-
1
-
-
0005001185
-
Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures
-
Paté-Cornell E, Guikema S. Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures. Military Operations Research, 2002; 7(4):5-23.
-
(2002)
Military Operations Research
, vol.7
, Issue.4
, pp. 5-23
-
-
Paté-Cornell, E.1
Guikema, S.2
-
2
-
-
4544332530
-
Mathematical methods in combatting terrorism
-
Harris B. Mathematical methods in combatting terrorism. Risk Analysis, 2004; 24(4):985-988.
-
(2004)
Risk Analysis
, vol.24
, Issue.4
, pp. 985-988
-
-
Harris, B.1
-
3
-
-
78651314211
-
A decision tree model for evaluating countermeasures to secure cargo at United States southwestern ports of entry
-
Bakir NO. A decision tree model for evaluating countermeasures to secure cargo at United States southwestern ports of entry. Decision Analysis, 2008; 5(4):230-248.
-
(2008)
Decision Analysis
, vol.5
, Issue.4
, pp. 230-248
-
-
Bakir, N.O.1
-
4
-
-
77950821955
-
Probabilistic risk analysis and terrorism risk
-
Ezell BC, Bennett SP, Von Winterfeldt D, Sokolowski J, Collins AJ. Probabilistic risk analysis and terrorism risk. Risk Analysis, 2010; 30(4):575-589.
-
(2010)
Risk Analysis
, vol.30
, Issue.4
, pp. 575-589
-
-
Ezell, B.C.1
Bennett, S.P.2
Von Winterfeldt, D.3
Sokolowski, J.4
Collins, A.J.5
-
6
-
-
73649115679
-
Intelligent adversary risk analysis: A bioterrorism risk management model
-
Parnell GS, Smith CM, Moxley FI. Intelligent adversary risk analysis: A bioterrorism risk management model. Risk Analysis, 2010; 30(1):32-48.
-
(2010)
Risk Analysis
, vol.30
, Issue.1
, pp. 32-48
-
-
Parnell, G.S.1
Smith, C.M.2
Moxley, F.I.3
-
7
-
-
80053384354
-
A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management
-
Available at:
-
Merrick J, Parnell GS. A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management. Risk Analysis, 2011. Available at:
-
(2011)
Risk Analysis
-
-
Merrick, J.1
Parnell, G.S.2
-
8
-
-
68149115896
-
Game theory and risk analysis
-
Cox LAT. Jr. Game theory and risk analysis. Risk Analysis, 2009; 29(8):1062-1068.
-
(2009)
Risk Analysis
, vol.29
, Issue.8
, pp. 1062-1068
-
-
Cox Jr., L.A.T.1
-
9
-
-
68149145410
-
The elephant in the room is called game theory
-
Hall JR Jr. The elephant in the room is called game theory. Risk Analysis, 2009; 29(8):1061-1061.
-
(2009)
Risk Analysis
, vol.29
, Issue.8
, pp. 1061-1061
-
-
Hall Jr., J.R.1
-
10
-
-
0036202354
-
Probabilistic risk analysis and game theory
-
Hausken K. Probabilistic risk analysis and game theory. Risk Analysis, 2002; 22(1):17-27.
-
(2002)
Risk Analysis
, vol.22
, Issue.1
, pp. 17-27
-
-
Hausken, K.1
-
11
-
-
77955901755
-
Resource distribution in multiple attacks against a single target
-
Levitin G, Hausken K. Resource distribution in multiple attacks against a single target. Risk Analysis, 2010; 30(8):1231-1239.
-
(2010)
Risk Analysis
, vol.30
, Issue.8
, pp. 1231-1239
-
-
Levitin, G.1
Hausken, K.2
-
12
-
-
34547641190
-
Choosing what to protect: Strategic defensive allocation against an unknown attacker
-
Bier V, Oliveros S, Samuelson L. Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 2007; 9(4):563-587.
-
(2007)
Journal of Public Economic Theory
, vol.9
, Issue.4
, pp. 563-587
-
-
Bier, V.1
Oliveros, S.2
Samuelson, L.3
-
13
-
-
45349092442
-
Optimal resource allocation for defense of targets based on differing measures of attractiveness
-
Bier VM, Haphuriwat N, Menoyo J, Zimmerman R, Culpen AM. Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis, 2008; 28(3):763-770.
-
(2008)
Risk Analysis
, vol.28
, Issue.3
, pp. 763-770
-
-
Bier, V.M.1
Haphuriwat, N.2
Menoyo, J.3
Zimmerman, R.4
Culpen, A.M.5
-
14
-
-
84860484620
-
-
Estimating Terrorism Risk [Internet], Available at: Accessed September 20, 2011.
-
Willis HH, Morral AR, Kelly TK, Medby JJ. Estimating Terrorism Risk [Internet], 2005. Available at: Accessed September 20, 2011.
