Defender–Attacker Decision Tree Analysis to Combat Terrorism

We propose a methodology, called defender-attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game-theoretic formulations of this problem, we assume that the defenders act rationally by maximizing their expected utility or minimizing their expected costs. However, we do not assume that attackers maximize their expected utilities. Instead, we encode the defender's limited knowledge about the attacker's motivations and capabilities as a conditional probability distribution over the attacker's decisions. We apply this methodology to the problem of defending against possible terrorist attacks on commercial airplanes, using one of three weapons: infrared-guided MANPADS (man-portable air defense systems), laser-guided MANPADS, or visually targeted RPGs (rocket propelled grenades). We also evaluate three countermeasures against these weapons: DIRCMs (directional infrared countermeasures), perimeter control around the airport, and hardening airplanes. The model includes deterrence effects, the effectiveness of the countermeasures, and the substitution of weapons and targets once a specific countermeasure is selected. It also includes a second stage of defensive decisions after an attack occurs. Key findings are: (1) due to the high cost of the countermeasures, not implementing countermeasures is the preferred defensive alternative for a large range of parameters; (2) if the probability of an attack and the associated consequences are large, a combination of DIRCMs and ground perimeter control are preferred over any single countermeasure.

[1]  Alexandre M. Bayen,et al.  A time-dependent Hamilton-Jacobi formulation of reachable sets for continuous dynamic games , 2005, IEEE Transactions on Automatic Control.

[2]  Ralph L. Keeney,et al.  Advances in Decision Analysis: Developing Objectives and Attributes , 2007 .

[3]  David R. Godschalk,et al.  Urban Hazard Mitigation: Creating Resilient Cities , 2003 .

[4]  James Yetman,et al.  SUICIDAL TERRORISM AND DISCRIMINATORY SCREENING: AN EFFICIENCY‐EQUITY TRADE‐OFF , 2004 .

[5]  Robert J. Nicholls,et al.  Resilience to natural hazards: How useful is this concept? , 2003 .

[6]  D. Kahneman A perspective on judgment and choice: mapping bounded rationality. , 2003, The American psychologist.

[7]  C. Everett Koop "Prepared Statement Presented before the House Subcommittee on Health and the Environment of the House Committee on Energy and Commerce, Washington, DC" [Reminiscence] , 2003 .

[8]  Kenneth O. Kortanek,et al.  A Central Cutting Plane Algorithm for Convex Semi-Infinite Programming Problems , 1993, SIAM J. Optim..

[9]  A. Tversky,et al.  Advances in prospect theory: Cumulative representation of uncertainty , 1992 .

[10]  A. Tversky,et al.  Subjective Probability: A Judgment of Representativeness , 1972 .

[11]  Hirokazu Tatano,et al.  Estimation of Lifeline Resilience Factors Based on Surveys of Japanese Industries , 2009 .

[12]  G. Woo Quantitative Terrorism Risk Assessment , 2002 .

[13]  Bo An,et al.  GUARDS and PROTECT: next generation applications of security games , 2011, SECO.

[14]  Harry W. Richardson,et al.  A two-step approach to estimating state-to-state commodity trade flows , 2009 .

[15]  W. Kip Viscusi The risks of terrorism , 2003 .

[16]  Peter H. Farquhar,et al.  A Fractional Hypercube Decomposition Theorem for Multiattribute Utility Functions , 1975, Oper. Res..

[17]  Peter C. Fishburn,et al.  Approximations of Two-Attribute Utility Functions , 1977, Math. Oper. Res..

[18]  Peter B. Dixon,et al.  Dynamic general equilibrium modelling for forecasting and policy : a practical guide and documentation of MONASH , 2002 .

[19]  Vicki M. Bier,et al.  A study of expert overconfidence , 2008, Reliab. Eng. Syst. Saf..

[20]  Gregory S Parnell,et al.  Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[21]  Colin Parish,et al.  Think the unthinkable. , 2008, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[22]  Jason R. W. Merrick,et al.  A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[23]  Richard Gonzalez,et al.  On the Shape of the Probability Weighting Function , 1999, Cognitive Psychology.

[24]  Sarit Kraus,et al.  Bayesian stackelberg games and their application for security at Los Angeles international airport , 2008, SECO.

[25]  Fernando Ordóñez,et al.  Security routing games with multivehicle Chinese postman problem , 2014, Networks.

[26]  K. R. Hammond Probabilistic functioning and the clinical method. , 1955, Psychological review.

[27]  John R. Madden,et al.  The impact of the 2002–2003 drought on Australia , 2005 .

[28]  Kelly E. See,et al.  Between ignorance and truth: Partition dependence and learning in judgment under uncertainty. , 2006, Journal of experimental psychology. Learning, memory, and cognition.

[29]  P Slovic,et al.  Assessment of the Regional Economic Impacts of Catastrophic Events: CGE Analysis of Resource Loss and Behavioral Effects of an RDD Attack Scenario , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[30]  Dimitris Bertsimas,et al.  Robust game theory , 2006, Math. Program..

[31]  P. Slovic Perception of risk. , 1987, Science.

[32]  Lawrence M Wein,et al.  Analyzing Evacuation Versus Shelter‐in‐Place Strategies After a Terrorist Nuclear Detonation , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[33]  S. Kaplan,et al.  On The Quantitative Definition of Risk , 1981 .

[34]  Ali E. Abbas Invariant multiattribute utility functions , 2010 .

[35]  Stuart Shapiro,et al.  The Benefit-Cost Analysis of Security Focused Regulations , 2009 .

[36]  Chen Wang,et al.  Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility , 2011, Decis. Anal..

[37]  Adam Rose,et al.  Business Interruption Impacts of a Terrorist Attack on the Electric Power System of Los Angeles: Customer Resilience to a Total Blackout , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[38]  Bo An,et al.  A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard , 2013, Interfaces.

[39]  Scott Farrow,et al.  Towards Principles and Standards for the Benefit-Cost Analysis of Safety , 2011 .

[40]  Ulrich Schmidt,et al.  Additive Utility in Prospect Theory , 2009, Manag. Sci..

[41]  O. Holsti,et al.  Essence of Decision: Explaining the Cuban Missile Crisis , 1972 .

[42]  A. Rose,et al.  Modeling Regional Economic Resilience to Disasters: A Computable General Equilibrium Analysis of Water Service Disruptions , 2005 .

[43]  S. Galea,et al.  Measuring Capacities for Community Resilience , 2010 .

[44]  R. Duncan Luce,et al.  Individual Choice Behavior , 1959 .

[45]  C. Starr Social benefit versus technological risk. , 1969, Science.

[46]  Jun Zhuang,et al.  Robustness of Optimal Defensive Resource Allocations in the Face of Less Fully Rational Attacker , 2009 .

[47]  Nevin Lianwen Zhang,et al.  Probabilistic Inference in Influence Diagrams , 1998, Comput. Intell..

