-
1
-
-
33947146473
-
Optimal resource allocation for security in reliability systems
-
M.N. Azaiez, and V.M. Bier Optimal resource allocation for security in reliability systems European Journal of Operational Research 181 2 2007 773 786
-
(2007)
European Journal of Operational Research
, vol.181
, Issue.2
, pp. 773-786
-
-
Azaiez, M.N.1
Bier, V.M.2
-
2
-
-
69949110555
-
An effective two-finger, two-stage biometric strategy for the US-VISIT program
-
M. Baveja, and L.M. Wein An effective two-finger, two-stage biometric strategy for the US-VISIT program Operations Research 57 5 2009 1068 1081
-
(2009)
Operations Research
, vol.57
, Issue.5
, pp. 1068-1081
-
-
Baveja, M.1
Wein, L.M.2
-
3
-
-
33750490397
-
Location of terror response facilities: A game between state and terrorist
-
O. Berman, and A. Gavious Location of terror response facilities: a game between state and terrorist European Journal of Operational Research 177 2 2007 1113 1133
-
(2007)
European Journal of Operational Research
, vol.177
, Issue.2
, pp. 1113-1133
-
-
Berman, O.1
Gavious, A.2
-
4
-
-
45349092442
-
Optimal resource allocation for defense of targets based on differing measures of attractiveness
-
V.M. Bier, N. Haphuriwat, J. Menoyo, R. Zimmerman, and A.M. Culpen Optimal resource allocation for defense of targets based on differing measures of attractiveness Risk Analysis 28 3 2008 763 770
-
(2008)
Risk Analysis
, vol.28
, Issue.3
, pp. 763-770
-
-
Bier, V.M.1
Haphuriwat, N.2
Menoyo, J.3
Zimmerman, R.4
Culpen, A.M.5
-
5
-
-
27344439516
-
A two-sided optimization for theater ballistic missile defense
-
G. Brown, M. Carlyle, D. Diehl, J. Kline, and K. Wood A two-sided optimization for theater ballistic missile defense Operations Research 53 5 2005 263 275
-
(2005)
Operations Research
, vol.53
, Issue.5
, pp. 263-275
-
-
Brown, G.1
Carlyle, M.2
Diehl, D.3
Kline, J.4
Wood, K.5
-
6
-
-
68149115896
-
Game theory and risk analysis
-
L.A. Cox Game theory and risk analysis Risk Analysis 29 8 2009 1062 1068
-
(2009)
Risk Analysis
, vol.29
, Issue.8
, pp. 1062-1068
-
-
Cox, L.A.1
-
7
-
-
42349112246
-
Homeland-Security Pork
-
accessed 08.12
-
de Rugy, V.; 2005. Homeland-Security Pork. Washington Times. < http://www.aei.org/article/22924 > (accessed 08.12).
-
(2005)
Washington Times
-
-
De Rugy, V.1
-
9
-
-
79952695711
-
Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers
-
M. Golalikhani, and J. Zhuang Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers Risk Analysis 31 4 2011 533 547
-
(2011)
Risk Analysis
, vol.31
, Issue.4
, pp. 533-547
-
-
Golalikhani, M.1
Zhuang, J.2
-
10
-
-
50849106725
-
Nature plays with dice-terrorists do not: Allocating resources to counter strategic versus probabilistic risks
-
B. Golany, E.H. Kaplan, A. Marmur, and U.G. Rothblum Nature plays with dice-terrorists do not: allocating resources to counter strategic versus probabilistic risks European Journal of Operational Research 192 1 2009 198 208
-
(2009)
European Journal of Operational Research
, vol.192
, Issue.1
, pp. 198-208
-
-
Golany, B.1
Kaplan, E.H.2
Marmur, A.3
Rothblum, U.G.4
-
11
-
-
68149145410
-
The elephant in the room is called game theory
-
J.R. Hall The elephant in the room is called game theory Risk Analysis 29 8 2009 1061
-
(2009)
Risk Analysis
, vol.29
, Issue.8
, pp. 1061
-
-
Hall, J.R.1
-
13
-
-
79955628242
-
Trade-offs between target hardening and overarching protection
-
N. Haphuriwat, and V.M. Bier Trade-offs between target hardening and overarching protection European Journal of Operational Research 213 1 2011 320 328
-
(2011)
European Journal of Operational Research
, vol.213
, Issue.1
, pp. 320-328
-
-
Haphuriwat, N.1
Bier, V.M.2
-
14
-
-
4544332530
-
Mathematical methods in combating terrorism
-
B. Harris Mathematical methods in combating terrorism Risk Analysis 24 4 2004 985 988
-
(2004)
Risk Analysis
, vol.24
, Issue.4
, pp. 985-988
-
-
Harris, B.1
-
15
-
-
35348950536
-
Strategic defense and attack for series and parallel reliability systems
-
