Game-Theoretic and Reliability Methods in Counterterrorism and Security
暂无分享,去创建一个
[1] Gregory Levitin. Maximizing survivability of acyclic transmission networks with multi-state retransmitters and vulnerable nodes , 2002, Reliab. Eng. Syst. Saf..
[2] Steven J. Brams,et al. Superpower Games: Applying Game Theory to Superpower Conflict , 1985 .
[3] Gregory Levitin,et al. Optimal multilevel protection in series-parallel systems , 2003, Reliab. Eng. Syst. Saf..
[4] John C. Hershey,et al. The Roles of Altruism, Free Riding, and Bandwagoning in Vaccination Decisions , 1994 .
[5] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[6] Vicki M. Bier,et al. Optimal Allocation of Resources for Defense of Simple Series and Parallel Systems from Determined Adversaries , 2003 .
[7] Steve Y. Chiu,et al. Least-cost failure diagnosis in uncertain reliability systems , 1996 .
[8] Gregory Levitin,et al. Survivability maximization for vulnerable multi-state systems with bridge topology , 2000, Reliab. Eng. Syst. Saf..
[9] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[10] Howard Raiffa,et al. Decision analysis: introductory lectures on choices under uncertainty. 1968. , 1969, M.D.Computing.
[11] Gregory Levitin,et al. Optimal separation of elements in vulnerable multi-state systems , 2001, Reliab. Eng. Syst. Saf..
[12] Vicki M. Bier,et al. Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..
[13] John V. Farr,et al. Infrastructure Risk Analysis Model , 2000 .
[14] K. Hausken. Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[15] T. Sandler,et al. An economic perspective on transnational terrorism , 2004 .
[16] T. Philipson. Economic Epidemiology and Infectious Diseases , 1999 .
[17] Edward M. Roche,et al. Critical Foundations: Protecting America's Infrastructures , 1998 .
[18] Bruce Schneier,et al. Managed Security Monitoring: Network Security for the 21st Centur , 2001, Comput. Secur..
[19] G. Woo. Quantitative Terrorism Risk Assessment , 2002 .
[20] Nikolaos Limnios,et al. Modern Statistical and Mathematical Methods in Reliability , 2005, Series on Quality, Reliability and Engineering Statistics.
[21] James H. Lambert,et al. Reducing vulnerability of water supply systems to attack , 1998 .
[22] Yacov Y. Haimes,et al. Strategic Responses to Risks of Terrorism to Water Resources , 2002 .
[23] Gregory Levitin,et al. Optimizing survivability of vulnerable series-parallel multi-state systems , 2003, Reliab. Eng. Syst. Saf..
[24] Vicki Bier. An Overview Of Probabilistic Risk Analysis For Complex Engineered Systems , 1996 .
[25] Melvin Dresher,et al. Allocation of Two Types of Aircraft in Tactical Air War , 1959 .
[26] Gregory Levitin,et al. Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm , 2003, Reliab. Eng. Syst. Saf..
[27] T. Sandler,et al. What do we know about the substitution effect in transnational terrorism , 2003 .
[28] Simon Luechinger,et al. Terrorism: Deterrence May Backfire , 2002 .
[29] Jack Hirshleifer,et al. From weakest-link to best-shot: Correction , 1985 .
[30] O. G. Haywood. Military Decision and Game Theory , 1954, Oper. Res..
[31] Mark E. Johnson,et al. Risk Analysis of Terrorist Attacks , 1987 .
[32] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[33] Douglas M. Lemon. A methodology for the identification of critical locations in infrastructures , 2004 .
[34] R. Zeckhauser,et al. The Ecology of Terror Defense , 2003 .
[35] G. Levitin,et al. Multi-state system reliabilit y , 2003 .
[36] Steven D. Levitt,et al. Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack , 1997 .
[37] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[38] J. Hirshleifer. From weakest-link to best-shot: The voluntary provision of public goods , 1983 .
[39] Carol Smidts,et al. Performance based fire safety regulation under intentional uncertainty , 1999 .
[40] Daniel G. Arce,et al. Transnational public goods: Strategies and institutions , 2001 .