[48]  Howard Kunreuther,et al.  Is imprecise knowledge better than conflicting expertise? Evidence from insurers’ decisions in the United States , 2010 .

[49]  Max Abrahms,et al.  What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy , 2008, International Security.

[50]  J. Quiggin A theory of anticipated utility , 1982 .

[51]  Ronald A. Howard,et al.  Information Value Theory , 1966, IEEE Trans. Syst. Sci. Cybern..

[52]  Patrick D. Larkey,et al.  Subjective Probability and the Theory of Games , 1982 .

[53]  Naira Hovakimyan,et al.  Guaranteed Strategies for nonlinear Multi-Player Pursuit-Evasion Games , 2010, IGTR.

[54]  Scott Ferson,et al.  Varying correlation coefficients can underestimate uncertainty in probabilistic models , 2006, Reliab. Eng. Syst. Saf..

[55]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[56]  Sheldon Howard Jacobson,et al.  Assessing the impact of deterrence on aviation checked baggage screening strategies , 2005 .

[57]  R. Nickerson Confirmation Bias: A Ubiquitous Phenomenon in Many Guises , 1998 .

[58]  John A. Sokolowski,et al.  Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[59]  M. Naceur Azaiez,et al.  Game Theoretic Risk Analysis of Security Threats , 2009 .

[60]  Fynnwin Prager The economic and political impacts of U.S. federal carbon emissions trading policy across households, sectors and states , 2013 .

[61]  Ralph L Keeney,et al.  Modeling Values for Anti‐Terrorism Analysis , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[62]  Peter Gordon,et al.  The Economic Impacts of a Terrorist Attack on the U.S. Commercial Aviation System , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[63]  Howard Kunreuther,et al.  Corporate Demand for Insurance: New Evidence from the U.s. Terrorism and Property Markets the Wharton Risk Management and Decision Processes Center Corporate Demand for Insurance: New Evidence from the U.s. Terrorism and Property Markets , 2022 .

[64]  Richard S. John,et al.  Identifying and Structuring the Objectives of the Islamic State of Iraq and the Levant (ISIL) and Its Followers , 2016, Decis. Anal..

[65]  Scott Farrow,et al.  THE ECONOMICS OF HOMELAND SECURITY EXPENDITURES: FOUNDATIONAL EXPECTED COST‐EFFECTIVENESS APPROACHES , 2007 .

[66]  Siambabala Bernard Manyena,et al.  The concept of resilience revisited. , 2006, Disasters.

[67]  Peter C. Fishburn,et al.  von Neumann-Morgenstera Utility Functions on Two Attributes , 1974, Oper. Res..

[68]  Baruch Fischhoff,et al.  Aggregate, Disaggregate, and Hybrid Analyses of Ecological Risk Perceptions , 2005, Risk analysis : an official publication of the Society for Risk Analysis.

[69]  Raymond J. Kopp,et al.  Social Cost of Environmental Quality Regulations: A General Equilibrium Analysis , 1990, Journal of Political Economy.

[70]  Olivier Roy,et al.  Intentions, Decisions and Rationality , 2008 .

[71]  Henry H. Willis,et al.  Prioritizing Environmental Health Risks in the UAE , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[72]  Vicki M. Bier,et al.  Uncertainty about probability: a reconciliation with the subjectivist viewpoint , 1996, IEEE Trans. Syst. Man Cybern. Part A.

[73]  Kevin J. Boyle,et al.  The Benefit-Transfer Challenges , 2010 .

[74]  J. Victoroff The Mind of the Terrorist , 2005 .

[75]  M. Elisabeth Paté-Cornell,et al.  Advances in Decision Analysis: The Engineering Risk-Analysis Method and Some Applications , 2007 .

[76]  Patrick Jaillet,et al.  Location and Routing Models for Emergency Response Plans with Priorities , 2012, Future Security.

[77]  T Bulger,et al.  TRANSPORTATION EQUITY ACT FOR THE 21ST CENTURY (TEA 21) , 1998 .

[78]  Oliver Grundmann,et al.  The current state of bioterrorist attack surveillance and preparedness in the US , 2014, Risk management and healthcare policy.

[79]  Louis Anthony Cox Improving risk-based decision making for terrorism applications. , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[80]  Melissa L. Finucane,et al.  Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[81]  Dusan M. Stipanovic,et al.  Formation Control and Collision Avoidance for Multi-agent Non-holonomic Systems: Theory and Experiments , 2008, Int. J. Robotics Res..

[82]  Steve Alpern,et al.  Patrolling Games , 2011, Oper. Res..

[83]  W. L. Shirley,et al.  Social Vulnerability to Environmental Hazards , 2003 .

[84]  Horst Zank,et al.  Cumulative Prospect Theory for Parametric and Multiattribute Utilities , 2001, Math. Oper. Res..

[85]  S. Hora Advances in Decision Analysis: Eliciting Probabilities from Experts , 2007 .

[86]  Randy A. Freeman,et al.  Robust Nonlinear Control Design , 1996 .

[87]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[88]  Jun Zhuang,et al.  Impacts of Subsidized Security on Stability and Total Social Costs of Equilibrium Solutions in an N-Player Game with Errors , 2010 .

[89]  Ralph L. Keeney,et al.  Using Values in Operations Research , 1994, Oper. Res..

[90]  Ralph L. Keeney,et al.  Estimating Fatalities Induced by the Economic Costs of Regulations , 1997 .

[91]  Klaus Ritzberger On games under expected utility with rank dependent probabilities , 1996 .

[92]  Adam Rose,et al.  Income distribution impacts of climate change mitigation policy in the Susquehanna River Basin Economy , 2007 .

[93]  Anthony S Fauci,et al.  Smallpox vaccination policy--the need for dialogue. , 2002, The New England journal of medicine.

[94]  Jianhua Xu,et al.  Evaluating an analytic–deliberative risk‐ranking process in a Chinese context , 2011 .

[95]  Douglas Paton,et al.  Managing company risk and resilience through business continuity management , 2006 .

[96]  John Rollins Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy , 2010 .

[97]  Sarit Kraus,et al.  Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..

[98]  William J Bicknell,et al.  The case for voluntary smallpox vaccination. , 2002, The New England journal of medicine.

[99]  Heather Rosoff,et al.  The Role of Behavioral Responses in the Total Economic Consequences of Terrorist Attacks on U.S. Air Travel Targets , 2017, Risk analysis : an official publication of the Society for Risk Analysis.

[100]  Michael K. Lindell,et al.  ASSESSING COMMUNITY IMPACTS OF NATURAL DISASTERS , 2003 .

[101]  Ali E. Abbas,et al.  Multiattribute Utility Functions Satisfying Mutual Preferential Independence , 2015, Oper. Res..

[102]  Vicki M. Bier,et al.  An Application of Copulas to Accident Precursor Analysis , 1998 .

