Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation
暂无分享,去创建一个
[1] F. E. Rourke,et al. Secrecy and Publicity: Dilemmas of Democracy. , 1962 .
[2] S. Brams,et al. Deception in simple voting games , 1977 .
[3] Steven J. Brams,et al. Deception in 2 × 2 Games , 1977 .
[4] Sissela Bok,et al. Secrets: On the Ethics of Concealment and Revelation , 1982 .
[5] David G. Bromley,et al. Secrecy: A Cross-Cultural Perspective. , 1982 .
[6] Steven D. Levitt,et al. Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack , 1997 .
[7] Peter P. Swire. What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory , 2001, ArXiv.
[8] Oliver J. Board. The Deception of the Greeks: Generalizing the Information Structure of Extensive Form Games , 2002 .
[9] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[10] Eric Maskin,et al. The Politician and the Judge: Accountability in Government , 2004 .
[11] Molly J. Walker Wilson,et al. Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit , 2003 .
[12] D. Pinto. Secrets and Lies: Digital Security in a Networked World , 2003 .
[13] Peter P. Swire. A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security? , 2004, J. Telecommun. High Technol. Law.
[14] Kenneth Hendricks,et al. Feints , 2004 .
[15] Gerald G. Brown,et al. A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..
[16] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[17] Gilbert Laporte,et al. A Continuous Model for Multistore Competitive Location , 2005, Oper. Res..
[18] Vicki M. Bier,et al. Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .
[19] Robert Powell,et al. Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.
[20] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[21] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[22] Gilat Levy. Decision–Making Procedures for Committees of Careerist Experts , 2007 .
[23] Gerald G. Brown,et al. Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..
[24] Gregory Levitin,et al. Protection vs. false targets in series systems , 2009, Reliab. Eng. Syst. Saf..
[25] Vicki M. Bier,et al. Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .
[26] Jun Zhuang,et al. Robustness of Optimal Defensive Resource Allocations in the Face of Less Fully Rational Attacker , 2009 .
[27] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[28] David A. Siegel,et al. Is this Paper Dangerous? Balancing Secrecy and Openness in Counterterrorism , 2010 .
[29] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[30] Vicki M. Bier,et al. Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks , 2011, Ann. Oper. Res..