K. Hausken Strategic defense and attack for series and parallel reliability systems European Journal of Operational Research 186 2 2008 856 881
-
(2008)
European Journal of Operational Research
, vol.186
, Issue.2
, pp. 856-881
-
-
Hausken, K.1
-
17
-
-
80053472366
-
Risk adjusted budget allocation models with application in homeland security
-
J. Hu, T. Homem-de, Mello, and S. Mehrotra Risk adjusted budget allocation models with application in homeland security IIE Transactions 43 12 2011 819 839
-
(2011)
IIE Transactions
, vol.43
, Issue.12
, pp. 819-839
-
-
Hu, J.1
Homem-De, T.2
Mello3
Mehrotra, S.4
-
18
-
-
77955458634
-
Software assistants for randomized patrol planning for the lax patrol police and the federal air marshals service
-
M. Jain, J. Tsai, J. Pita, C. Kiekintveld, S. Rathi, F. Ordonez, and M. Tambe Software assistants for randomized patrol planning for the lax patrol police and the federal air marshals service Interfaces 40 4 2010 267 290
-
(2010)
Interfaces
, vol.40
, Issue.4
, pp. 267-290
-
-
Jain, M.1
Tsai, J.2
Pita, J.3
Kiekintveld, C.4
Rathi, S.5
Ordonez, F.6
Tambe, M.7
-
19
-
-
77955863380
-
Terror queues
-
E.H. Kaplan Terror queues Operations Research 58 4 2010 773 784
-
(2010)
Operations Research
, vol.58
, Issue.4
, pp. 773-784
-
-
Kaplan, E.H.1
-
20
-
-
22544458158
-
Operational effectiveness of suicide-bomber-detector schemes: A best-case analysis
-
E.H. Kaplan, and M. Kress Operational effectiveness of suicide-bomber-detector schemes: a best-case analysis Proceedings of the National Academy of Science 102 29 2005 10399 10404
-
(2005)
Proceedings of the National Academy of Science
, vol.102
, Issue.29
, pp. 10399-10404
-
-
Kaplan, E.H.1
Kress, M.2
-
22
-
-
80053424264
-
A value model for evaluating homeland security decisions
-
G.L. Keeney, and D. von Winterfeldt A value model for evaluating homeland security decisions Risk Analysis 31 9 2011 1470 1487
-
(2011)
Risk Analysis
, vol.31
, Issue.9
, pp. 1470-1487
-
-
Keeney, G.L.1
Von Winterfeldt, D.2
-
23
-
-
34447335639
-
Modeling values for anti-terrorism analysis
-
R.L. Keeney Modeling values for anti-terrorism analysis Risk Analysis 27 3 2007 585 596
-
(2007)
Risk Analysis
, vol.27
, Issue.3
, pp. 585-596
-
-
Keeney, R.L.1
-
24
-
-
33847069350
-
Rational cooperation in the finitely repeated prisoners' dilemma
-
D.M. Kreps, P. Milgrom, J. Roberts, and R. Wilson Rational cooperation in the finitely repeated prisoners' dilemma Journal of Economic Theory 27 2 1982 245 252
-
(1982)
Journal of Economic Theory
, vol.27
, Issue.2
, pp. 245-252
-
-
Kreps, D.M.1
Milgrom, P.2
Roberts, J.3
Wilson, R.4
-
25
-
-
68149148571
-
Why defeating insurgencies is hard: The effect of intelligence in counterinsurgency operations - A best case scenario
-
M. Kress, and R. Szechtman Why defeating insurgencies is hard: the effect of intelligence in counterinsurgency operations - a best case scenario Operations Research 57 3 2009 578 585
-
(2009)
Operations Research
, vol.57
, Issue.3
, pp. 578-585
-
-
Kress, M.1
Szechtman, R.2
-
26
-
-
77957969748
-
Redundancy vs. protection in defending parallel systems against unintentional and intentional impacts
-
G. Levitin, and K. Hausken Redundancy vs. protection in defending parallel systems against unintentional and intentional impacts IEEE Transactions on Reliability 58 4 2009 679 690
-
(2009)
IEEE Transactions on Reliability
, vol.58
, Issue.4
, pp. 679-690
-
-
Levitin, G.1
Hausken, K.2
-
27
-
-
63449099812
-
Scheduling policies for an antiterrorist surveillance system
-
K.Y. Lin, M. Kress, and R. Szechtman Scheduling policies for an antiterrorist surveillance system Naval Research Logistics 56 2 2009 113 126
-
(2009)
Naval Research Logistics
, vol.56
, Issue.2
, pp. 113-126
-
-
Lin, K.Y.1
Kress, M.2
Szechtman, R.3
-
28
-
-
42349094873
-
Homeland Security - Pork or Protection?
-
accessed 08.12
-
McLaughlin, A.; 2002. Homeland Security - Pork or Protection? The Christian Science Monitor. < http://www.csmonitor.com/2002/0306/p03s01-usmi. html > (accessed 08.12).
