on the Israeli experience
-
Berrebi, C. and Lakdawalla, D. (2007) How does terrorism risk vary across space and time? An analysis based on the Israeli experience. Defence and Peace Economics, 18(2), 113-131.
-
(2007)
Defence and Peace Economics
, vol.18
, Issue.2
, pp. 113-131
-
-
Berrebi, C.1
Lakdawalla, D.2
-
8
-
-
45349092442
-
Optimal resource allocation for defense of targets based on differing measures of attractiveness
-
DOI 10.1111/j.1539-6924.2008.01053.x
-
Bier, V.M., Haphuriwat, N., Menoyo, J., Zimmerman, R. and Culpen, A. (2008) Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis, 28(3), 763-770. (Pubitemid 351847236)
-
(2008)
Risk Analysis
, vol.28
, Issue.3
, pp. 763-770
-
-
Bier, V.M.1
Haphuriwat, N.2
Menoyo, J.3
Zimmerman, R.4
Culpen, A.M.5
-
9
-
-
9444279581
-
Protection of simple series and parallel systems with components of different values
-
Bier, V.M., Nagaraj, A. and Abhichandani, V. (2005) Protection of simple series and parallel systems with components of different values. Reliability Engineering and System Safety, 87, 315-323.
-
(2005)
Reliability Engineering and System Safety
, vol.87
, pp. 315-323
-
-
Bier, V.M.1
Nagaraj, A.2
Abhichandani, V.3
-
10
-
-
34547641190
-
Choosing what to protect: Strategic defensive allocation against an unknown attacker
-
Bier, V.M., Oliveros, S. and Samuelson, L. (2007) Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9, 563-587.
-
(2007)
Journal of Public Economic Theory
, vol.9
, pp. 563-587
-
-
Bier, V.M.1
Oliveros, S.2
Samuelson, L.3
-
11
-
-
33845439386
-
Defending critical infrastructure
-
DOI 10.1287/inte.1060.0252
-
Brown, G., Carlyle, M., Salmeron, J. and Wood, K. (2006) Defending critical infrastructure. Interfaces, 36, 530-544. (Pubitemid 44905062)
-
(2006)
Interfaces
, vol.36
, Issue.6
, pp. 530-544
-
-
Brown, G.1
Carlyle, M.2
Salmeron, J.3
Wood, K.4
-
12
-
-
78650892231
-
A strategic analysis of the war against transnational terrorism
-
Ćarceles-Poveda, E. and Tauman, Y. (2011) A strategic analysis of the war against transnational terrorism. Games and Economic Behavior, 71(1), 49-65.
-
(2011)
Games and Economic Behavior
, vol.71
, Issue.1
, pp. 49-65
-
-
Ćarceles-Poveda, E.1
Tauman, Y.2
-
13
-
-
64549092443
-
Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
-
Dighe, N., Zhuang, J. and Bier, V.M. (2009) Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering, 5(1), 31-43.
-
(2009)
International Journal of Performability Engineering
, vol.5
, Issue.1
, pp. 31-43
-
-
Dighe, N.1
Zhuang, J.2
Bier, V.M.3
-
14
-
-
33744504907
-
The effectiveness of anti-terrorism policies: A vector-Autoregression- intervention analysis
-
Enders, W. and Sandler, T. (1993) The effectiveness of anti-terrorism policies: A vector-Autoregression-intervention analysis. American Political Science Review, 87(4), 829-844.
-
(1993)
American Political Science Review
, vol.87
, Issue.4
, pp. 829-844
-
-
Enders, W.1
Sandler, T.2
-
15
-
-
0041771284
-
What do we know about the substitution effect in transnational terrorism? In
-
A. Silke, editor. Frank Cass, London
-
Enders, W. and Sandler, T. (2004) What do we know about the substitution effect in transnational terrorism? In Research on terrorism: Trends, achievements and failures, A. Silke, editor. Frank Cass, London.
-
(2004)
Research on terrorism: Trends, achievements and failures
-
-
Enders, W.1
Sandler, T.2
-
16
-
-
16644364092
-
After 9/11 IS IT all different now?
-
DOI 10.1177/0022002704272864, Political Economy of Transnational Terrorism
-
Enders,W. and Sandler, T. (2005) After 9/11 is it all different now? Journal of Conflict Resolution, 49(2), 259-277. (Pubitemid 40482842)
-
(2005)
Journal of Conflict Resolution
, vol.49
, Issue.2
, pp. 259-277
-
-
Enders, W.1
Sandler, T.2
-
17
-
-
55649083124
-
Terror and counterterror operations: Differential game with cyclical Nash solution
-
Feichtinger, G. and Novak, A. (2008) Terror and counterterror operations: differential game with cyclical Nash solution. Journal of Optimization Theory and Applications, 139(3), 541-556.