[103]  Louis Anthony Cox,et al.  What's Wrong with Risk Matrices? , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[104]  P. Jean-Jacques Herings,et al.  Fuzzy play, matching devices and coordination failures , 2001, Int. J. Game Theory.

[105]  Kjell Hausken,et al.  Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures , 2011, Ann. Oper. Res..

[106]  C. Starmer Developments in Non-expected Utility Theory: The Hunt for a Descriptive Theory of Choice under Risk , 2000 .

[107]  Jun Zhuang,et al.  Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[108]  Richard C. Larson,et al.  Responding to Emergencies: Lessons Learned and the Need for Analysis , 2006, Interfaces.

[109]  Christopher Butler Prospect Theory and Coercive Bargaining , 2007 .

[110]  Jun Zhuang,et al.  Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[111]  Richard O. Zerbe,et al.  Benefit-cost analysis , 2008 .

[112]  Santosh S. Vempala,et al.  Simulated Annealing for Convex Optimization , 2004 .

[113]  F. Norris,et al.  60,000 Disaster Victims Speak: Part II. Summary and Implications of the Disaster Mental Health Research , 2002, Psychiatry.

[114]  Peter B. Dixon,et al.  Immigration Policy and its Possible Effects on U.S. Agriculture and the Market for Hired Farm Labor: A Simulation Analysis , 2012 .

[115]  Roberto Szechtman,et al.  Confronting Entrenched Insurgents , 2010, Oper. Res..

[116]  Milind Tambe,et al.  Security Games in the Field: Deployments on a Transit System , 2014, EMAS@AAMAS.

[117]  J. C. Taylor,et al.  The U.S.-Canada Border: Cost Impacts, Causes, and Short to Long Term Management Options , 2003 .

[118]  G. Apostolakis The concept of probability in safety assessments of technological systems. , 1990, Science.

[119]  J. Harsanyi Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .

[120]  George A. Hazelrigg,et al.  Bayesian Inference for the Demand of Engineering Products , 2012 .

[121]  F. Norris,et al.  Community Resilience as a Metaphor, Theory, Set of Capacities, and Strategy for Disaster Readiness , 2008, American journal of community psychology.

[122]  Richard J. Zeckhauser,et al.  Critical ratios and efficient allocation , 1973 .

[123]  William J. Burns,et al.  Near‐Misses and Future Disaster Preparedness , 2014, Risk analysis : an official publication of the Society for Risk Analysis.

[124]  Peter B. Dixon,et al.  Macro, industry and state effects in the U.S. of removing major tariffs and quotas , 2004 .

[125]  Detlof von Winterfeldt,et al.  Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists? , 2006, Decis. Anal..

[126]  Michael P. Wellman,et al.  Selecting strategies using empirical game models: an experimental analysis of meta-strategies , 2008, AAMAS.

[127]  D von Winterfeldt,et al.  A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[128]  Nicholas R. Jennings,et al.  Computational-Mechanism Design: A Call to Arms , 2003, IEEE Intell. Syst..

[129]  Adrian E. Raftery,et al.  Bayesian model averaging: a tutorial (with comments by M. Clyde, David Draper and E. I. George, and a rejoinder by the authors , 1999 .

[130]  Ralph L Keeney,et al.  A Value Model for Evaluating Homeland Security Decisions , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[131]  Milind Tambe,et al.  Comparing human behavior models in repeated Stackelberg security games: An extended study , 2016, Artif. Intell..

[132]  Chris R. Rose DARHT: An Overview , 2013 .

[133]  Vladimir Marianov,et al.  The Queueing Maximal availability location problem: A model for the siting of emergency vehicles , 1996 .

[134]  Ali E. Abbas,et al.  Utility transversality: a value-based approach , 2005 .

[135]  Henry H. Willis,et al.  Estimating Terrorism Risk , 2002 .

[136]  Dusan M. Stipanovic,et al.  Trajectory tracking with collision avoidance for nonholonomic vehicles with acceleration constraints and limited sensing , 2014, Int. J. Robotics Res..

[137]  Robin L. Dillon-Merrill,et al.  Logic Trees: Fault, Success, Attack, Event, Probability, and Decision Trees , 2009 .

[138]  L. Robin Keller,et al.  Equity in Social Risk: Some Empirical Observations , 1988 .

[139]  Anthony Michael Barrett,et al.  Should cities invest in sheltering-in-place measures against chlorine truck attacks by terrorists? , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[140]  Vicki M. Bier,et al.  Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .

[141]  J M Bland,et al.  Weighted comparison of means , 1998, BMJ.

[142]  A. Colman Cooperation, psychological game theory, and limitations of rationality in social interaction , 2003, Behavioral and Brain Sciences.

[143]  Roberto Szechtman,et al.  Scheduling policies for an antiterrorist surveillance system , 2009 .

[144]  B Fischhoff,et al.  A Deliberative Method for Ranking Risks (I): Overview and Test Bed Development , 2001, Risk analysis : an official publication of the Society for Risk Analysis.

[145]  H. Florig,et al.  A Deliberative Method for Ranking Risks (II): Evaluation of Validity and Agreement among Risk Managers , 2001, Risk analysis : an official publication of the Society for Risk Analysis.

[146]  Lawrence V. Snyder,et al.  Facility location under uncertainty: a review , 2006 .

[147]  Sherrill Lingel,et al.  Protecting Commercial Aviation Against the Shoulder-Fired Missile Threat , 2005 .

[148]  S. Cutter,et al.  Journal of Homeland Security and Emergency Management Disaster Resilience Indicators for Benchmarking Baseline Conditions , 2011 .

[149]  J. Breckenridge,et al.  The Strategy of Terrorism and the Psychology of Mass-Mediated Fear , 2006 .

[150]  Garrick L. Wallstrom,et al.  Measuring the effect of commuting on the performance of the Bayesian Aerosol Release Detector , 2009, BMC Medical Informatics Decis. Mak..

[151]  Roberto Szechtman,et al.  Why Defeating Insurgencies Is Hard: The Effect of Intelligence in Counterinsurgency Operations - A Best-Case Scenario , 2009, Oper. Res..

[152]  Joost R. Santos,et al.  Modeling the Demand Reduction Input‐Output (I‐O) Inoperability Due to Terrorism of Interconnected Infrastructures * , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[153]  H. Simon,et al.  A Behavioral Model of Rational Choice , 1955 .

[154]  Shi-Woei Lin,et al.  Should the Model for Risk‐Informed Regulation be Game Theory Rather than Decision Theory? , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[155]  Jason R. W. Merrick,et al.  Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory , 2016, Risk analysis : an official publication of the Society for Risk Analysis.

[156]  R. Wilcox Applying Contemporary Statistical Techniques , 2003 .

[157]  Ralph L. Keeney,et al.  Improving the Generation of Decision Objectives , 2010, Decis. Anal..

