-
1
-
-
84893926205
-
-
AmCham EU, American Chamber of Commerce to the European Union, December 6th 2007
-
AmCham EU (2007) Comments on the US Legislation to require 100% container scanning. American Chamber of Commerce to the European Union, December 6th 2007 (www. amchameu. eu).
-
(2007)
Comments on the US Legislation to require 100% container scanning
-
-
-
2
-
-
33947146473
-
Optimal resource allocation for security in reliability systems
-
Azaiez M, Bier V (2007) Optimal resource allocation for security in reliability systems. Eur J Oper Res 181: 773-786.
-
(2007)
Eur J Oper Res
, vol.181
, pp. 773-786
-
-
Azaiez, M.1
Bier, V.2
-
3
-
-
77249147433
-
Securing the containerized supply chain: Analysis of government incentives for private investment
-
Bakshi N, Gans N (2010) Securing the containerized supply chain: analysis of government incentives for private investment. Manage Sci 56(2): 219-233.
-
(2010)
Manage Sci
, vol.56
, Issue.2
, pp. 219-233
-
-
Bakshi, N.1
Gans, N.2
-
4
-
-
33748519601
-
Hiding in plain sight-using signals to detect terrorists
-
Basuchoudhary A, Razzolini L (2006) Hiding in plain sight-using signals to detect terrorists. Public Choice 128: 245-255.
-
(2006)
Public Choice
, vol.128
, pp. 245-255
-
-
Basuchoudhary, A.1
Razzolini, L.2
-
5
-
-
52449134341
-
Game-theoretic and reliability methods in counterterrorism and security
-
In: Wilson AG, Wilson GD, Olwell DH (eds) (2006), Springer
-
Bier VM (2006) Game-theoretic and reliability methods in counterterrorism and security. In: Wilson AG, Wilson GD, Olwell DH (eds) (2006) Statistical methods in counterterrorism. Springer.
-
(2006)
Statistical methods in counterterrorism
-
-
Bier, V.M.1
-
6
-
-
9444279581
-
Protection of simple series and parallel systems with components of different values
-
Bier VM, Nagaraj A, Abhichandani V (2005) Protection of simple series and parallel systems with components of different values. Reliab Eng Syst Saf 87: 315-323.
-
(2005)
Reliab Eng Syst Saf
, vol.87
, pp. 315-323
-
-
Bier, V.M.1
Nagaraj, A.2
Abhichandani, V.3
-
7
-
-
34547641190
-
Choosing what to protect: Strategic defensive allocation against an unknown attacker
-
Bier V, Oliveros S, Samuelson L (2007) Choosing what to protect: strategic defensive allocation against an unknown attacker. J Public Econ Theory 9(4): 563-587.
-
(2007)
J Public Econ Theory
, vol.9
, Issue.4
, pp. 563-587
-
-
Bier, V.1
Oliveros, S.2
Samuelson, L.3
-
9
-
-
77952582043
-
-
The International Bank for Reconstruction and Development/The World
-
Donner M, Kruk C (2009) Supply chain security guide. The International Bank for Reconstruction and Development/The World.
-
(2009)
Supply chain security guide
-
-
Donner, M.1
Kruk, C.2
-
10
-
-
84868524529
-
-
European Commission Staff Working Paper, Brussels, 11. 2. 2010, SEC(2010) 131 final
-
Bank EC (2010) Secure trade and 100% scanning of containers. European Commission Staff Working Paper, Brussels, 11. 2. 2010, SEC(2010) 131 final.
-
(2010)
Secure trade and 100% scanning of containers
-
-
Bank, E.C.1
-
11
-
-
84893972737
-
-
Proceedings of IAME 2009 Conference, June 24-26, Copenhagen, Denmark
-
Gkonis KG, Psaraftis HN, Ventikos NP (2009) Game theory contributions to terrorism in merchant shipping: an application to port security. Proceedings of IAME 2009 Conference, June 24-26, Copenhagen, Denmark.
-
(2009)
Game theory contributions to terrorism in merchant shipping: An application to port security
-
-
Gkonis, K.G.1
Psaraftis, H.N.2
Ventikos, N.P.3
-
12
-
-
84893981737
-
-
Proceedings of IAME 2010 Conference, July 7-9, Lisbon, Portugal
-
Gkonis KG, Psaraftis HN, Ventikos NP (2010) Modelling security aspects of merchant shipping: a piracy setting, Proceedings of IAME 2010 Conference, July 7-9, Lisbon, Portugal.
-
(2010)
Modelling security aspects of merchant shipping: A piracy setting
-
-
Gkonis, K.G.1
Psaraftis, H.N.2
Ventikos, N.P.3
-
13
-
-
16644390753
-
IDS models of airline security
-
Heal G, Kunreuther H (2005) IDS models of airline security. J Confl Resolut 49(2): 201-217.
-
(2005)
J Confl Resolut
, vol.49
, Issue.2
, pp. 201-217
-
-
Heal, G.1
Kunreuther, H.2
-
14
-
-
0037786763
-
Interdependent security
-
Kunreuther H, Heal G (2003) Interdependent security. J Risk Uncertain 26(2/3): 231-249.
-
(2003)
J Risk Uncertain
, vol.26
, Issue.2-3
, pp. 231-249
-
-
Kunreuther, H.1
Heal, G.2
-
16
-
-
84893945317
-
-
NDIA, National Defense online magazine, March 2009
-
NDIA (2009) Study blasts container scanning process. National Defense online magazine (www. nationaldefensemagazine. org), March 2009.
-
(2009)
Study blasts container scanning process
-
-
-
17
-
-
0000308219
-
The calculus of dissent: An analysis of terrorists' choice of targets
-
Sandler T, Lapan HE (1988) The calculus of dissent: an analysis of terrorists' choice of targets. Synthese 76: 245-261.
-
(1988)
Synthese
, vol.76
, pp. 245-261
-
-
Sandler, T.1
Lapan, H.E.2
-
18
-
-
46649106463
-
Terrorism & game theory
-
Sandler T, Arce D (2003) Terrorism & game theory. Simul Gaming 34(3): 319-337.
-
(2003)
Simul Gaming
, vol.34
, Issue.3
, pp. 319-337
-
-
Sandler, T.1
Arce, D.2
-
19
-
-
33750462334
-
Global terrorism: Deterrence versus pre-emption
-
Sandler T, Siqueira K (2006) Global terrorism: deterrence versus pre-emption. Can J Econ 39(4).
-
(2006)
Can J Econ
, vol.39
, Issue.4
-
-
Sandler, T.1
Siqueira, K.2
-
20
-
-
84893926901
-
-
Security Management magazine online, October 2008
-
Straw J (2008) Outlook for container scanning. Security Management magazine online (www. securitymanagement. com), October 2008.
-
(2008)
Outlook for container scanning
-
-
Straw, J.1
-
21
-
-
33750162923
-
Preventing the importation of illicit nuclear materials in shipping containers
-
Wein L, Wilkins A, Baveja M, Flynn S (2006) Preventing the importation of illicit nuclear materials in shipping containers. Risk Anal 26(5).
-
(2006)
Risk Anal
, vol.26
, Issue.5
-
-
Wein, L.1
Wilkins, A.2
Baveja, M.3
Flynn, S.4
-
22
-
-
38549098290
-
Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
-
Zhuang J, Bier VM (2007) Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Oper Res 55(5): 976-991.
-
(2007)
Oper Res
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
|