Defender–Attacker Decision Tree Analysis to Combat Terrorism
暂无分享,去创建一个
[1] Alexandre M. Bayen,et al. A time-dependent Hamilton-Jacobi formulation of reachable sets for continuous dynamic games , 2005, IEEE Transactions on Automatic Control.
[2] Ralph L. Keeney,et al. Advances in Decision Analysis: Developing Objectives and Attributes , 2007 .
[3] David R. Godschalk,et al. Urban Hazard Mitigation: Creating Resilient Cities , 2003 .
[4] James Yetman,et al. SUICIDAL TERRORISM AND DISCRIMINATORY SCREENING: AN EFFICIENCY‐EQUITY TRADE‐OFF , 2004 .
[5] Robert J. Nicholls,et al. Resilience to natural hazards: How useful is this concept? , 2003 .
[6] D. Kahneman. A perspective on judgment and choice: mapping bounded rationality. , 2003, The American psychologist.
[7] C. Everett Koop. "Prepared Statement Presented before the House Subcommittee on Health and the Environment of the House Committee on Energy and Commerce, Washington, DC" [Reminiscence] , 2003 .
[8] Kenneth O. Kortanek,et al. A Central Cutting Plane Algorithm for Convex Semi-Infinite Programming Problems , 1993, SIAM J. Optim..
[9] A. Tversky,et al. Advances in prospect theory: Cumulative representation of uncertainty , 1992 .
[10] A. Tversky,et al. Subjective Probability: A Judgment of Representativeness , 1972 .
[11] Hirokazu Tatano,et al. Estimation of Lifeline Resilience Factors Based on Surveys of Japanese Industries , 2009 .
[12] G. Woo. Quantitative Terrorism Risk Assessment , 2002 .
[13] Bo An,et al. GUARDS and PROTECT: next generation applications of security games , 2011, SECO.
[14] Harry W. Richardson,et al. A two-step approach to estimating state-to-state commodity trade flows , 2009 .
[15] W. Kip Viscusi. The risks of terrorism , 2003 .
[16] Peter H. Farquhar,et al. A Fractional Hypercube Decomposition Theorem for Multiattribute Utility Functions , 1975, Oper. Res..
[17] Peter C. Fishburn,et al. Approximations of Two-Attribute Utility Functions , 1977, Math. Oper. Res..
[18] Peter B. Dixon,et al. Dynamic general equilibrium modelling for forecasting and policy : a practical guide and documentation of MONASH , 2002 .
[19] Vicki M. Bier,et al. A study of expert overconfidence , 2008, Reliab. Eng. Syst. Saf..
[20] Gregory S Parnell,et al. Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[21] Colin Parish,et al. Think the unthinkable. , 2008, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[22] Jason R. W. Merrick,et al. A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[23] Richard Gonzalez,et al. On the Shape of the Probability Weighting Function , 1999, Cognitive Psychology.
[24] Sarit Kraus,et al. Bayesian stackelberg games and their application for security at Los Angeles international airport , 2008, SECO.
[25] Fernando Ordóñez,et al. Security routing games with multivehicle Chinese postman problem , 2014, Networks.
[26] K. R. Hammond. Probabilistic functioning and the clinical method. , 1955, Psychological review.
[27] John R. Madden,et al. The impact of the 2002–2003 drought on Australia , 2005 .
[28] Kelly E. See,et al. Between ignorance and truth: Partition dependence and learning in judgment under uncertainty. , 2006, Journal of experimental psychology. Learning, memory, and cognition.
[29] P Slovic,et al. Assessment of the Regional Economic Impacts of Catastrophic Events: CGE Analysis of Resource Loss and Behavioral Effects of an RDD Attack Scenario , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[30] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[31] P. Slovic. Perception of risk. , 1987, Science.
[32] Lawrence M Wein,et al. Analyzing Evacuation Versus Shelter‐in‐Place Strategies After a Terrorist Nuclear Detonation , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[33] S. Kaplan,et al. On The Quantitative Definition of Risk , 1981 .
[34] Ali E. Abbas. Invariant multiattribute utility functions , 2010 .
[35] Stuart Shapiro,et al. The Benefit-Cost Analysis of Security Focused Regulations , 2009 .
[36] Chen Wang,et al. Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility , 2011, Decis. Anal..
[37] Adam Rose,et al. Business Interruption Impacts of a Terrorist Attack on the Electric Power System of Los Angeles: Customer Resilience to a Total Blackout , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[38] Bo An,et al. A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard , 2013, Interfaces.
[39] Scott Farrow,et al. Towards Principles and Standards for the Benefit-Cost Analysis of Safety , 2011 .
[40] Ulrich Schmidt,et al. Additive Utility in Prospect Theory , 2009, Manag. Sci..
[41] O. Holsti,et al. Essence of Decision: Explaining the Cuban Missile Crisis , 1972 .
[42] A. Rose,et al. Modeling Regional Economic Resilience to Disasters: A Computable General Equilibrium Analysis of Water Service Disruptions , 2005 .
[43] S. Galea,et al. Measuring Capacities for Community Resilience , 2010 .
[44] R. Duncan Luce,et al. Individual Choice Behavior , 1959 .
[45] C. Starr. Social benefit versus technological risk. , 1969, Science.
[46] Jun Zhuang,et al. Robustness of Optimal Defensive Resource Allocations in the Face of Less Fully Rational Attacker , 2009 .
[47] Nevin Lianwen Zhang,et al. Probabilistic Inference in Influence Diagrams , 1998, Comput. Intell..
[48] Howard Kunreuther,et al. Is imprecise knowledge better than conflicting expertise? Evidence from insurers’ decisions in the United States , 2010 .
[49] Max Abrahms,et al. What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy , 2008, International Security.
[50] J. Quiggin. A theory of anticipated utility , 1982 .
[51] Ronald A. Howard,et al. Information Value Theory , 1966, IEEE Trans. Syst. Sci. Cybern..
[52] Patrick D. Larkey,et al. Subjective Probability and the Theory of Games , 1982 .
[53] Naira Hovakimyan,et al. Guaranteed Strategies for nonlinear Multi-Player Pursuit-Evasion Games , 2010, IGTR.
[54] Scott Ferson,et al. Varying correlation coefficients can underestimate uncertainty in probabilistic models , 2006, Reliab. Eng. Syst. Saf..
[55] Gerald G. Brown,et al. A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..
[56] Sheldon Howard Jacobson,et al. Assessing the impact of deterrence on aviation checked baggage screening strategies , 2005 .