[41] Vicki M. Bier,et al. Subsidies in Interdependent Security With Heterogeneous Discount Rates , 2007 .
[42] John V. Farr,et al. Infrastructure Risk Analysis of Municipal Water Distribution System , 2000 .
[43] D Warner North,et al. A discussion of findings and their possible implications from a workshop on bioterrorism threat assessment and risk management. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[44] I. M. Destler,et al. Protecting the American Homeland , 2003 .
[45] Game-theoretic Risk Management for Counterterrorism , 2022 .
[46] Y. Haimes,et al. A Survey of Approaches for Assessing and Managing the Risk of Extremes , 1999 .
[47] Morton D. Davis,et al. Games of Strategy: Theory and Application. , 1962 .
[48] Louis Anthony Cox,et al. New Risks: Issues and Management , 1990, Advances in Risk Analysis.
[49] Detlof von Winterfeldt,et al. Anniversary Article: Decision Analysis in Management Science , 2004, Manag. Sci..
[50] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[51] James H. Lambert,et al. Risk Analysis and Society: Risk of Extreme and Rare Events: Lessons from a Selection of Approaches , 2003 .
[52] Louis Anthony Cox. A Probabilistic Risk Assessment Program for Analyzing Security Risks , 1990 .
[53] J. Scott Armstrong,et al. Long-Range Forecasting: From Crystal Ball to Computer , 1981 .
[54] Gregory Levitin,et al. Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes , 2003, Eur. J. Oper. Res..
[55] Robert J. Genetski,et al. Long-Range Forecasting: From Crystal Ball to Computer , 1981 .
[56] Jurgen Brauer,et al. Peace as an international public good: An application to Southern Africa , 2000 .
[57] William D. Rowe. Vulnerability to Terrorism: Addressing the Human Variables , 2003 .
[58] D. Weber,et al. Evaluation and comparison of spatial interpolators II , 1992 .
[59] H. Kunreuther,et al. Interdependent Security , 2003 .
[60] Y. Haimes,et al. The Role of Risk Analysis in the Protection of Critical Infrastructures Against Terrorism , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[61] G. Fechner. Elemente der Psychophysik , 1998 .
[62] Fred Cohen. Feature: Managing network security: Attack and defence strategies , 1999 .
[63] Yosi Ben-Dov. Optimal Testing Procedures for Special Structures of Coherent Systems , 1981 .
[64] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[65] Melvin Dresher,et al. A Game Theory Analysis of Tactical Air War , 1959 .
[66] B John Garrick. Perspectives on the use of risk assessment to address terrorism. , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[67] M. Dresher. Games of Strategy: Theory and Applications , 2007 .
[68] L. A. Cox,et al. Heuristic least-cost computation of discrete classification functions with uncertain argument values , 1990 .
[69] Yacov Y. Haimes,et al. Roadmap for Modeling Risks of Terrorism to the Homeland , 2002 .
[70] Martin Shubik,et al. What is an application and when is theory a waste of time , 1987 .
[71] Steven J. Brams,et al. Game Theory and National Security , 1988 .
[72] Seth D. Guikema,et al. Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .
[73] Vlasta Molak,et al. Fundamentals of Risk Analysis and Risk Management , 1996 .
[74] R. Cooke. Experts in Uncertainty: Opinion and Subjective Probability in Science , 1991 .
[75] T. Bedford,et al. Probabilistic Risk Analysis: Foundations and Methods , 2001 .
[76] David A. Moser,et al. Risk-Based Decisionmaking in Water Resources IX , 2001 .
[77] Gerald J. Lieberman,et al. Optimal Composition and Deployment of a Heterogeneous Local Air-Defense System , 1960 .
[78] Vicki M. Bier,et al. Subsidized Security and Stability of Equilibrium Solutions in an N-Player Game with Errors ⁄ , 2006 .
[79] James H. Lambert,et al. Risks of Cyber Attack to Water Utility Supervisory Control and Data Acquisition Systems , 2001 .
[80] B. Frey,et al. How to Fight Terrorism: Alternatives to Deterrence , 2003 .
[81] H. Kunreuther,et al. You Only Die Once: Managing Discrete Interdependent Risks , 2003 .