[158]  Gordon H. McCormick Terrorist Decision Making , 2003 .

[159]  E. Brunswik,et al.  The Conceptual Framework of Psychology , 1954 .

[160]  Marinos E. Tsigas,et al.  Impacts of Better Trade Facilitation in Developing Countries: Analysis with a New GTAP Database for the Value of Time in Trade , 2008 .

[161]  H. Edward Price,et al.  The Strategy and Tactics of Revolutionary Terrorism , 1977, Comparative Studies in Society and History.

[162]  Xiaojun Shan,et al.  Subsidizing to disrupt a terrorism supply chain—a four-player game , 2014, J. Oper. Res. Soc..

[163]  Gary H. McClelland,et al.  The Effect of Risk Beliefs on Property Values: A Case Study of a Hazardous Waste Site1 , 1990 .

[164]  Peter J. Lambert,et al.  Inequality Decomposition Analysis and the Gini Coefficient Revisited , 1993 .

[165]  Richard E. Wilson,et al.  COMBATING TERRORISM: AN EVENT TREE APPROACH , 2003 .

[166]  A. Raftery,et al.  Discussion: Performance of Bayesian Model Averaging , 2003 .

[167]  Harvey E. Lapan,et al.  To Bargain or Not to Bargain: That is the Question , 1988 .

[168]  Hamid Mohtadi,et al.  The risk of catastrophic terrorism: an extreme value approach , 2009 .

[169]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[170]  M. Wardman Review and meta-analysis of U.K. time elasticities of travel demand , 2012 .

[171]  W. Adger Social and ecological resilience: are they related? , 2000 .

[172]  Peter Auer,et al.  The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..

[173]  Marco Zaffalon,et al.  Bayesian Networks with Imprecise Probabilities: Theory and Application to Classification , 2012 .

[174]  Niyazi Onur Bakir,et al.  Is Better Nuclear Weapon Detection Capability Justified? , 2011 .

[175]  M. Morgan,et al.  Categorizing Risks for Risk Ranking , 2000, Risk analysis : an official publication of the Society for Risk Analysis.

[176]  Bilal M Ayyub,et al.  Risk analysis for critical asset protection. , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[177]  David Lindley Scoring rules and the inevitability of probability , 1982 .

[178]  F. Scholz Maximum Likelihood Estimation , 2006 .

[179]  Seokjin Kim,et al.  Facility location for large-scale emergencies , 2010, Ann. Oper. Res..

[180]  Santosh S. Vempala,et al.  Solving convex programs by random walks , 2004, JACM.

[181]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[182]  Ortwin Renn,et al.  The Social Amplification of Risk: A Conceptual Framework , 1988 .

[183]  Daphne Koller,et al.  Multi-Agent Influence Diagrams for Representing and Solving Games , 2001, IJCAI.

[184]  Robin L. Dillon,et al.  How Near-Miss Events Amplify or Attenuate Risky Decision Making , 2012, Manag. Sci..

[185]  Lawrence D. Phillips,et al.  Advances in Decision Analysis: Decision Conferencing , 2007 .

[186]  Xiaojun Shan,et al.  Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..

[187]  Martin W. P. Savelsbergh,et al.  Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..

[188]  Heather Rosoff,et al.  The Dynamics of Evolving Beliefs, Concerns Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative Archival Samples , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[189]  W. Leontief Quantitative Input and Output Relations in the Economic Systems of the United States , 1936 .

[190]  A. Rose Economic Resilience to Disasters , 2009 .

[191]  Edward H. Kaplan,et al.  Terror Queues , 2010, Oper. Res..

[192]  R. Farrow,et al.  A missing error term in benefit-cost analysis. , 2012, Environmental science & technology.

[193]  J. Corsi,et al.  Terrorism as a Desperate Game , 1981 .

[194]  Maria E. Mayorga,et al.  The minimum p-envy location problem: a new model for equitable distribution of emergency resources , 2011 .

[195]  J. Dyer Remarks on the analytic hierarchy process , 1990 .

[196]  Andrew Schmitz,et al.  Applied welfare economics , 2008 .

[197]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[198]  N. Megiddo,et al.  The Maximum Coverage Location Problem , 1983 .

[199]  Erin Miller Patterns of Onset and Decline Among Terrorist Organizations , 2012 .

[200]  Moshe Kress,et al.  Operational effectiveness of suicide-bomber-detector schemes: a best-case analysis. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[201]  J. Handmer,et al.  Uncertainty, sustainability and change☆ , 1992 .

[202]  R. Keeney,et al.  Advances in Decision Analysis: Practical Value Models , 2007 .

[203]  Andrea L. Bertozzi,et al.  c ○ World Scientific Publishing Company A STATISTICAL MODEL OF CRIMINAL BEHAVIOR , 2008 .

[204]  James H. Lambert,et al.  Risks of Cyber Attack to Water Utility Supervisory Control and Data Acquisition Systems , 2001 .

[205]  V. Bier,et al.  Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[206]  Lauri Ojala,et al.  Trade Logistics in the Global Economy: The Logistics Performance Index and Its Indicators , 2016 .

[207]  Seth D. Guikema,et al.  Robust Adversarial Risk Analysis: A Level-k Approach , 2012, Decis. Anal..

[208]  Raymond J. Burby,et al.  Creating Hazard Resilient Communities through Land-Use Planning , 2000 .

[209]  Mark S. Daskin,et al.  Stochastic p-robust location problems , 2006 .

[210]  David R. Anderson,et al.  Model selection and multimodel inference : a practical information-theoretic approach , 2003 .

[211]  Kjell Hausken,et al.  Defending against multiple different attackers , 2011, Eur. J. Oper. Res..

[212]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[213]  A. Abbas General decompositions of multiattribute utility functions with partial utility independence , 2010 .

[214]  Manish Jain,et al.  Game theory for security: Key algorithmic principles, deployed systems, lessons learned , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[215]  Harvey Waterman,et al.  Reasons and Reason: Collective Political Activity in Comparative and Historical Perspective , 1981, World Politics.

[216]  P. Dixon,et al.  Validating a Detailed, Dynamic CGE Model of the USA , 2010 .

[217]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[218]  K. Hausken Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[219]  William D. Nordhaus,et al.  The Economics of Hurricanes in the United States , 2006 .

[220]  Bintong Chen,et al.  Minmax‐regret robust 1‐median location on a tree , 1998 .

[221]  Steven E. Plaut Misplaced Applications of Economic Theory to the Middle East , 2004 .

[222]  Adam Rose,et al.  ESTIMATING THE ECONOMIC CONSEQUENCES OF A PORT SHUTDOWN: THE SPECIAL ROLE OF RESILIENCE , 2013 .

[223]  Richard L. Church,et al.  The Team/Fleet Models for Simultaneous Facility and Equipment Siting , 1979 .

[224]  Henry H. Willis,et al.  The validity of the preference profiles used for evaluating impacts in the Dutch National Risk Assessment , 2012 .