-
(2005)
-
-
Willis, H.H.1
Morral, A.R.2
Kelly, T.K.3
Medby, J.J.4
-
15
-
-
79954506568
-
Robustness of optimal defensive resource allocations in the face of less fully rational attacker
-
Proc. 2009 Indust. Engrg. Res. Conf., IIE, Norcross, GA, 2009.
-
Hao M, Jin S, Zhuang J. Robustness of optimal defensive resource allocations in the face of less fully rational attacker. Pp. 886-891 in: Proc. 2009 Indust. Engrg. Res. Conf., IIE, Norcross, GA, 2009.
-
-
-
Hao, M.1
Jin, S.2
Zhuang, J.3
-
16
-
-
33749589535
-
Advanced techniques for modeling terrorism risk
-
Major JA. Advanced techniques for modeling terrorism risk. Journal of Risk Finance, 2002; 4(1):15-24.
-
(2002)
Journal of Risk Finance
, vol.4
, Issue.1
, pp. 15-24
-
-
Major, J.A.1
-
17
-
-
84860483842
-
-
Are Terrorism Risks Really Uninsurable? National Underwriter Property: Casualty-Risk & Benefits Management
-
Mooney SF. Are Terrorism Risks Really Uninsurable? National Underwriter Property: Casualty-Risk & Benefits Management, 2001.
-
(2001)
-
-
Mooney, S.F.1
-
18
-
-
34547479862
-
Defending against terrorist attacks with limited resources
-
Powell R. Defending against terrorist attacks with limited resources. American Political Science Review, 2007; 101(03):527-541.
-
(2007)
American Political Science Review
, vol.101
, Issue.3
, pp. 527-541
-
-
Powell, R.1
-
19
-
-
38549098290
-
Balancing terrorism and natural disasters defensive strategy with endogenous attacker effort
-
Zhuang J, Bier VM. Balancing terrorism and natural disasters defensive strategy with endogenous attacker effort. Operations Research, 2007; 55(5):976-991.
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
20
-
-
50849106725
-
Nature plays with dice-Terrorists do not: Allocating resources to counter strategic versus probabilistic risks
-
Golany B, Kaplan EH, Marmur A, Rothblum UG. Nature plays with dice-Terrorists do not: Allocating resources to counter strategic versus probabilistic risks. European Journal of Operational Research, 2009; 192(1):198-208.
-
(2009)
European Journal of Operational Research
, vol.192
, Issue.1
, pp. 198-208
-
-
Golany, B.1
Kaplan, E.H.2
Marmur, A.3
Rothblum, U.G.4
-
21
-
-
77957969748
-
Redundancy vs. protection in defending parallel systems against unintentional and intentional impacts
-
Levitin G, Hausken K. Redundancy vs. protection in defending parallel systems against unintentional and intentional impacts. Reliability, IEEE Transactions on, 2009; 58(4):679-690.
-
(2009)
Reliability, IEEE Transactions on
, vol.58
, Issue.4
, pp. 679-690
-
-
Levitin, G.1
Hausken, K.2
-
22
-
-
33845439386
-
Defending critical infrastructure
-
Brown G, Carlyle M, Salmeron J, Wood K. Defending critical infrastructure. Interfaces, 2006; 36(6):530-544.
-
(2006)
Interfaces
, vol.36
, Issue.6
, pp. 530-544
-
-
Brown, G.1
Carlyle, M.2
Salmeron, J.3
Wood, K.4
-
23
-
-
70350704685
-
Modeling secrecy and deception in a multiple-period attacker-defender signaling game
-
Zhuang J, Bier VM, Alagoz O. Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 2010; 203(2):409-418.
-
(2010)
European Journal of Operational Research
, vol.203
, Issue.2
, pp. 409-418
-
-
Zhuang, J.1
Bier, V.M.2
Alagoz, O.3
-
25
-
-
0019572879
-
Systems defense games: Colonel Blotto, command and control
-
Shubik M, Weber RJ. Systems defense games: Colonel Blotto, command and control. Naval Research Logistics Quarterly, 1981; 28(2):281-287.
-
(1981)
Naval Research Logistics Quarterly
, vol.28
, Issue.2
, pp. 281-287
-
-
Shubik, M.1
Weber, R.J.2
-
26
-
-
33746832500
-
The Colonel Blotto game
-
Roberson B. The Colonel Blotto game. Economic Theory, 2006; 29(1):1-24.
-
(2006)
Economic Theory
, vol.29
, Issue.1
, pp. 1-24
-
-
Roberson, B.1
-
27
-
-
84975745473
-
Linear programming under uncertainty
-
Infanger G (ed). New York Springer
-
Dantzig GB. Linear programming under uncertainty. Pp. 1-11 in Infanger G (ed). Stochastic Programming. New York Springer, 2011.