[57] R. Nickerson. Confirmation Bias: A Ubiquitous Phenomenon in Many Guises , 1998 .
[58] John A. Sokolowski,et al. Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[59] M. Naceur Azaiez,et al. Game Theoretic Risk Analysis of Security Threats , 2009 .
[60] Fynnwin Prager. The economic and political impacts of U.S. federal carbon emissions trading policy across households, sectors and states , 2013 .
[61] Ralph L Keeney,et al. Modeling Values for Anti‐Terrorism Analysis , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[62] Peter Gordon,et al. The Economic Impacts of a Terrorist Attack on the U.S. Commercial Aviation System , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[63] Howard Kunreuther,et al. Corporate Demand for Insurance: New Evidence from the U.s. Terrorism and Property Markets the Wharton Risk Management and Decision Processes Center Corporate Demand for Insurance: New Evidence from the U.s. Terrorism and Property Markets , 2022 .
[64] Richard S. John,et al. Identifying and Structuring the Objectives of the Islamic State of Iraq and the Levant (ISIL) and Its Followers , 2016, Decis. Anal..
[65] Scott Farrow,et al. THE ECONOMICS OF HOMELAND SECURITY EXPENDITURES: FOUNDATIONAL EXPECTED COST‐EFFECTIVENESS APPROACHES , 2007 .
[66] Siambabala Bernard Manyena,et al. The concept of resilience revisited. , 2006, Disasters.
[67] Peter C. Fishburn,et al. von Neumann-Morgenstera Utility Functions on Two Attributes , 1974, Oper. Res..
[68] Baruch Fischhoff,et al. Aggregate, Disaggregate, and Hybrid Analyses of Ecological Risk Perceptions , 2005, Risk analysis : an official publication of the Society for Risk Analysis.
[69] Raymond J. Kopp,et al. Social Cost of Environmental Quality Regulations: A General Equilibrium Analysis , 1990, Journal of Political Economy.
[70] Olivier Roy,et al. Intentions, Decisions and Rationality , 2008 .
[71] Henry H. Willis,et al. Prioritizing Environmental Health Risks in the UAE , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[72] Vicki M. Bier,et al. Uncertainty about probability: a reconciliation with the subjectivist viewpoint , 1996, IEEE Trans. Syst. Man Cybern. Part A.
[73] Kevin J. Boyle,et al. The Benefit-Transfer Challenges , 2010 .
[74] J. Victoroff. The Mind of the Terrorist , 2005 .
[75] M. Elisabeth Paté-Cornell,et al. Advances in Decision Analysis: The Engineering Risk-Analysis Method and Some Applications , 2007 .
[76] Patrick Jaillet,et al. Location and Routing Models for Emergency Response Plans with Priorities , 2012, Future Security.
[77] T Bulger,et al. TRANSPORTATION EQUITY ACT FOR THE 21ST CENTURY (TEA 21) , 1998 .
[78] Oliver Grundmann,et al. The current state of bioterrorist attack surveillance and preparedness in the US , 2014, Risk management and healthcare policy.
[79] Louis Anthony Cox. Improving risk-based decision making for terrorism applications. , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[80] Melissa L. Finucane,et al. Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[81] Dusan M. Stipanovic,et al. Formation Control and Collision Avoidance for Multi-agent Non-holonomic Systems: Theory and Experiments , 2008, Int. J. Robotics Res..
[82] Steve Alpern,et al. Patrolling Games , 2011, Oper. Res..
[83] W. L. Shirley,et al. Social Vulnerability to Environmental Hazards , 2003 .
[84] Horst Zank,et al. Cumulative Prospect Theory for Parametric and Multiattribute Utilities , 2001, Math. Oper. Res..
[85] S. Hora. Advances in Decision Analysis: Eliciting Probabilities from Experts , 2007 .
[86] Randy A. Freeman,et al. Robust Nonlinear Control Design , 1996 .
[87] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[88] Jun Zhuang,et al. Impacts of Subsidized Security on Stability and Total Social Costs of Equilibrium Solutions in an N-Player Game with Errors , 2010 .
[89] Ralph L. Keeney,et al. Using Values in Operations Research , 1994, Oper. Res..
[90] Ralph L. Keeney,et al. Estimating Fatalities Induced by the Economic Costs of Regulations , 1997 .
[91] Klaus Ritzberger. On games under expected utility with rank dependent probabilities , 1996 .
[92] Adam Rose,et al. Income distribution impacts of climate change mitigation policy in the Susquehanna River Basin Economy , 2007 .
[93] Anthony S Fauci,et al. Smallpox vaccination policy--the need for dialogue. , 2002, The New England journal of medicine.
[94] Jianhua Xu,et al. Evaluating an analytic–deliberative risk‐ranking process in a Chinese context , 2011 .
[95] Douglas Paton,et al. Managing company risk and resilience through business continuity management , 2006 .
[96] John Rollins. Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy , 2010 .
[97] Sarit Kraus,et al. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..
[98] William J Bicknell,et al. The case for voluntary smallpox vaccination. , 2002, The New England journal of medicine.
[99] Heather Rosoff,et al. The Role of Behavioral Responses in the Total Economic Consequences of Terrorist Attacks on U.S. Air Travel Targets , 2017, Risk analysis : an official publication of the Society for Risk Analysis.
[100] Michael K. Lindell,et al. ASSESSING COMMUNITY IMPACTS OF NATURAL DISASTERS , 2003 .
[101] Ali E. Abbas,et al. Multiattribute Utility Functions Satisfying Mutual Preferential Independence , 2015, Oper. Res..
[102] Vicki M. Bier,et al. An Application of Copulas to Accident Precursor Analysis , 1998 .
[103] Louis Anthony Cox,et al. What's Wrong with Risk Matrices? , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[104] P. Jean-Jacques Herings,et al. Fuzzy play, matching devices and coordination failures , 2001, Int. J. Game Theory.
[105] Kjell Hausken,et al. Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures , 2011, Ann. Oper. Res..
[106] C. Starmer. Developments in Non-expected Utility Theory: The Hunt for a Descriptive Theory of Choice under Risk , 2000 .
[107] Jun Zhuang,et al. Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[108] Richard C. Larson,et al. Responding to Emergencies: Lessons Learned and the Need for Analysis , 2006, Interfaces.
[109] Christopher Butler. Prospect Theory and Coercive Bargaining , 2007 .
[110] Jun Zhuang,et al. Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[111] Richard O. Zerbe,et al. Benefit-cost analysis , 2008 .