-
(2008)
Journal of Optimization Theory and Applications
, vol.139
, Issue.3
, pp. 541-556
-
-
Feichtinger, G.1
Novak, A.2
-
19
-
-
33751256271
-
Income, interdependence, and substitution effects affecting incentives for security investment
-
DOI 10.1016/j.jaccpubpol.2006.09.001, PII S027842540600086X
-
Hausken, K. (2006) Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy, 25, 629-665. (Pubitemid 44783207)
-
(2006)
Journal of Accounting and Public Policy
, vol.25
, Issue.6
, pp. 629-665
-
-
Hausken, K.1
-
20
-
-
55349145945
-
Whether to attack a terrorist's resource stock today or tomorrow
-
Hausken, K. (2008) Whether to attack a terrorist's resource stock today or tomorrow. Games and Economic Behavior, 64(2), 548-564.
-
(2008)
Games and Economic Behavior
, vol.64
, Issue.2
, pp. 548-564
-
-
Hausken, K.1
-
21
-
-
84954516300
-
Defending against terrorism, natural disaster, and all hazards. In
-
V.M. Bier and M.N. Azaiez, editors. Springer, New York
-
Hausken, K., Bier, V. and Zhuang, J. (2009) Defending against terrorism, natural disaster, and all hazards. In Game theoretic risk analysis of security threats, V.M. Bier and M.N. Azaiez, editors. Springer, New York.
-
(2009)
Game Theoretic Risk Analysis of Security Threats
-
-
Hausken, K.1
Bier, V.2
Zhuang, J.3
-
22
-
-
80052018326
-
Defending against a terrorist who accumulates resources
-
Hausken, K. and Zhuang, J. (2011a) Defending against a terrorist who accumulates resources. Military Operations Research, 16(1), 21-39.
-
(2011)
Military Operations Research
, vol.16
, Issue.1
, pp. 21-39
-
-
Hausken, K.1
Zhuang, J.2
-
23
-
-
79952852737
-
Governments' and terrorists' defense and attack in a T-period game
-
Hausken, K. and Zhuang, J. (2011b) Governments' and terrorists' defense and attack in a T-period game. Decision Analysis, 8(1), 46-70.
-
(2011)
Decision Analysis
, vol.8
, Issue.1
, pp. 46-70
-
-
Hausken, K.1
Zhuang, J.2
-
25
-
-
34047142655
-
Optimal defense strategy against intentional attacks
-
Levitin, G. (2007) Optimal defense strategy against intentional attacks. IEEE Transactions on Reliability, 56(1), 148-156.
-
(2007)
IEEE Transactions on Reliability
, vol.56
, Issue.1
, pp. 148-156
-
-
Levitin, G.1
-
26
-
-
43249094557
-
Protection vs. redundancy in homogeneous parallel systems
-
Levitin, G. and Hausken, K. (2008) Protection vs. redundancy in homogeneous parallel systems. Reliability Engineering & System Safety, 93(10), 1444-1451.
-
(2008)
Reliability Engineering & System Safety
, vol.93
, Issue.10
, pp. 1444-1451
-
-
Levitin, G.1
Hausken, K.2
-
27
-
-
33751078297
-
Methodology for ranking the elements of water-supply networks
-
DOI 10.1061/(ASCE)1076-0342(2006)12:4(230)
-
Michaud, D. and Apostolakis, G. (2006) Methodology for ranking the elements of water-supply networks. Journal of Infrastructure Systems, 12(4), 230-242. (Pubitemid 44768337)
-
(2006)
Journal of Infrastructure Systems
, vol.12
, Issue.4
, pp. 230-242
-
-
Michaud, D.1
Apostolakis, G.E.2
-
28
-
-
33846275533
-
The efficiency/security trade-off in criminal networks
-
Morselli, C., Giguere, C. and Petit, K. (2007) The efficiency/security trade-off in criminal networks. Social Networks, 29, 143-153.