-
(2002)
The Christian Science Monitor
-
-
McLaughlin, A.1
-
30
-
-
34547479862
-
Defending against terrorist attacks with limited resources
-
R. Powell Defending against terrorist attacks with limited resources American Political Science Review 101 3 2007 527 541
-
(2007)
American Political Science Review
, vol.101
, Issue.3
, pp. 527-541
-
-
Powell, R.1
-
31
-
-
70349331067
-
Sequential, nonzero-sum "blotto": Allocating defensive resources prior to attack
-
R. Powell Sequential, nonzero-sum "Blotto": allocating defensive resources prior to attack Games and Economic Behavior 67 2 2009 611 615
-
(2009)
Games and Economic Behavior
, vol.67
, Issue.2
, pp. 611-615
-
-
Powell, R.1
-
32
-
-
33746832500
-
The colonel blotto game
-
B. Roberson The colonel blotto game Economic Theory 29 1 2006 1 24
-
(2006)
Economic Theory
, vol.29
, Issue.1
, pp. 1-24
-
-
Roberson, B.1
-
33
-
-
63449108250
-
Games and terrorism: Recent developments
-
T. Sandler, and K. Siqueira Games and terrorism: recent developments Simulation & Gaming 40 2 2009 164 192
-
(2009)
Simulation & Gaming
, vol.40
, Issue.2
, pp. 164-192
-
-
Sandler, T.1
Siqueira, K.2
-
34
-
-
0019572879
-
Systems defense games: Colonel Blotto, command and control
-
M. Shubik, and R.J. Weber Systems defense games: Colonel Blotto, command and control Naval Research Logistics Quarterly 28 2 1981 281 287
-
(1981)
Naval Research Logistics Quarterly
, vol.28
, Issue.2
, pp. 281-287
-
-
Shubik, M.1
Weber, R.J.2
-
35
-
-
84875221198
-
-
U.S. Department of Homeland Security. 2004. Fiscal Year 2004 Urban Areas Security Initiative Grant Program. < > (accessed 08.12)
-
U.S. Department of Homeland Security. 2004. Fiscal Year 2004 Urban Areas Security Initiative Grant Program. < http://web.archive.org/web/*/http: //www.ojp.usdoj.gov/odp/docs/fy04uasi.pdf > (accessed 08.12).
-
-
-
-
36
-
-
84875216359
-
-
U.S. Department of Homeland Security. 2012. Budget and Performance. < > (accessed 08.12)
-
U.S. Department of Homeland Security. 2012. Budget and Performance. < http://www.dhs.gov/xabout/budget/dhs-budget.shtm > (accessed 08.12).
-
-
-
-
37
-
-
84875213626
-
-
U.S. Government Accountability Office. 2008. DHS Risk-Based Grant Methodology is Reasonable, but Current Versions Measure of Vulnerability is Limited. < > (accessed 08.12)
-
U.S. Government Accountability Office. 2008. DHS Risk-Based Grant Methodology is Reasonable, but Current Versions Measure of Vulnerability is Limited. < http://www.gao.gov/new.items/d08852.pdf > (accessed 08.12).
-
-
-
-
39
-
-
83755228811
-
Target-hardening decisions based on uncertain multiattribute terrorist utility
-
C. Wang, and V.M. Bier Target-hardening decisions based on uncertain multiattribute terrorist utility Decision Analysis 8 4 2011 286 302
-
(2011)
Decision Analysis
, vol.8
, Issue.4
, pp. 286-302
-
-
Wang, C.1
Bier, V.M.2
-
40
-
-
79952701280
-
Balancing congestion and security in the presence of strategic applicants with private information
-
X. Wang, and J. Zhuang Balancing congestion and security in the presence of strategic applicants with private information European Journal of Operational Research 212 1 2011 100 111
-
(2011)
European Journal of Operational Research
, vol.212
, Issue.1
, pp. 100-111
-
-
Wang, X.1
Zhuang, J.2
-
41
-
-
69949090557
-
Homeland security: From mathematical models to policy implementation: The 2008 Philip McCord Morse lecture
-
L.M. Wein Homeland security: From mathematical models to policy implementation: the 2008 Philip McCord Morse lecture Operations Research 57 4 2009 801 811
-
(2009)
Operations Research
, vol.57
, Issue.4
, pp. 801-811
-
-
Wein, L.M.1
-
43
-
-
77953177089
-
Impacts of subsidized security on stability and total social costs of equilibrium solutions in an n-player game with error
-
J. Zhuang Impacts of subsidized security on stability and total social costs of equilibrium solutions in an n-player game with error The Engineering Economist 55 2 2010 131 149
-
(2010)
The Engineering Economist
, vol.55
, Issue.2
, pp. 131-149
-
-
Zhuang, J.1
-
44
-
-
38549098290
-
Balancing terrorism and natural disasters - Defensive strategy with endogenous attacker effort
-
J. Zhuang, and V.M. Bier Balancing terrorism and natural disasters - defensive strategy with endogenous attacker effort Operations Research 55 5 2007 976 991
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
45
-
-
70350704685
-
Modeling secrecy and deception in a multiple-period attacker-defender signaling game
-
J. Zhuang, V.M. Bier, and O. Alagoz Modeling secrecy and deception in a multiple-period attacker-defender signaling game European Journal of Operational Research 203 2 2010 409 418
-
(2010)
European Journal of Operational Research
, vol.203
, Issue.2
, pp. 409-418
-
-
Zhuang, J.1
Bier, V.M.2
Alagoz, O.3
|