[112] Santosh S. Vempala,et al. Simulated Annealing for Convex Optimization , 2004 .
[113] F. Norris,et al. 60,000 Disaster Victims Speak: Part II. Summary and Implications of the Disaster Mental Health Research , 2002, Psychiatry.
[114] Peter B. Dixon,et al. Immigration Policy and its Possible Effects on U.S. Agriculture and the Market for Hired Farm Labor: A Simulation Analysis , 2012 .
[115] Roberto Szechtman,et al. Confronting Entrenched Insurgents , 2010, Oper. Res..
[116] Milind Tambe,et al. Security Games in the Field: Deployments on a Transit System , 2014, EMAS@AAMAS.
[117] J. C. Taylor,et al. The U.S.-Canada Border: Cost Impacts, Causes, and Short to Long Term Management Options , 2003 .
[118] G. Apostolakis. The concept of probability in safety assessments of technological systems. , 1990, Science.
[119] J. Harsanyi. Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .
[120] George A. Hazelrigg,et al. Bayesian Inference for the Demand of Engineering Products , 2012 .
[121] F. Norris,et al. Community Resilience as a Metaphor, Theory, Set of Capacities, and Strategy for Disaster Readiness , 2008, American journal of community psychology.
[122] Richard J. Zeckhauser,et al. Critical ratios and efficient allocation , 1973 .
[123] William J. Burns,et al. Near‐Misses and Future Disaster Preparedness , 2014, Risk analysis : an official publication of the Society for Risk Analysis.
[124] Peter B. Dixon,et al. Macro, industry and state effects in the U.S. of removing major tariffs and quotas , 2004 .
[125] Detlof von Winterfeldt,et al. Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists? , 2006, Decis. Anal..
[126] Michael P. Wellman,et al. Selecting strategies using empirical game models: an experimental analysis of meta-strategies , 2008, AAMAS.
[127] D von Winterfeldt,et al. A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[128] Nicholas R. Jennings,et al. Computational-Mechanism Design: A Call to Arms , 2003, IEEE Intell. Syst..
[129] Adrian E. Raftery,et al. Bayesian model averaging: a tutorial (with comments by M. Clyde, David Draper and E. I. George, and a rejoinder by the authors , 1999 .
[130] Ralph L Keeney,et al. A Value Model for Evaluating Homeland Security Decisions , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[131] Milind Tambe,et al. Comparing human behavior models in repeated Stackelberg security games: An extended study , 2016, Artif. Intell..
[132] Chris R. Rose. DARHT: An Overview , 2013 .
[133] Vladimir Marianov,et al. The Queueing Maximal availability location problem: A model for the siting of emergency vehicles , 1996 .
[134] Ali E. Abbas,et al. Utility transversality: a value-based approach , 2005 .
[135] Henry H. Willis,et al. Estimating Terrorism Risk , 2002 .
[136] Dusan M. Stipanovic,et al. Trajectory tracking with collision avoidance for nonholonomic vehicles with acceleration constraints and limited sensing , 2014, Int. J. Robotics Res..
[137] Robin L. Dillon-Merrill,et al. Logic Trees: Fault, Success, Attack, Event, Probability, and Decision Trees , 2009 .
[138] L. Robin Keller,et al. Equity in Social Risk: Some Empirical Observations , 1988 .
[139] Anthony Michael Barrett,et al. Should cities invest in sheltering-in-place measures against chlorine truck attacks by terrorists? , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[140] Vicki M. Bier,et al. Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .
[141] J M Bland,et al. Weighted comparison of means , 1998, BMJ.
[142] A. Colman. Cooperation, psychological game theory, and limitations of rationality in social interaction , 2003, Behavioral and Brain Sciences.
[143] Roberto Szechtman,et al. Scheduling policies for an antiterrorist surveillance system , 2009 .
[144] B Fischhoff,et al. A Deliberative Method for Ranking Risks (I): Overview and Test Bed Development , 2001, Risk analysis : an official publication of the Society for Risk Analysis.
[145] H. Florig,et al. A Deliberative Method for Ranking Risks (II): Evaluation of Validity and Agreement among Risk Managers , 2001, Risk analysis : an official publication of the Society for Risk Analysis.
[146] Lawrence V. Snyder,et al. Facility location under uncertainty: a review , 2006 .
[147] Sherrill Lingel,et al. Protecting Commercial Aviation Against the Shoulder-Fired Missile Threat , 2005 .
[148] S. Cutter,et al. Journal of Homeland Security and Emergency Management Disaster Resilience Indicators for Benchmarking Baseline Conditions , 2011 .
[149] J. Breckenridge,et al. The Strategy of Terrorism and the Psychology of Mass-Mediated Fear , 2006 .
[150] Garrick L. Wallstrom,et al. Measuring the effect of commuting on the performance of the Bayesian Aerosol Release Detector , 2009, BMC Medical Informatics Decis. Mak..
[151] Roberto Szechtman,et al. Why Defeating Insurgencies Is Hard: The Effect of Intelligence in Counterinsurgency Operations - A Best-Case Scenario , 2009, Oper. Res..
[152] Joost R. Santos,et al. Modeling the Demand Reduction Input‐Output (I‐O) Inoperability Due to Terrorism of Interconnected Infrastructures * , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[153] H. Simon,et al. A Behavioral Model of Rational Choice , 1955 .
[154] Shi-Woei Lin,et al. Should the Model for Risk‐Informed Regulation be Game Theory Rather than Decision Theory? , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[155] Jason R. W. Merrick,et al. Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory , 2016, Risk analysis : an official publication of the Society for Risk Analysis.
[156] R. Wilcox. Applying Contemporary Statistical Techniques , 2003 .
[157] Ralph L. Keeney,et al. Improving the Generation of Decision Objectives , 2010, Decis. Anal..
[158] Gordon H. McCormick. Terrorist Decision Making , 2003 .
[159] E. Brunswik,et al. The Conceptual Framework of Psychology , 1954 .
[160] Marinos E. Tsigas,et al. Impacts of Better Trade Facilitation in Developing Countries: Analysis with a New GTAP Database for the Value of Time in Trade , 2008 .
[161] H. Edward Price,et al. The Strategy and Tactics of Revolutionary Terrorism , 1977, Comparative Studies in Society and History.
[162] Xiaojun Shan,et al. Subsidizing to disrupt a terrorism supply chain—a four-player game , 2014, J. Oper. Res. Soc..