[225]  Vincent T. Covello,et al.  Risk communication, the West Nile virus epidemic, and bioterrorism: responding to the commnication challenges posed by the intentional or unintentional release of a pathogen in an urban setting , 2001, Journal of Urban Health.

[226]  Manfred K. Warmuth,et al.  The Weighted Majority Algorithm , 1994, Inf. Comput..

[227]  Martin Johnson,et al.  Economy-Wide Effects of Reducing Illegal Immigrants in U.S. Employment , 2011 .

[228]  Gregory S. Parnell,et al.  Handbook of Decision Analysis: Parnell/Handbook of Decision Analysis , 2013 .

[229]  D. Ball,et al.  Further Thoughts on the Utility of Risk Matrices , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[230]  David Hummels,et al.  Time as a Trade Barrier , 2002, GTAP Working Paper.

[231]  Jonathan Shalev,et al.  Loss aversion equilibrium , 2000, Int. J. Game Theory.

[232]  Richard S. John,et al.  Assessment of Cost Uncertainties for Large Technology Projects: A Methodology and an Application , 2002, Interfaces.

[233]  A. Nizam,et al.  Containing Bioterrorist Smallpox , 2002, Science.

[234]  H. J. Einhorn The use of nonlinear, noncompensatory models in decision making. , 1970, Psychological bulletin.

[235]  Claire J. Tomlin,et al.  Safe and reliable coverage control , 2013 .

[236]  V. Bier Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[237]  Daniel Kahneman,et al.  Availability: A heuristic for judging frequency and probability , 1973 .

[238]  C. Allin Cornell,et al.  Seismic Risk Analysis of Boston , 1975 .

[239]  D. Winterfeldt,et al.  Cognitive Components of Risk Ratings , 1981 .

[240]  Matthew G. Bunn,et al.  A Mathematical Model of the Risk of Nuclear Terrorism , 2006 .

[241]  Todd Sandler,et al.  The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.

[242]  Jeffrey D. Berejikian A Cognitive Theory of Deterrence , 2002 .

[243]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[244]  Sarit Kraus,et al.  Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..

[245]  Kiseop Lee,et al.  T-Statistics for Weighted Means in Credit Risk Modelling , 2005 .

[246]  Zheng Cao,et al.  Optimal Stopping Analysis of a Radiation Detection System to Protect Cities from a Nuclear Terrorist Attack , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[247]  A. Rose Input-output economics and computable general equilibrium models , 1995 .

[248]  Milind Tambe,et al.  Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers , 2013, GameSec.

[249]  Abdollah Shafieezadeh,et al.  A decision framework for managing risk to airports from terrorist attack. , 2015, Risk analysis : an official publication of the Society for Risk Analysis.

[250]  Laurent El Ghaoui,et al.  Robust Control of Markov Decision Processes with Uncertain Transition Matrices , 2005, Oper. Res..

[251]  S. Brock Blomberg,et al.  Total Economic Consequences of Terrorist Attacks: Insights from 9/11 , 2010 .

[252]  Detlof von Winterfeldt,et al.  Meeting the Challenges of Terrorism Risk Analysis , 2007 .

[253]  Adam Rose,et al.  Regional Economic Impacts of a Verdugo Scenario Earthquake Disruption of Los Angeles Water Supplies: A Computable General Equilibrium Analysis , 2011 .

[254]  J. Shoven,et al.  Applied General Equilibrium Models of Taxation and International Trade , 1983 .

[255]  Michael D. White Port of Los Angeles , 2008 .

[256]  D. Kahneman,et al.  Timid choices and bold forecasts: a cognitive perspective on risk taking , 1993 .

[257]  W. RobertsBryan,et al.  The Macroeconomic Impacts of the 9/11 Attack: Evidence from Real-Time Forecasting , 2009 .

[258]  A. Rose,et al.  Economic Consequence Analysis of Disasters , 2017 .

[259]  Harry W. Richardson,et al.  Refining the Isard Multiregional Input–Output Model: Theory, Operationality and Extensions , 2015 .

[260]  K. Arrow,et al.  Determining Benefits and Costs for Future Generations , 2013, Science.

[261]  Harry W. Richardson,et al.  The State‐by‐State Economic Impacts of the 2002 Shutdown of the Los Angeles–Long Beach Ports , 2008 .

[262]  Donald E. Geis,et al.  By Design: The Disaster Resistant and Quality-of-Life Community , 2000 .

[263]  Jr. Louis Anthony Cox,et al.  Game Theory and Risk Analysis , 2009 .

[264]  Robert T. Clemen,et al.  Subjective Probability Assessment in Decision Analysis: Partition Dependence and Bias Toward the Ignorance Prior , 2005, Manag. Sci..

[265]  Adam Rose,et al.  The role of nursing profession in biodefense , 2013 .

[266]  Adam Rose,et al.  Journal of Homeland Security and Emergency Management A Framework for Analyzing the Total Economic Impacts of Terrorist Attacks and Natural Disasters , 2011 .

[267]  Gernot D. Kleiter,et al.  Propagating Imprecise Probabilities in Bayesian Networks , 1996, Artif. Intell..

[268]  Robin L Dillon,et al.  Why Near‐Miss Events Can Decrease an Individual's Protective Response to Hurricanes , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[269]  Rong Yang,et al.  Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..

[270]  Arkadi Nemirovski,et al.  Robust optimization – methodology and applications , 2002, Math. Program..

[271]  Robert G. Sargent,et al.  Verification and validation of simulation models , 2013, Proceedings of Winter Simulation Conference.

[272]  Lawrence J. Axelrod,et al.  Characterizing perception of ecological risk. , 1995, Risk analysis : an official publication of the Society for Risk Analysis.

[273]  Kaan Ozbay,et al.  Emergency inventory management for disasters--a review. , 2014, Journal of emergency management.

[274]  C. Revelle,et al.  A Lagrangean heuristic for the maximal covering location problem , 1996 .

[275]  K. Boyer,et al.  American Trucking, NAFTA, and the Cost of Distance , 1997 .

[276]  D. Earn,et al.  Group interest versus self-interest in smallpox vaccination policy , 2003, Proceedings of the National Academy of Sciences of the United States of America.

[277]  Rae Zimmerman,et al.  Analysis of Electrical Power and Oil and Gas Pipeline Failures , 2007, Critical Infrastructure Protection.

[278]  Ali E. Abbas,et al.  Normative decision making with multiattribute performance targets , 2009 .

[279]  Louise K. Comfort,et al.  Risk and Resilience: Inter‐organizational Learning Following the Northridge Earthquake of 17 January 1994 , 1994 .

[280]  Seth D. Guikema,et al.  Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .

[281]  S. Carpenter,et al.  Social-Ecological Resilience to Coastal Disasters , 2005, Science.