-
(2011)
Stochastic Programming
, pp. 1-11
-
-
Dantzig, G.B.1
-
28
-
-
84870613023
-
Robust discrete optimization and network flows
-
Bertsimas D, Sim M. Robust discrete optimization and network flows. Mathematical Programming, 2003; 98(1):49-71.
-
(2003)
Mathematical Programming
, vol.98
, Issue.1
, pp. 49-71
-
-
Bertsimas, D.1
Sim, M.2
-
29
-
-
0010680207
-
Convex programming with set-inclusive constraints and applications to inexact linear programming
-
Soyster AL. Convex programming with set-inclusive constraints and applications to inexact linear programming. Operations Research, 1973; 21(5):1154-1157.
-
(1973)
Operations Research
, vol.21
, Issue.5
, pp. 1154-1157
-
-
Soyster, A.L.1
-
32
-
-
33744798398
-
Robust convex quadratically constrained programs
-
Goldfarb D, Iyengar G. Robust convex quadratically constrained programs. Mathematical Programming, 2003; 97(3):495-515.
-
(2003)
Mathematical Programming
, vol.97
, Issue.3
, pp. 495-515
-
-
Goldfarb, D.1
Iyengar, G.2
-
35
-
-
0000725056
-
Games with incomplete information played by "Bayesian" players, I-III. Part I. The basic model
-
Harsanyi JC. Games with incomplete information played by "Bayesian" players, I-III. Part I. The basic model. Management Science, 1967; 14(3):159-182.
-
(1967)
Management Science
, vol.14
, Issue.3
, pp. 159-182
-
-
Harsanyi, J.C.1
-
36
-
-
33644559970
-
A robust optimization approach to inventory theory
-
Bertsimas D, Thiele A. A robust optimization approach to inventory theory. Operations Research, 2006; 54(1):150-168.
-
(2006)
Operations Research
, vol.54
, Issue.1
, pp. 150-168
-
-
Bertsimas, D.1
Thiele, A.2
-
37
-
-
79952695711
-
Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers
-
Golalikhani M, Zhuang J. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers. Risk Analysis, 2010; 31(4):533-547.
-
(2010)
Risk Analysis
, vol.31
, Issue.4
, pp. 533-547
-
-
Golalikhani, M.1
Zhuang, J.2
-
39
-
-
70449709843
-
Impact of intelligence on target-hardening decisions
-
HST'09.IEEE Conference on Boston, MA
-
Wang C, Bier VM. Impact of intelligence on target-hardening decisions. Pp. 373-380 in HST'09.IEEE Conference on Technologies for Homeland Security. Boston, MA, 2009.
-
(2009)
Technologies for Homeland Security
, pp. 373-380
-
-
Wang, C.1
Bier, V.M.2
-
40
-
-
3543125926
-
The investment problem in terrorism
-
Konrad KA. The investment problem in terrorism. Economica, 2004; 71(283):449-459.
-
(2004)
Economica
, vol.71
, Issue.283
, pp. 449-459
-
-
Konrad, K.A.1
-
41
-
-
79251511489
-
Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation
-
Zhuang J, Bier V. Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation. Defence and Peace Economics, 2011; 22(1):43-61.
-
(2011)
Defence and Peace Economics
, vol.22
, Issue.1
, pp. 43-61
-
-
Zhuang, J.1
Bier, V.2
-
42
-
-
64549092443
-
Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
-
Dighe NS, Zhuang J, Bier VM. Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering, 2009; 5(1):31-43.
-
(2009)
International Journal of Performability Engineering
, vol.5
, Issue.1
, pp. 31-43
-
-
Dighe, N.S.1
Zhuang, J.2
Bier, V.M.3
-
43
-
-
77953177089
-
Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-player game with errors
-
Zhuang J. Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-player game with errors. Engineering Economist, 2010; 55(2):131-149.
-
(2010)
Engineering Economist
, vol.55
, Issue.2
, pp. 131-149
-
-
Zhuang, J.1
-
44
-
-
79952694232
-
Analytical method to identify the number of containers to inspect at US ports to deter terrorist attacks
-
Bier VM, Haphuriwat N. Analytical method to identify the number of containers to inspect at US ports to deter terrorist attacks. Annals of Operations Research, 2011; 187(1):137-158.
-
(2011)
Annals of Operations Research
, vol.187
, Issue.1
, pp. 137-158
-
-
Bier, V.M.1
Haphuriwat, N.2
-
45
-
-
34447335639
-
Modeling values for anti-terrorism analysis
-
Keeney RL. Modeling values for anti-terrorism analysis. Risk Analysis, 2007; 27(3):585-596.
-
(2007)
Risk Analysis
, vol.27
, Issue.3
, pp. 585-596
-
-
Keeney, R.L.1
|