[163] Gary H. McClelland,et al. The Effect of Risk Beliefs on Property Values: A Case Study of a Hazardous Waste Site1 , 1990 .
[164] Peter J. Lambert,et al. Inequality Decomposition Analysis and the Gini Coefficient Revisited , 1993 .
[165] Richard E. Wilson,et al. COMBATING TERRORISM: AN EVENT TREE APPROACH , 2003 .
[166] A. Raftery,et al. Discussion: Performance of Bayesian Model Averaging , 2003 .
[167] Harvey E. Lapan,et al. To Bargain or Not to Bargain: That is the Question , 1988 .
[168] Hamid Mohtadi,et al. The risk of catastrophic terrorism: an extreme value approach , 2009 .
[169] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[170] M. Wardman. Review and meta-analysis of U.K. time elasticities of travel demand , 2012 .
[171] W. Adger. Social and ecological resilience: are they related? , 2000 .
[172] Peter Auer,et al. The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..
[173] Marco Zaffalon,et al. Bayesian Networks with Imprecise Probabilities: Theory and Application to Classification , 2012 .
[174] Niyazi Onur Bakir,et al. Is Better Nuclear Weapon Detection Capability Justified? , 2011 .
[175] M. Morgan,et al. Categorizing Risks for Risk Ranking , 2000, Risk analysis : an official publication of the Society for Risk Analysis.
[176] Bilal M Ayyub,et al. Risk analysis for critical asset protection. , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[177] David Lindley. Scoring rules and the inevitability of probability , 1982 .
[178] F. Scholz. Maximum Likelihood Estimation , 2006 .
[179] Seokjin Kim,et al. Facility location for large-scale emergencies , 2010, Ann. Oper. Res..
[180] Santosh S. Vempala,et al. Solving convex programs by random walks , 2004, JACM.
[181] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[182] Ortwin Renn,et al. The Social Amplification of Risk: A Conceptual Framework , 1988 .
[183] Daphne Koller,et al. Multi-Agent Influence Diagrams for Representing and Solving Games , 2001, IJCAI.
[184] Robin L. Dillon,et al. How Near-Miss Events Amplify or Attenuate Risky Decision Making , 2012, Manag. Sci..
[185] Lawrence D. Phillips,et al. Advances in Decision Analysis: Decision Conferencing , 2007 .
[186] Xiaojun Shan,et al. Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..
[187] Martin W. P. Savelsbergh,et al. Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..
[188] Heather Rosoff,et al. The Dynamics of Evolving Beliefs, Concerns Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative Archival Samples , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[189] W. Leontief. Quantitative Input and Output Relations in the Economic Systems of the United States , 1936 .
[190] A. Rose. Economic Resilience to Disasters , 2009 .
[191] Edward H. Kaplan,et al. Terror Queues , 2010, Oper. Res..
[192] R. Farrow,et al. A missing error term in benefit-cost analysis. , 2012, Environmental science & technology.
[193] J. Corsi,et al. Terrorism as a Desperate Game , 1981 .
[194] Maria E. Mayorga,et al. The minimum p-envy location problem: a new model for equitable distribution of emergency resources , 2011 .
[195] J. Dyer. Remarks on the analytic hierarchy process , 1990 .
[196] Andrew Schmitz,et al. Applied welfare economics , 2008 .
[197] G. Leitmann. On generalized Stackelberg strategies , 1978 .
[198] N. Megiddo,et al. The Maximum Coverage Location Problem , 1983 .
[199] Erin Miller. Patterns of Onset and Decline Among Terrorist Organizations , 2012 .
[200] Moshe Kress,et al. Operational effectiveness of suicide-bomber-detector schemes: a best-case analysis. , 2005, Proceedings of the National Academy of Sciences of the United States of America.
[201] J. Handmer,et al. Uncertainty, sustainability and change☆ , 1992 .
[202] R. Keeney,et al. Advances in Decision Analysis: Practical Value Models , 2007 .
[203] Andrea L. Bertozzi,et al. c ○ World Scientific Publishing Company A STATISTICAL MODEL OF CRIMINAL BEHAVIOR , 2008 .
[204] James H. Lambert,et al. Risks of Cyber Attack to Water Utility Supervisory Control and Data Acquisition Systems , 2001 .
[205] V. Bier,et al. Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[206] Lauri Ojala,et al. Trade Logistics in the Global Economy: The Logistics Performance Index and Its Indicators , 2016 .
[207] Seth D. Guikema,et al. Robust Adversarial Risk Analysis: A Level-k Approach , 2012, Decis. Anal..
[208] Raymond J. Burby,et al. Creating Hazard Resilient Communities through Land-Use Planning , 2000 .
[209] Mark S. Daskin,et al. Stochastic p-robust location problems , 2006 .
[210] David R. Anderson,et al. Model selection and multimodel inference : a practical information-theoretic approach , 2003 .
[211] Kjell Hausken,et al. Defending against multiple different attackers , 2011, Eur. J. Oper. Res..
[212] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[213] A. Abbas. General decompositions of multiattribute utility functions with partial utility independence , 2010 .
[214] Manish Jain,et al. Game theory for security: Key algorithmic principles, deployed systems, lessons learned , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[215] Harvey Waterman,et al. Reasons and Reason: Collective Political Activity in Comparative and Historical Perspective , 1981, World Politics.
[216] P. Dixon,et al. Validating a Detailed, Dynamic CGE Model of the USA , 2010 .
[217] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[218] K. Hausken. Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[219] William D. Nordhaus,et al. The Economics of Hurricanes in the United States , 2006 .
[220] Bintong Chen,et al. Minmax‐regret robust 1‐median location on a tree , 1998 .
[221] Steven E. Plaut. Misplaced Applications of Economic Theory to the Middle East , 2004 .
[222] Adam Rose,et al. ESTIMATING THE ECONOMIC CONSEQUENCES OF A PORT SHUTDOWN: THE SPECIAL ROLE OF RESILIENCE , 2013 .
[223] Richard L. Church,et al. The Team/Fleet Models for Simultaneous Facility and Equipment Siting , 1979 .
[224] Henry H. Willis,et al. The validity of the preference profiles used for evaluating impacts in the Dutch National Risk Assessment , 2012 .
[225] Vincent T. Covello,et al. Risk communication, the West Nile virus epidemic, and bioterrorism: responding to the commnication challenges posed by the intentional or unintentional release of a pathogen in an urban setting , 2001, Journal of Urban Health.