[282]  Alain Chateauneuf,et al.  Choice under uncertainty with the best and worst in mind: Neo-additive capacities , 2007, J. Econ. Theory.

[283]  Stephanie E. Chang,et al.  Measuring Improvements in the Disaster Resilience of Communities , 2004 .

[284]  Vicki M. Bier,et al.  Probabilistic risk analysis , 2017 .

[285]  C. V. Anderson,et al.  The Federal Emergency Management Agency (FEMA) , 2002 .

[286]  Gregory Levitin,et al.  Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts , 2009, IEEE Transactions on Reliability.

[287]  Marizio Falcone,et al.  Discrete time high-order schemes for viscosity solutions of Hamilton-Jacobi-Bellman equations , 1994 .

[288]  Glyn Wittwer,et al.  Economic Modeling of Water: The Australian CGE Experience , 2012 .

[289]  J. March,et al.  Learning from Samples of One or Fewer , 1991 .

[290]  Louis Anthony (Tony) Cox,et al.  Some Limitations of Qualitative Risk Rating Systems , 2005, Risk analysis : an official publication of the Society for Risk Analysis.

[291]  James H Lambert,et al.  A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[292]  Erwann O. Michel-Kerjan,et al.  Terrorisme à grande échelle partage de risques et politiques publiques , 2003 .

[293]  Harvey E. Lapan,et al.  Terrorism and signalling , 1993 .

[294]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[295]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[296]  D. Winterfeldt On the Relevance of Behavioral Decision Research for Decision Analysis , 1999 .

[297]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[298]  Milind Tambe,et al.  "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.

[299]  Bernard Harris Mathematical methods in combatting terrorism. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[300]  Richard Scheines,et al.  Constructing Bayesian Network Models of Gene Expression Networks from Microarray Data , 2000 .

[301]  Sarit Kraus,et al.  Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.

[302]  A. Rose DEFINING AND MEASURING ECONOMIC RESILIENCE TO DISASTERS , 2004 .

[303]  Robin L. Dillon,et al.  Evolving Risk Perceptions About Near-Miss Terrorist Events , 2014, Decis. Anal..

[304]  K. Arrow,et al.  Capital-labor substitution and economic efficiency , 1961 .

[305]  Detlof von Winterfeldt,et al.  Managing Potential Health Risks from Electric Powerlines: A Decision Analysis Caught in Controversy , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[306]  Leonard J. Savage,et al.  The Theory of Statistical Decision , 1951 .

[307]  Carl S. Spetzler Advances in Decision Analysis: Building Decision Competency in Organizations , 2007 .

[308]  C. Folke RESILIENCE: THE EMERGENCE OF A PERSPECTIVE FOR SOCIAL-ECOLOGICAL SYSTEMS ANALYSES , 2006 .

[309]  Peter B. Dixon,et al.  Effects on the U.S. of an H1N1 Epidemic: Analysis with a Quarterly CGE Model , 2010 .

[310]  V. Crawford Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions , 2003 .

[311]  Ali E. Abbas,et al.  One-Switch Conditions for Multiattribute Utility Functions , 2012, Oper. Res..

[312]  Jeffrey D. Berejikian Model Building With Prospect Theory: A Cognitive Approach to International Relations , 2002 .

[313]  Robert Powell,et al.  Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..

[314]  N. Abrahamson,et al.  On the Use of Logic Trees for Ground-Motion Prediction Equations in Seismic-Hazard Analysis , 2005 .

[315]  J. Harsanyi Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .

[316]  Ronald A. Howard,et al.  Decision analysis: practice and promise , 1988 .

[317]  Yacov Y Haimes,et al.  On the Definition of Vulnerabilities in Measuring Risks to Infrastructures , 2006, Risk analysis : an official publication of the Society for Risk Analysis.

[318]  Garrett R. Asay,et al.  The Economic Impacts of the September 11 Terrorist Attacks: A Computable General Equilibrium Analysis , 2009 .

[319]  Reinhard Selten,et al.  Evolutionary stability in extensive two-person games - correction and further development , 1988 .

[320]  C. S. Holling Resilience and Stability of Ecological Systems , 1973 .

[321]  Bo An,et al.  Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.

[322]  Maged M. Dessouky,et al.  Solution approaches for facility location of medical supplies for large-scale emergencies , 2007, Comput. Ind. Eng..

[323]  Peter Dixon,et al.  Restricting Employment of Low‐Paid Immigrants: A General Equilibrium Assessment of the Social Welfare Implications for Legal U.S. Wage‐Earners , 2014 .

[324]  Milind Tambe,et al.  Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.

[325]  Craig R. Fox,et al.  Partition Priming in Judgment Under Uncertainty , 2003, Psychological science.

[326]  P. Walkenhorst,et al.  Quantitative Assessment of the Benefits of Trade Facilitation , 2004 .

[327]  Robert Powell,et al.  Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.

[328]  Donald A Henderson,et al.  Contact vaccinia--transmission of vaccinia from smallpox vaccination. , 2002, JAMA.

[329]  Craig McLean,et al.  Transnational & Comparative Curricular Offerings in U.S. Post-Baccalaureate Programs: Benchmarking a Link from the U.S. to the EU in Homeland Security Education , 2011 .

[330]  Gregory M. Paoli,et al.  Modeling the public health system response to a terrorist event in the food supply. , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[331]  Peter B. Dixon,et al.  The Economy-Wide Effects in the United States of Replacing Crude Petroleum with Biomass , 2007 .

[332]  Robert T. Clemen,et al.  Making Hard Decisions with DecisionTools , 2013 .

[333]  W. McEneaney,et al.  Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind , 2006 .

[334]  Vicki M. Bier,et al.  Target-oriented utility theory for modeling the deterrent effects of counterterrorism , 2015, Reliab. Eng. Syst. Saf..

[335]  B. Fischhoff,et al.  How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits , 1978 .

[336]  Richard Gonzalez,et al.  Curvature of the Probability Weighting Function , 1996 .

[337]  A. Haurie,et al.  Sequential Stackelberg equilibria in two-person games , 1985 .

[338]  Jayavel Sounderpandian,et al.  Ex Ante Equity in Public Risk , 1989, Oper. Res..

[339]  David Lindley,et al.  Plural analysis: Multiple approaches to quantitative research , 1986 .

[340]  Ralph L. Keeney,et al.  Generating Objectives: Can Decision Makers Articulate What They Want? , 2008, Manag. Sci..

[341]  David L. Craft,et al.  Emergency response to a smallpox attack: The case for mass vaccination , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[342]  Tito Homem-de-Mello,et al.  Risk-adjusted budget allocation models with application in homeland security , 2011 .

[343]  Rae Zimmerman,et al.  Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[344]  Gerald G. Brown,et al.  How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[345]  Dan Wei,et al.  Economy-wide impacts of reduced wait times at U.S. international airports , 2015 .

