Decision Framework for Assessing WMD Threats Using Social Agent Models

[1]  Edward M. Hundert,et al.  The Cement of the Universe , 1990 .

[2]  Paul Humphreys,et al.  Why Propensities Cannot Be Probabilities , 1985, Philosophical Papers.

[3]  E. F. Codd,et al.  A relational model of data for large shared data banks , 1970, CACM.

[4]  L. Festinger,et al.  A Theory of Cognitive Dissonance , 2017 .

[5]  Graham Allison,et al.  Nuclear Terrorism: The Ultimate Preventable Catastrophe , 2004 .

[6]  Dennis McLeod,et al.  The semantic data model: a modelling mechanism for data base applications , 1978, SIGMOD Conference.

[7]  G. Mann The Quark and the Jaguar: adventures in the simple and the complex , 1994 .

[8]  M. Howard War in European history , 1976 .

[9]  C. Hempel The Function of General Laws in History , 1942 .

[10]  S. Garrett,et al.  The Chemical Weapons Taboo , 1999 .

[11]  Raymond A. Eve,et al.  Chaos, complexity, and sociology : myths, models, and theories , 1998 .

[12]  P. Collier,et al.  Greed and Grievance in Civil War , 1999 .

[13]  D. North Structure and Change in Economic History , 1983 .

[14]  N. Chater,et al.  Précis of Bayesian Rationality: The Probabilistic Approach to Human Reasoning , 2009, Behavioral and Brain Sciences.

[15]  M. Willrich The Treaty on Non-Proliferation of Nuclear Weapons: Nuclear Technology Confronts World Politics , 1968 .

[16]  I. Gilboa,et al.  Case-Based Decision Theory , 1995 .

[17]  B. Ramberg Attacks on Nuclear Reactors: The Implications of Israel's Strike on Osiraq , 1982 .

[18]  Peter R. Monge,et al.  Theories of Communication Networks , 2003 .

[19]  Karl R. Popper,et al.  A World of Propensities , 1993, Popper's Views on Natural and Social Science.

[20]  J. Milton,et al.  The Rosenberg file , 1997 .

[21]  W. Salmon Dynamic Rationality: Propensity, Probability, and Credence , 1988 .

[22]  Michael Wooldridge,et al.  Game theoretic and decision theoretic agents , 2000, The Knowledge Engineering Review.

[23]  Ned Hall,et al.  Causation and counterfactuals , 2004 .

[24]  Robert W. Blanning,et al.  Metagraphs: a tool for modeling decision support systems , 1994 .

[25]  J. Kingman Terrifying Landscapes : A Study of Scientific Research Into Understanding Motivations of Non-State Actors to Acquire and / or Use Weapons of Mass Destruction , 2007 .

[26]  Patrick Y. K. Chau,et al.  Designing Effective Simulation-based Decision Support Systems: An Empirical Assessment of Three Types of Decision Support Systems , 1995 .

[27]  Joshua M Epstein,et al.  Modeling civil violence: An agent-based computational approach , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[28]  C. Henry Shrewd Sanctions: Statecraft and State Sponsors of Terrorism , 2003 .

[29]  D. Deutsch Quantum theory, the Church–Turing principle and the universal quantum computer , 1985, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[30]  Michael J. Prietula,et al.  Simulating organizations: computational models of institutions and groups , 1998 .

[31]  H. Gerard Dissonance Theory: A Cognitive Psychology With an Engine , 1992 .

[32]  D. L. Sallach Comparing objects composed by abstract relationships , 1989, [1989] Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume III: Decision Support and Knowledge Based Systems Track.

[33]  J. Rosenthal,et al.  Markov Chain Monte Carlo , 2018 .

[34]  John H. Miller,et al.  Complex adaptive systems - an introduction to computational models of social life , 2009, Princeton studies in complexity.

[35]  Kathleen M. Carley,et al.  Dynamic Network Analysis for Counter-Terrorism , 2005 .

[36]  Samina Ahmed Security dilemmas of nuclear-armed Pakistan , 2000 .

[37]  Richard P. Mitchell,et al.  The Society of the Muslim Brothers , 1972 .

[38]  David A. Hartley,et al.  A Hypergame Approach to Crisis Decision-Making: The 1973 Middle East War , 1982 .

[39]  W. E. Morris Hume’s Refutation of Inductive Probabilism , 1988 .