[226] Manfred K. Warmuth,et al. The Weighted Majority Algorithm , 1994, Inf. Comput..
[227] Martin Johnson,et al. Economy-Wide Effects of Reducing Illegal Immigrants in U.S. Employment , 2011 .
[228] Gregory S. Parnell,et al. Handbook of Decision Analysis: Parnell/Handbook of Decision Analysis , 2013 .
[229] D. Ball,et al. Further Thoughts on the Utility of Risk Matrices , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[230] David Hummels,et al. Time as a Trade Barrier , 2002, GTAP Working Paper.
[231] Jonathan Shalev,et al. Loss aversion equilibrium , 2000, Int. J. Game Theory.
[232] Richard S. John,et al. Assessment of Cost Uncertainties for Large Technology Projects: A Methodology and an Application , 2002, Interfaces.
[233] A. Nizam,et al. Containing Bioterrorist Smallpox , 2002, Science.
[234] H. J. Einhorn. The use of nonlinear, noncompensatory models in decision making. , 1970, Psychological bulletin.
[235] Claire J. Tomlin,et al. Safe and reliable coverage control , 2013 .
[236] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[237] Daniel Kahneman,et al. Availability: A heuristic for judging frequency and probability , 1973 .
[238] C. Allin Cornell,et al. Seismic Risk Analysis of Boston , 1975 .
[239] D. Winterfeldt,et al. Cognitive Components of Risk Ratings , 1981 .
[240] Matthew G. Bunn,et al. A Mathematical Model of the Risk of Nuclear Terrorism , 2006 .
[241] Todd Sandler,et al. The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.
[242] Jeffrey D. Berejikian. A Cognitive Theory of Deterrence , 2002 .
[243] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[244] Sarit Kraus,et al. Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..
[245] Kiseop Lee,et al. T-Statistics for Weighted Means in Credit Risk Modelling , 2005 .
[246] Zheng Cao,et al. Optimal Stopping Analysis of a Radiation Detection System to Protect Cities from a Nuclear Terrorist Attack , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[247] A. Rose. Input-output economics and computable general equilibrium models , 1995 .
[248] Milind Tambe,et al. Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers , 2013, GameSec.
[249] Abdollah Shafieezadeh,et al. A decision framework for managing risk to airports from terrorist attack. , 2015, Risk analysis : an official publication of the Society for Risk Analysis.
[250] Laurent El Ghaoui,et al. Robust Control of Markov Decision Processes with Uncertain Transition Matrices , 2005, Oper. Res..
[251] S. Brock Blomberg,et al. Total Economic Consequences of Terrorist Attacks: Insights from 9/11 , 2010 .
[252] Detlof von Winterfeldt,et al. Meeting the Challenges of Terrorism Risk Analysis , 2007 .
[253] Adam Rose,et al. Regional Economic Impacts of a Verdugo Scenario Earthquake Disruption of Los Angeles Water Supplies: A Computable General Equilibrium Analysis , 2011 .
[254] J. Shoven,et al. Applied General Equilibrium Models of Taxation and International Trade , 1983 .
[255] Michael D. White. Port of Los Angeles , 2008 .
[256] D. Kahneman,et al. Timid choices and bold forecasts: a cognitive perspective on risk taking , 1993 .
[257] W. RobertsBryan,et al. The Macroeconomic Impacts of the 9/11 Attack: Evidence from Real-Time Forecasting , 2009 .
[258] A. Rose,et al. Economic Consequence Analysis of Disasters , 2017 .
[259] Harry W. Richardson,et al. Refining the Isard Multiregional Input–Output Model: Theory, Operationality and Extensions , 2015 .
[260] K. Arrow,et al. Determining Benefits and Costs for Future Generations , 2013, Science.
[261] Harry W. Richardson,et al. The State‐by‐State Economic Impacts of the 2002 Shutdown of the Los Angeles–Long Beach Ports , 2008 .
[262] Donald E. Geis,et al. By Design: The Disaster Resistant and Quality-of-Life Community , 2000 .
[263] Jr. Louis Anthony Cox,et al. Game Theory and Risk Analysis , 2009 .
[264] Robert T. Clemen,et al. Subjective Probability Assessment in Decision Analysis: Partition Dependence and Bias Toward the Ignorance Prior , 2005, Manag. Sci..
[265] Adam Rose,et al. The role of nursing profession in biodefense , 2013 .
[266] Adam Rose,et al. Journal of Homeland Security and Emergency Management A Framework for Analyzing the Total Economic Impacts of Terrorist Attacks and Natural Disasters , 2011 .
[267] Gernot D. Kleiter,et al. Propagating Imprecise Probabilities in Bayesian Networks , 1996, Artif. Intell..
[268] Robin L Dillon,et al. Why Near‐Miss Events Can Decrease an Individual's Protective Response to Hurricanes , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[269] Rong Yang,et al. Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..
[270] Arkadi Nemirovski,et al. Robust optimization – methodology and applications , 2002, Math. Program..
[271] Robert G. Sargent,et al. Verification and validation of simulation models , 2013, Proceedings of Winter Simulation Conference.
[272] Lawrence J. Axelrod,et al. Characterizing perception of ecological risk. , 1995, Risk analysis : an official publication of the Society for Risk Analysis.
[273] Kaan Ozbay,et al. Emergency inventory management for disasters--a review. , 2014, Journal of emergency management.
[274] C. Revelle,et al. A Lagrangean heuristic for the maximal covering location problem , 1996 .
[275] K. Boyer,et al. American Trucking, NAFTA, and the Cost of Distance , 1997 .
[276] D. Earn,et al. Group interest versus self-interest in smallpox vaccination policy , 2003, Proceedings of the National Academy of Sciences of the United States of America.
[277] Rae Zimmerman,et al. Analysis of Electrical Power and Oil and Gas Pipeline Failures , 2007, Critical Infrastructure Protection.
[278] Ali E. Abbas,et al. Normative decision making with multiattribute performance targets , 2009 .
[279] Louise K. Comfort,et al. Risk and Resilience: Inter‐organizational Learning Following the Northridge Earthquake of 17 January 1994 , 1994 .
[280] Seth D. Guikema,et al. Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .
[281] S. Carpenter,et al. Social-Ecological Resilience to Coastal Disasters , 2005, Science.
[282] Alain Chateauneuf,et al. Choice under uncertainty with the best and worst in mind: Neo-additive capacities , 2007, J. Econ. Theory.
[283] Stephanie E. Chang,et al. Measuring Improvements in the Disaster Resilience of Communities , 2004 .