[346]  A. Tversky,et al.  Support theory: A nonextensional representation of subjective probability. , 1994 .

[347]  Susan E. Martonosi,et al.  Evaluating the Viability of 100 Per Cent Container Inspection at America's Ports , 2005 .

[348]  Baruch Awerbuch,et al.  Online linear optimization and adaptive routing , 2008, J. Comput. Syst. Sci..

[349]  K. Arrow,et al.  Uncertainty and the Evaluation of Public Investment Decisions , 2014 .

[350]  Jörgen W. Weibull,et al.  Testing Game Theory , 2004 .

[351]  L. Goulder,et al.  The Substantial Bias from Ignoring General Equilibrium Effects in Estimating Excess Burden, and a Practical Solution , 2003, Journal of Political Economy.

[352]  Louis Anthony Tony Cox,et al.  Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks , 2008 .

[353]  H. Simon,et al.  Rational choice and the structure of the environment. , 1956, Psychological review.

[354]  D. Winterfeldt,et al.  Cognitive and Motivational Biases in Decision and Risk Analysis , 2015, Risk analysis : an official publication of the Society for Risk Analysis.

[355]  John A. Major Advanced Techniques for Modeling Terrorism Risk , 2002 .

[356]  Lawrence M. Wein,et al.  OR Forum - Homeland Security: From Mathematical Models to Policy Implementation: The 2008 Philip McCord Morse Lecture , 2009, Oper. Res..

[357]  Maged M. Dessouky,et al.  Perishable inventory management system with a minimum volume constraint , 2011, J. Oper. Res. Soc..

[358]  T. Saaty How to Make a Decision: The Analytic Hierarchy Process , 1990 .

[359]  J. Eto,et al.  Understanding the cost of power interruptions to U.S. electricity consumers , 2004 .

[360]  A. Rose Economic resilience to natural and man-made disasters: Multidisciplinary origins and contextual dimensions , 2007 .

[361]  A. Tversky Elimination by aspects: A theory of choice. , 1972 .

[362]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[363]  Claire J. Tomlin,et al.  Monotone Approximations of Minimum and Maximum Functions and Multi-objective Problems , 2012 .

[364]  H. Kunreuther,et al.  IDS Models of Airline Security , 2005 .

[365]  Dusan M. Stipanovic,et al.  Multiattribute Utility Copulas for Multi-objective Coverage Control , 2014, Paladyn J. Behav. Robotics.

[366]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[367]  Adam Rose,et al.  INPUT-OUTPUT STRUCTURAL DECOMPOSITION ANALYSIS: A CRITICAL APPRAISAL , 1996 .

[368]  Ali E. Abbas,et al.  Utility Copula Functions Matching All Boundary Assessments , 2013, Oper. Res..

[369]  Adam Rose,et al.  Economic Impacts of Potential Foot and Mouth Disease Agroterrorism in the USA: A General Equilibrium Analysis , 2012 .

[370]  Xiaojun Shan,et al.  Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection - A Three-Stage Game , 2014, Decis. Anal..

[371]  G F Cooper,et al.  A New Prior for Bayesian Anomaly Detection , 2009, Methods of Information in Medicine.

[372]  H. J. Einhorn Use of nonlinear, noncompensatory models as a function of task and amount of information , 1971 .

[373]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[374]  Benjamin Van Roy,et al.  On Constraint Sampling in the Linear Programming Approach to Approximate Dynamic Programming , 2004, Math. Oper. Res..

[375]  Michel Bruneau,et al.  A Framework to Quantitatively Assess and Enhance the Seismic Resilience of Communities , 2003 .

[376]  Ashley Winston,et al.  Textile and Apparel Barriers and Rules of Origin: What’s Left to Gain after the Agreement on Textiles and Clothing? , 2008 .

[377]  James A Giesecke,et al.  Development of a Large-scale Single US Region CGE Model using IMPLAN Data: A Los Angeles County Example with a Productivity Shock Application , 2011 .

[378]  Harry W. Richardson,et al.  The Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced Impacts , 2013 .

[379]  Peter B. Dixon,et al.  You can't have a CGE recession without excess capacity , 2011 .

[380]  John C. McDonald,et al.  Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..

[381]  D. Paton,et al.  Disasters and communities: vulnerability, resilience and preparedness , 2001 .

[382]  Victor Richmond R. Jose,et al.  Technology Adoption, Accumulation, and Competition in Multiperiod Attacker-Defender Games , 2013 .

[383]  Mark Phelps DO SAMS POSE A REAL THREAT TO CIVIL AVIATION , 2003 .

[384]  Elisabeth Krausmann,et al.  An economic framework for the development of a resilience index for business recovery , 2013 .

[385]  Mathew D. McCubbins,et al.  The Theory of Minds Within the Theory of Games , 2012 .

[386]  Peter Auer,et al.  Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.

[387]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[388]  L. J. Savage,et al.  The Foundations of Statistics , 1955 .

[389]  D. Winterfeldt,et al.  Comparing Hierarchical and Nonhierarchical Weighting Methods for Eliciting Multiattribute Value Models , 1987 .

[390]  Jason C. Kinnell,et al.  Expert and Layperson Perceptions of Ecosystem Risk , 2000, Risk analysis : an official publication of the Society for Risk Analysis.

[391]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[392]  Jun Zhuang,et al.  Balancing congestion and security in the presence of strategic applicants with private information , 2011, Eur. J. Oper. Res..

[393]  R. Keeney,et al.  Eliciting public values for complex policy decisions , 1990 .

[394]  Henry H. Willis,et al.  Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[395]  Bryan C. Price,et al.  Targeting Top Terrorists: How Leadership Decapitation Contributes to Counterterrorism , 2012, International Security.

[396]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[397]  David E. Bell,et al.  Multiattribute Utility Functions: Decompositions Using Interpolation , 1979 .

[398]  Park JiYoung,et al.  Identifying the Regional Economic Impacts of 9/11 , 2009 .

[399]  W. Edwards,et al.  Conservatism in a simple probability inference task. , 1966, Journal of experimental psychology.

[400]  Charles ReVelle,et al.  Concepts and applications of backup coverage , 1986 .

[401]  J. M. Smith The theory of games and the evolution of animal conflicts. , 1974, Journal of theoretical biology.

[402]  P. Dixon,et al.  The Us Economy from 1992 to 1998: Results from a Detailed CGE Model , 2004 .

[403]  Maged Dessouky,et al.  A modeling framework for facility location of medical services for large-scale emergencies , 2007 .

[404]  Maged Dessouky,et al.  The Stochastic Vehicle Routing Problem for Minimum Unmet Demand , 2009 .

[405]  Heather Rosoff,et al.  Should I stay or should I go? An experimental study of health and economic government policies following a severe biological agent release , 2013, Environment Systems & Decisions.

[406]  Karl-Dieter Opp,et al.  Rational Choice and Rebellious Collective Action , 1986, American Political Science Review.

