Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker
暂无分享,去创建一个
[1] Per Baltzer Overgaard,et al. The Scale of Terrorist Attacks as a Signal of Resources , 1994 .
[2] H. Kunreuther,et al. Interdependent Security , 2003 .
[3] I. Glicksberg. A FURTHER GENERALIZATION OF THE KAKUTANI FIXED POINT THEOREM, WITH APPLICATION TO NASH EQUILIBRIUM POINTS , 1952 .
[4] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[5] Simon Luechinger,et al. Terrorism: Deterrence May Backfire , 2002 .
[6] Todd Sandler,et al. The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.
[7] T. Sandler,et al. Collective Action and Transnational Terrorism , 2003 .
[8] Vicki M. Bier,et al. Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .
[9] Harvey E. Lapan,et al. Terrorism and signalling , 1993 .
[10] Martin Shubik,et al. Systems Defense Games: Colonel Blotto, Command and Control , 1981 .
[11] Peter J. Coughlin. Pure strategy equilibria in a class of systems defense games , 1992 .
[12] G. Woo. Quantitative Terrorism Risk Assessment , 2002 .
[13] B. Frey,et al. How to Fight Terrorism: Alternatives to Deterrence , 2003 .
[14] B. Silverman,et al. Modeling and Simulating Terrorist Decision-making: A 'Performance Moderator Function' Approach to Generating Virtual Opponents , 2001 .
[15] T. Sandler,et al. An economic perspective on transnational terrorism , 2004 .
[16] R. Zeckhauser,et al. The Ecology of Terror Defense , 2003 .
[17] Todd Sandler,et al. Counterterrorism , 2005 .
[18] Daniel G. Arce,et al. Transnational public goods: Strategies and institutions , 2001 .