[284] Vicki M. Bier,et al. Probabilistic risk analysis , 2017 .
[285] C. V. Anderson,et al. The Federal Emergency Management Agency (FEMA) , 2002 .
[286] Gregory Levitin,et al. Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts , 2009, IEEE Transactions on Reliability.
[287] Marizio Falcone,et al. Discrete time high-order schemes for viscosity solutions of Hamilton-Jacobi-Bellman equations , 1994 .
[288] Glyn Wittwer,et al. Economic Modeling of Water: The Australian CGE Experience , 2012 .
[289] J. March,et al. Learning from Samples of One or Fewer , 1991 .
[290] Louis Anthony (Tony) Cox,et al. Some Limitations of Qualitative Risk Rating Systems , 2005, Risk analysis : an official publication of the Society for Risk Analysis.
[291] James H Lambert,et al. A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[292] Erwann O. Michel-Kerjan,et al. Terrorisme à grande échelle partage de risques et politiques publiques , 2003 .
[293] Harvey E. Lapan,et al. Terrorism and signalling , 1993 .
[294] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[295] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[296] D. Winterfeldt. On the Relevance of Behavioral Decision Research for Decision Analysis , 1999 .
[297] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[298] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[299] Bernard Harris. Mathematical methods in combatting terrorism. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[300] Richard Scheines,et al. Constructing Bayesian Network Models of Gene Expression Networks from Microarray Data , 2000 .
[301] Sarit Kraus,et al. Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.
[302] A. Rose. DEFINING AND MEASURING ECONOMIC RESILIENCE TO DISASTERS , 2004 .
[303] Robin L. Dillon,et al. Evolving Risk Perceptions About Near-Miss Terrorist Events , 2014, Decis. Anal..
[304] K. Arrow,et al. Capital-labor substitution and economic efficiency , 1961 .
[305] Detlof von Winterfeldt,et al. Managing Potential Health Risks from Electric Powerlines: A Decision Analysis Caught in Controversy , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[306] Leonard J. Savage,et al. The Theory of Statistical Decision , 1951 .
[307] Carl S. Spetzler. Advances in Decision Analysis: Building Decision Competency in Organizations , 2007 .
[308] C. Folke. RESILIENCE: THE EMERGENCE OF A PERSPECTIVE FOR SOCIAL-ECOLOGICAL SYSTEMS ANALYSES , 2006 .
[309] Peter B. Dixon,et al. Effects on the U.S. of an H1N1 Epidemic: Analysis with a Quarterly CGE Model , 2010 .
[310] V. Crawford. Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions , 2003 .
[311] Ali E. Abbas,et al. One-Switch Conditions for Multiattribute Utility Functions , 2012, Oper. Res..
[312] Jeffrey D. Berejikian. Model Building With Prospect Theory: A Cognitive Approach to International Relations , 2002 .
[313] Robert Powell,et al. Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..
[314] N. Abrahamson,et al. On the Use of Logic Trees for Ground-Motion Prediction Equations in Seismic-Hazard Analysis , 2005 .
[315] J. Harsanyi. Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .
[316] Ronald A. Howard,et al. Decision analysis: practice and promise , 1988 .
[317] Yacov Y Haimes,et al. On the Definition of Vulnerabilities in Measuring Risks to Infrastructures , 2006, Risk analysis : an official publication of the Society for Risk Analysis.
[318] Garrett R. Asay,et al. The Economic Impacts of the September 11 Terrorist Attacks: A Computable General Equilibrium Analysis , 2009 .
[319] Reinhard Selten,et al. Evolutionary stability in extensive two-person games - correction and further development , 1988 .
[320] C. S. Holling. Resilience and Stability of Ecological Systems , 1973 .
[321] Bo An,et al. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.
[322] Maged M. Dessouky,et al. Solution approaches for facility location of medical supplies for large-scale emergencies , 2007, Comput. Ind. Eng..
[323] Peter Dixon,et al. Restricting Employment of Low‐Paid Immigrants: A General Equilibrium Assessment of the Social Welfare Implications for Legal U.S. Wage‐Earners , 2014 .
[324] Milind Tambe,et al. Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.
[325] Craig R. Fox,et al. Partition Priming in Judgment Under Uncertainty , 2003, Psychological science.
[326] P. Walkenhorst,et al. Quantitative Assessment of the Benefits of Trade Facilitation , 2004 .
[327] Robert Powell,et al. Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.
[328] Donald A Henderson,et al. Contact vaccinia--transmission of vaccinia from smallpox vaccination. , 2002, JAMA.
[329] Craig McLean,et al. Transnational & Comparative Curricular Offerings in U.S. Post-Baccalaureate Programs: Benchmarking a Link from the U.S. to the EU in Homeland Security Education , 2011 .
[330] Gregory M. Paoli,et al. Modeling the public health system response to a terrorist event in the food supply. , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[331] Peter B. Dixon,et al. The Economy-Wide Effects in the United States of Replacing Crude Petroleum with Biomass , 2007 .
[332] Robert T. Clemen,et al. Making Hard Decisions with DecisionTools , 2013 .
[333] W. McEneaney,et al. Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind , 2006 .
[334] Vicki M. Bier,et al. Target-oriented utility theory for modeling the deterrent effects of counterterrorism , 2015, Reliab. Eng. Syst. Saf..
[335] B. Fischhoff,et al. How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits , 1978 .
[336] Richard Gonzalez,et al. Curvature of the Probability Weighting Function , 1996 .
[337] A. Haurie,et al. Sequential Stackelberg equilibria in two-person games , 1985 .
[338] Jayavel Sounderpandian,et al. Ex Ante Equity in Public Risk , 1989, Oper. Res..
[339] David Lindley,et al. Plural analysis: Multiple approaches to quantitative research , 1986 .
[340] Ralph L. Keeney,et al. Generating Objectives: Can Decision Makers Articulate What They Want? , 2008, Manag. Sci..
[341] David L. Craft,et al. Emergency response to a smallpox attack: The case for mass vaccination , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[342] Tito Homem-de-Mello,et al. Risk-adjusted budget allocation models with application in homeland security , 2011 .
[343] Rae Zimmerman,et al. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[344] Gerald G. Brown,et al. How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[345] Dan Wei,et al. Economy-wide impacts of reduced wait times at U.S. international airports , 2015 .
[346] A. Tversky,et al. Support theory: A nonextensional representation of subjective probability. , 1994 .