[40]  Lars-Erik Cederman,et al.  Emergent Actors in World Politics , 1997 .

[41]  Peter Bennett,et al.  Hypergames and What They Do: A ‘Soft O.R.’ Approach , 1982 .

[42]  Barton C. Hacker,et al.  The Transformation of War , 1992 .

[43]  Malcolm Dando,et al.  Deadly cultures: biological weapons since 1945. , 2006 .

[44]  Craig Calhoun,et al.  Explanation in Historical Sociology: Narrative, General Theory, and Historically Specific Theory1 , 1998, American Journal of Sociology.

[45]  Steve Smith,et al.  Lessons of October: historians, political scientists, policy-makers and the Cuban missile crisis , 1994 .

[46]  Z. Maoz,et al.  Israel and the Bomb , 2004, International Security.

[47]  Richard L. Russell,et al.  We Now Know: Rethinking Cold War History , 1998 .

[48]  J. Wirtz Deterring America: Rogue States and the Proliferation of Weapons of Mass Destruction , 2007, Perspectives on Politics.

[49]  G. Nigel Gilbert,et al.  Simulation for the social scientist , 1999 .

[50]  J. Pearl Causality: Models, Reasoning and Inference , 2000 .

[51]  Samir Okasha,et al.  Philosophical Theories of Probability , 2002 .

[52]  Joshua M. Epstein,et al.  Growing Artificial Societies: Social Science from the Bottom Up , 1996 .

[53]  J Moffat,et al.  Representing the command and control process in simulation models of conflict , 2000, J. Oper. Res. Soc..

[54]  Shivanand Balram,et al.  Integrating Geographic Information Systems and Agent-Based Modeling Techniques for Simulating Social and Ecological Processes , 2003, The Professional Geographer.

[55]  W. Heath The Difference: How the Power of Diversity Creates Better Groups, Firms, Schools, and Societies , 2008 .

[56]  B. D'espagnat Veiled Reality: An Analysis Of Present-day Quantum Mechanical Concepts , 1995 .

[57]  Jeffrey M. Bale,et al.  Deadly Connections: States That Sponsor Terrorism , 2006 .

[58]  John M. Swales,et al.  Consilience: The Unity of Knowledge , 1999 .

[59]  Paul E. Lehner,et al.  Using Hypergames to Increase Planned Payoff and Reduce Risk , 2002, Autonomous Agents and Multi-Agent Systems.

[60]  Scott D. Sagan,et al.  Why Do States Build Nuclear Weapons? Three Models in Search of a Bomb , 1996, International Security.

[61]  Ray Takeyh Hidden Iran: Paradox and Power in the Islamic Republic , 2006 .

[62]  G. Allen Greb,et al.  Strategic arms limitation , 2008 .

[63]  M. R. Dando,et al.  Complex Strategic Analysis: A Hypergame Study of the Fall of France , 1979 .

[64]  Charles M. Macal,et al.  Managing Business Complexity: Discovering Strategic Solutions with Agent-Based Modeling and Simulation , 2007 .

[65]  John F. Sowa,et al.  Knowledge representation: logical, philosophical, and computational foundations , 2000 .

[66]  Keith W. Hipel,et al.  A Conflict Analysis of the Armenian-Azerbaijani Dispute , 1990 .

[67]  Stanislaw Raczynski Simulation of The Dynamic Interactions Between Terror and Anti-Terror Organizational Structures , 2004, J. Artif. Soc. Soc. Simul..

[68]  T. A. May Biological Weapons: From the Invention of State-Sponsored Programs to Contemporary Bioterrorism , 2005 .

[69]  E. Durkheim Suicide: A Study in Sociology , 1897 .

[70]  Paul Collier,et al.  Rebellion as a Quasi-Criminal Activity , 2000 .

[71]  Joseph Y. Halpern,et al.  Redoing the Foundations of Decision Theory , 2006, KR.

[72]  N. Tannenwald The Nuclear Taboo: The United States and the Normative Basis of Nuclear Non-Use , 1999, International Organization.

[73]  J. Keegan,et al.  A History of Warfare. , 1995 .

[74]  N. Foo Conceptual Spaces—The Geometry of Thought , 2022 .

[75]  Arthur L. Stinchcombe,et al.  Theoretical methods in social history , 1980 .

[76]  Joseph M. Whitmeyer,et al.  Social Emergence: Societies as Complex Systems , 2006 .