-
(2007)
Social Networks
, vol.29
, pp. 143-153
-
-
Morselli, C.1
Giguere, C.2
Petit, K.3
-
29
-
-
33847386386
-
Identification of critical locations across multiple infrastructures for terrorist actions
-
DOI 10.1016/j.ress.2006.08.004, PII S0951832006001840
-
Patterson, S. and Apostolakis, G. (2007) Identification of critical locations across multiple infrastructures for terrorist actions. Reliability Engineering & System Safety, 92(9), 1183-1203. (Pubitemid 46341795)
-
(2007)
Reliability Engineering and System Safety
, vol.92
, Issue.9
, pp. 1183-1203
-
-
Patterson, S.A.1
Apostolakis, G.E.2
-
30
-
-
38549176250
-
An analysis of short-term responses to threats of terrorism
-
DOI 10.1287/mnsc.1060.0665
-
Pinker, E.J. (2007) An analysis of short-term responses to threats of terrorism. Management Science, 53(6), 865-880. (Pubitemid 351159620)
-
(2007)
Management Science
, vol.53
, Issue.6
, pp. 865-880
-
-
Pinker, E.J.1
-
31
-
-
3042546359
-
Simulation of the dynamic interactions between terror and antiterror organizational structures
-
Available online at
-
Raczynski, S. (2004) Simulation of the dynamic interactions between terror and antiterror organizational structures. Journal of Artificial Societies and Social Simulation, 7(2). Available online at http://jasss.soc.surrey.ac.uk/ 7/2/8.html
-
(2004)
Journal of Artificial Societies and Social Simulation
, vol.7
, Issue.2
-
-
Raczynski, S.1
-
32
-
-
33750462334
-
Global terrorism: Deterrence versus pre-emption
-
DOI 10.1111/j.1540-5982.2006.00393.x
-
Sandler, T. and Siqueira, K. (2006) Global terrorism: deterrence versus pre-emption. Canadian Journal of Economics, 39(4), 1370-1387. (Pubitemid 44650490)
-
(2006)
Canadian Journal of Economics
, vol.39
, Issue.4
, pp. 1370-1387
-
-
Sandler, T.1
Siqueira, K.2
-
34
-
-
0030304298
-
Contest success functions
-
Skaperdas, S. (1996) Contest success functions. Economic Theory, 7, 283-290.
-
(1996)
Economic Theory
, vol.7
, pp. 283-290
-
-
Skaperdas, S.1
-
35
-
-
32544460078
-
Are global terrorist attacks time-correlated?
-
DOI 10.1016/j.physa.2005.08.030, PII S0378437105008204
-
Telesca, L. and Lovallo,M. (2006) Are global terrorist attacks time-correlated? Physica A - Statistical Mechanics and Its Applications, 362(2), 480-484. (Pubitemid 43234070)
-
(2006)
Physica A: Statistical Mechanics and its Applications
, vol.362
, Issue.2
, pp. 480-484
-
-
Telesca, L.1
Lovallo, M.2
-
36
-
-
33745577728
-
Defense R&D in the anti-terrorism era
-
Trajtenberg, M. (2006) Defense R&D in the anti-terrorism era. Defence and Peace Economics, 17(3), 177-199.
-
(2006)
Defence and Peace Economics
, vol.17
, Issue.3
, pp. 177-199
-
-
Trajtenberg, M.1
-
37
-
-
0002782259
-
Efficient rent-seeking. In
-
J.M. Buchanan, R.D. Tollison and G. Tullock, editors. Texas A&M University Press, College Station, EX
-
Tullock,G. (1980) Efficient rent-seeking. In Toward a theory of the rent-seeking society, J.M. Buchanan, R.D. Tollison and G. Tullock, editors. Texas A&M University Press, College Station, EX.
-
(1980)
Toward a theory of the rent-seeking society
-
-
Tullock, G.1
-
38
-
-
33749454448
-
A dynamical model of terrorism
-
doi:10.1155/DDNS/2006/85653, Available online at
-
Udwadia, F., Leitmann, G. and Lambertini, L. (2006) A dynamical model of terrorism. Discrete Dynamics in Nature and Society, doi:10.1155/DDNS/2006/85653. Available online at http://www.hindawi.com/journals/ddns/2006/085653/abs/
-
(2006)
Discrete Dynamics in Nature and Society
-
-
Udwadia, F.1
Leitmann, G.2
Lambertini, L.3
-
39
-
-
38549098290
-
Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
-
DOI 10.1287/opre.1070.0434
-
Available online at http://www.hindawi.com/journals/ddns/2006/085653/ abs/ Zhuang, J. and Bier, V.M. (2007) Balancing terrorism and natural disasters- defensive strategy with endogenous attack effort. Operations Research, 55(5), 976-991. (Pubitemid 351159542)
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
40
-
-
79251511489
-
Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation
-
Zhuang, J. and Bier, V.M. (2011) Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation. Defence and Peace Economics, 22(1), 43-61.
-
(2011)
Defence and Peace Economics
, vol.22
, Issue.1
, pp. 43-61
-
-
Zhuang, J.1
Bier, V.M.2
-
41
-
-
70350704685
-
Modeling secrecy and deception in a multiple-period attacker-defender signaling game
-
Zhuang, J., Bier, V.M. and Alagoz, O. (2010) Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 203(2), 409-418.
-
(2010)
European Journal of Operational Research
, vol.203
, Issue.2
, pp. 409-418
-
-
Zhuang, J.1
Bier, V.M.2
Alagoz, O.3
|