[347] Susan E. Martonosi,et al. Evaluating the Viability of 100 Per Cent Container Inspection at America's Ports , 2005 .
[348] Baruch Awerbuch,et al. Online linear optimization and adaptive routing , 2008, J. Comput. Syst. Sci..
[349] K. Arrow,et al. Uncertainty and the Evaluation of Public Investment Decisions , 2014 .
[350] Jörgen W. Weibull,et al. Testing Game Theory , 2004 .
[351] L. Goulder,et al. The Substantial Bias from Ignoring General Equilibrium Effects in Estimating Excess Burden, and a Practical Solution , 2003, Journal of Political Economy.
[352] Louis Anthony Tony Cox,et al. Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks , 2008 .
[353] H. Simon,et al. Rational choice and the structure of the environment. , 1956, Psychological review.
[354] D. Winterfeldt,et al. Cognitive and Motivational Biases in Decision and Risk Analysis , 2015, Risk analysis : an official publication of the Society for Risk Analysis.
[355] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[356] Lawrence M. Wein,et al. OR Forum - Homeland Security: From Mathematical Models to Policy Implementation: The 2008 Philip McCord Morse Lecture , 2009, Oper. Res..
[357] Maged M. Dessouky,et al. Perishable inventory management system with a minimum volume constraint , 2011, J. Oper. Res. Soc..
[358] T. Saaty. How to Make a Decision: The Analytic Hierarchy Process , 1990 .
[359] J. Eto,et al. Understanding the cost of power interruptions to U.S. electricity consumers , 2004 .
[360] A. Rose. Economic resilience to natural and man-made disasters: Multidisciplinary origins and contextual dimensions , 2007 .
[361] A. Tversky. Elimination by aspects: A theory of choice. , 1972 .
[362] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[363] Claire J. Tomlin,et al. Monotone Approximations of Minimum and Maximum Functions and Multi-objective Problems , 2012 .
[364] H. Kunreuther,et al. IDS Models of Airline Security , 2005 .
[365] Dusan M. Stipanovic,et al. Multiattribute Utility Copulas for Multi-objective Coverage Control , 2014, Paladyn J. Behav. Robotics.
[366] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[367] Adam Rose,et al. INPUT-OUTPUT STRUCTURAL DECOMPOSITION ANALYSIS: A CRITICAL APPRAISAL , 1996 .
[368] Ali E. Abbas,et al. Utility Copula Functions Matching All Boundary Assessments , 2013, Oper. Res..
[369] Adam Rose,et al. Economic Impacts of Potential Foot and Mouth Disease Agroterrorism in the USA: A General Equilibrium Analysis , 2012 .
[370] Xiaojun Shan,et al. Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection - A Three-Stage Game , 2014, Decis. Anal..
[371] G F Cooper,et al. A New Prior for Bayesian Anomaly Detection , 2009, Methods of Information in Medicine.
[372] H. J. Einhorn. Use of nonlinear, noncompensatory models as a function of task and amount of information , 1971 .
[373] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[374] Benjamin Van Roy,et al. On Constraint Sampling in the Linear Programming Approach to Approximate Dynamic Programming , 2004, Math. Oper. Res..
[375] Michel Bruneau,et al. A Framework to Quantitatively Assess and Enhance the Seismic Resilience of Communities , 2003 .
[376] Ashley Winston,et al. Textile and Apparel Barriers and Rules of Origin: What’s Left to Gain after the Agreement on Textiles and Clothing? , 2008 .
[377] James A Giesecke,et al. Development of a Large-scale Single US Region CGE Model using IMPLAN Data: A Los Angeles County Example with a Productivity Shock Application , 2011 .
[378] Harry W. Richardson,et al. The Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced Impacts , 2013 .
[379] Peter B. Dixon,et al. You can't have a CGE recession without excess capacity , 2011 .
[380] John C. McDonald,et al. Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..
[381] D. Paton,et al. Disasters and communities: vulnerability, resilience and preparedness , 2001 .
[382] Victor Richmond R. Jose,et al. Technology Adoption, Accumulation, and Competition in Multiperiod Attacker-Defender Games , 2013 .
[383] Mark Phelps. DO SAMS POSE A REAL THREAT TO CIVIL AVIATION , 2003 .
[384] Elisabeth Krausmann,et al. An economic framework for the development of a resilience index for business recovery , 2013 .
[385] Mathew D. McCubbins,et al. The Theory of Minds Within the Theory of Games , 2012 .
[386] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[387] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[388] L. J. Savage,et al. The Foundations of Statistics , 1955 .
[389] D. Winterfeldt,et al. Comparing Hierarchical and Nonhierarchical Weighting Methods for Eliciting Multiattribute Value Models , 1987 .
[390] Jason C. Kinnell,et al. Expert and Layperson Perceptions of Ecosystem Risk , 2000, Risk analysis : an official publication of the Society for Risk Analysis.
[391] Manish Jain,et al. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.
[392] Jun Zhuang,et al. Balancing congestion and security in the presence of strategic applicants with private information , 2011, Eur. J. Oper. Res..
[393] R. Keeney,et al. Eliciting public values for complex policy decisions , 1990 .
[394] Henry H. Willis,et al. Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[395] Bryan C. Price,et al. Targeting Top Terrorists: How Leadership Decapitation Contributes to Counterterrorism , 2012, International Security.
[396] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[397] David E. Bell,et al. Multiattribute Utility Functions: Decompositions Using Interpolation , 1979 .
[398] Park JiYoung,et al. Identifying the Regional Economic Impacts of 9/11 , 2009 .
[399] W. Edwards,et al. Conservatism in a simple probability inference task. , 1966, Journal of experimental psychology.
[400] Charles ReVelle,et al. Concepts and applications of backup coverage , 1986 .
[401] J. M. Smith. The theory of games and the evolution of animal conflicts. , 1974, Journal of theoretical biology.
[402] P. Dixon,et al. The Us Economy from 1992 to 1998: Results from a Detailed CGE Model , 2004 .
[403] Maged Dessouky,et al. A modeling framework for facility location of medical services for large-scale emergencies , 2007 .
[404] Maged Dessouky,et al. The Stochastic Vehicle Routing Problem for Minimum Unmet Demand , 2009 .
[405] Heather Rosoff,et al. Should I stay or should I go? An experimental study of health and economic government policies following a severe biological agent release , 2013, Environment Systems & Decisions.
[406] Karl-Dieter Opp,et al. Rational Choice and Rebellious Collective Action , 1986, American Political Science Review.