[407]  Simon M. Lucas,et al.  A Survey of Monte Carlo Tree Search Methods , 2012, IEEE Transactions on Computational Intelligence and AI in Games.

[408]  Jie Zhang,et al.  TOWARDS A NEW FRAMEWORK FOR ACCOUNTING AND MODELLING THE REGIONAL AND LOCAL IMPACTS OF TOURISM , 2010 .

[409]  Adam Rose,et al.  Modeling a major source of economic resilience to disasters: recapturing lost production , 2011 .

[410]  D. McFadden Quantal Choice Analysis: A Survey , 1976 .

[411]  Dusan M. Stipanovic,et al.  Control Strategies for Players in Pursuit-Evasion Games Based on their Preferences , 2014, IGTR.

[412]  Bartholomew Elias,et al.  Homeland Security: Protecting Airliners from Terrorist Missiles , 2006 .

[413]  Ali E. Abbas,et al.  One-Switch Independence for Multiattribute Utility Functions , 2011, Oper. Res..

[414]  Gerald G. Brown,et al.  When Is Uncertainty About Uncertainty Worth Characterizing? , 2008, Interfaces.

[415]  H. Akaike A new look at the statistical model identification , 1974 .

[416]  Ralph L. Keeney,et al.  Understanding Life-Threatening Risks , 1995 .

[417]  Samrat Chatterjee,et al.  A framework for analyzing the economic tradeoffs between urban commerce and security against terrorism. , 2014, Risk analysis : an official publication of the Society for Risk Analysis.

[418]  Peter B. Dixon,et al.  THE ECONOMIC COSTS TO THE U.S. OF CLOSING ITS BORDERS: A COMPUTABLE GENERAL EQUILIBRIUM ANALYSIS , 2011 .

[419]  Roger Frost,et al.  International Organization for Standardization (ISO) , 2004 .

[420]  Robin L. Dillon,et al.  How Near-Misses Influence Decision Making Under Risk: A Missed Opportunity for Learning , 2008, Manag. Sci..

[421]  Ali E. Abbas,et al.  Multiattribute Utility Copulas , 2009, Oper. Res..

[422]  Herbert Hamers,et al.  Operations research games: A survey , 2001 .

[423]  Howard Kunreuther,et al.  Modeling Interdependent Risks , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[424]  Thomas R. Palfrey,et al.  Heterogeneous quantal response equilibrium and cognitive hierarchies , 2006, J. Econ. Theory.

[425]  Vincent Conitzer,et al.  Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.

[426]  D. von Winterfeldt,et al.  Identifying and Structuring the Objectives of Terrorists , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[427]  M. Elisabeth Paté-Cornell Warning Systems and Risk Reduction , 1985 .

[428]  Marshall A. Wise,et al.  International Equity and Differentiation in Global Warming Policy , 1998 .

[429]  Erwann Michel-Kerjan Effective risk response needs a prepared mindset , 2015, Nature.

[430]  P. Fishburn,et al.  Dispersive equity and social risk , 1991 .

[431]  JiYoung Park The Economic Impacts of Dirty Bomb Attacks on the Los Angeles and Long Beach Ports: Applying the Supply-Driven NIEMO (National Interstate Economic Model) , 2008 .

[432]  Dimitris Bertsimas,et al.  The Price of Fairness , 2011, Oper. Res..

[433]  Chen Wang,et al.  Impact of intelligence on target-hardening decisions , 2009, 2009 IEEE Conference on Technologies for Homeland Security.

[434]  Steve Leach,et al.  Transmission potential of smallpox in contemporary populations , 2001, Nature.

[435]  János Aczél,et al.  The Role of Some Functional Equations in Decision Analysis , 2010, Decis. Anal..

[436]  Richard Mesic,et al.  Implementing Security Improvement Options at Los Angeles International Airport , 2006 .

[437]  Ward Edwards,et al.  Conservatism in Complex Probabilistic Inference , 1966 .

[438]  M. Douglas,et al.  Terrorism: A Positive Feedback Game , 2003 .

[439]  Winston Harrington,et al.  On the Accuracy of Regulatory Cost Estimates , 2000 .

[440]  Alvin E. Roth,et al.  Predictive value and the usefulness of game theoretic models , 2002 .

[441]  P. Fishburn Foundations of decision analysis along the way , 1989 .

[442]  Jun Zhuang,et al.  Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[443]  T. Sandler,et al.  A Theoretical Analysis of Transnational Terrorism , 1983, American Political Science Review.

[444]  George Horwich,et al.  Economic Lessons of the Kobe Earthquake , 2000, Economic Development and Cultural Change.

[445]  Eric F. Taquechel,et al.  Validation of rational deterrence theory : analysis of U.S. government and adversary risk propensity and relative emphasis on gain or loss , 2010 .

[446]  A. Tversky,et al.  Contingent weighting in judgment and choice , 1988 .

[447]  R. L. Keeney,et al.  Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.

[448]  R. Howard On Making Life and Death Decisions , 1980 .

[449]  Louis Anthony Cox,et al.  Making Terrorism Risk Analysis Less Harmful and More Useful: Another Try , 2011 .

[450]  Ali E. Abbas,et al.  Attribute Dominance Utility , 2005, Decis. Anal..

[451]  A. Lemieux Situational prevention of poaching , 2014 .

[452]  T. Bedford,et al.  Probabilistic Risk Analysis: Foundations and Methods , 2001 .

[453]  Paul Gill,et al.  Comparing Role-Specific Terrorist Profiles , 2011 .

[454]  Robert F. Bordley,et al.  Effective utility functions induced by organizational target‐based incentives , 2009 .

[455]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[456]  Heidi J. Albers,et al.  Spatial modeling of extraction and enforcement in developing country protected areas , 2010 .

[457]  Werling Jeffrey,et al.  Macroeconomic and Industry Impacts of 9/11: An Interindustry Macroeconomic Approach , 2009 .

[458]  W. Edwards,et al.  Decision Analysis and Behavioral Research , 1986 .

[459]  Milind Tambe,et al.  Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries , 2014, GameSec.

[460]  Henry H. Willis,et al.  Ecological Risk Ranking: Development and Evaluation of a Method for Improving Public Participation in Environmental Decision Making , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[461]  Peter C. Fishburn,et al.  Equity Axioms for Public Risks , 1984, Oper. Res..

[462]  Juliane Hahn,et al.  Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .

[463]  Peter B. Dixon,et al.  Economywide Implications from US Bioenergy Expansion , 2010 .

[464]  R. Selten,et al.  A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .

[465]  L. Robin Keller,et al.  Fair Processes for Societal Decisions Involving Distributional Inequalities , 1995 .

[466]  Charles Vlek,et al.  How Solid Is the Dutch (and the British) National Risk Assessment? Overview and Decision‐Theoretic Evaluation , 2013, Risk analysis : an official publication of the Society for Risk Analysis.