[407] Simon M. Lucas,et al. A Survey of Monte Carlo Tree Search Methods , 2012, IEEE Transactions on Computational Intelligence and AI in Games.
[408] Jie Zhang,et al. TOWARDS A NEW FRAMEWORK FOR ACCOUNTING AND MODELLING THE REGIONAL AND LOCAL IMPACTS OF TOURISM , 2010 .
[409] Adam Rose,et al. Modeling a major source of economic resilience to disasters: recapturing lost production , 2011 .
[410] D. McFadden. Quantal Choice Analysis: A Survey , 1976 .
[411] Dusan M. Stipanovic,et al. Control Strategies for Players in Pursuit-Evasion Games Based on their Preferences , 2014, IGTR.
[412] Bartholomew Elias,et al. Homeland Security: Protecting Airliners from Terrorist Missiles , 2006 .
[413] Ali E. Abbas,et al. One-Switch Independence for Multiattribute Utility Functions , 2011, Oper. Res..
[414] Gerald G. Brown,et al. When Is Uncertainty About Uncertainty Worth Characterizing? , 2008, Interfaces.
[415] H. Akaike. A new look at the statistical model identification , 1974 .
[416] Ralph L. Keeney,et al. Understanding Life-Threatening Risks , 1995 .
[417] Samrat Chatterjee,et al. A framework for analyzing the economic tradeoffs between urban commerce and security against terrorism. , 2014, Risk analysis : an official publication of the Society for Risk Analysis.
[418] Peter B. Dixon,et al. THE ECONOMIC COSTS TO THE U.S. OF CLOSING ITS BORDERS: A COMPUTABLE GENERAL EQUILIBRIUM ANALYSIS , 2011 .
[419] Roger Frost,et al. International Organization for Standardization (ISO) , 2004 .
[420] Robin L. Dillon,et al. How Near-Misses Influence Decision Making Under Risk: A Missed Opportunity for Learning , 2008, Manag. Sci..
[421] Ali E. Abbas,et al. Multiattribute Utility Copulas , 2009, Oper. Res..
[422] Herbert Hamers,et al. Operations research games: A survey , 2001 .
[423] Howard Kunreuther,et al. Modeling Interdependent Risks , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[424] Thomas R. Palfrey,et al. Heterogeneous quantal response equilibrium and cognitive hierarchies , 2006, J. Econ. Theory.
[425] Vincent Conitzer,et al. Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.
[426] D. von Winterfeldt,et al. Identifying and Structuring the Objectives of Terrorists , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[427] M. Elisabeth Paté-Cornell. Warning Systems and Risk Reduction , 1985 .
[428] Marshall A. Wise,et al. International Equity and Differentiation in Global Warming Policy , 1998 .
[429] Erwann Michel-Kerjan. Effective risk response needs a prepared mindset , 2015, Nature.
[430] P. Fishburn,et al. Dispersive equity and social risk , 1991 .
[431] JiYoung Park. The Economic Impacts of Dirty Bomb Attacks on the Los Angeles and Long Beach Ports: Applying the Supply-Driven NIEMO (National Interstate Economic Model) , 2008 .
[432] Dimitris Bertsimas,et al. The Price of Fairness , 2011, Oper. Res..
[433] Chen Wang,et al. Impact of intelligence on target-hardening decisions , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[434] Steve Leach,et al. Transmission potential of smallpox in contemporary populations , 2001, Nature.
[435] János Aczél,et al. The Role of Some Functional Equations in Decision Analysis , 2010, Decis. Anal..
[436] Richard Mesic,et al. Implementing Security Improvement Options at Los Angeles International Airport , 2006 .
[437] Ward Edwards,et al. Conservatism in Complex Probabilistic Inference , 1966 .
[438] M. Douglas,et al. Terrorism: A Positive Feedback Game , 2003 .
[439] Winston Harrington,et al. On the Accuracy of Regulatory Cost Estimates , 2000 .
[440] Alvin E. Roth,et al. Predictive value and the usefulness of game theoretic models , 2002 .
[441] P. Fishburn. Foundations of decision analysis along the way , 1989 .
[442] Jun Zhuang,et al. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[443] T. Sandler,et al. A Theoretical Analysis of Transnational Terrorism , 1983, American Political Science Review.
[444] George Horwich,et al. Economic Lessons of the Kobe Earthquake , 2000, Economic Development and Cultural Change.
[445] Eric F. Taquechel,et al. Validation of rational deterrence theory : analysis of U.S. government and adversary risk propensity and relative emphasis on gain or loss , 2010 .
[446] A. Tversky,et al. Contingent weighting in judgment and choice , 1988 .
[447] R. L. Keeney,et al. Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.
[448] R. Howard. On Making Life and Death Decisions , 1980 .
[449] Louis Anthony Cox,et al. Making Terrorism Risk Analysis Less Harmful and More Useful: Another Try , 2011 .
[450] Ali E. Abbas,et al. Attribute Dominance Utility , 2005, Decis. Anal..
[451] A. Lemieux. Situational prevention of poaching , 2014 .
[452] T. Bedford,et al. Probabilistic Risk Analysis: Foundations and Methods , 2001 .
[453] Paul Gill,et al. Comparing Role-Specific Terrorist Profiles , 2011 .
[454] Robert F. Bordley,et al. Effective utility functions induced by organizational target‐based incentives , 2009 .
[455] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[456] Heidi J. Albers,et al. Spatial modeling of extraction and enforcement in developing country protected areas , 2010 .
[457] Werling Jeffrey,et al. Macroeconomic and Industry Impacts of 9/11: An Interindustry Macroeconomic Approach , 2009 .
[458] W. Edwards,et al. Decision Analysis and Behavioral Research , 1986 .
[459] Milind Tambe,et al. Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries , 2014, GameSec.
[460] Henry H. Willis,et al. Ecological Risk Ranking: Development and Evaluation of a Method for Improving Public Participation in Environmental Decision Making , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[461] Peter C. Fishburn,et al. Equity Axioms for Public Risks , 1984, Oper. Res..
[462] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[463] Peter B. Dixon,et al. Economywide Implications from US Bioenergy Expansion , 2010 .
[464] R. Selten,et al. A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .
[465] L. Robin Keller,et al. Fair Processes for Societal Decisions Involving Distributional Inequalities , 1995 .
[466] Charles Vlek,et al. How Solid Is the Dutch (and the British) National Risk Assessment? Overview and Decision‐Theoretic Evaluation , 2013, Risk analysis : an official publication of the Society for Risk Analysis.