Choosing What to Protect
 T. Sandler,et al. Transnational public goods: Strategies and institutions , 2001 .
 W. Martin. Honey pots and honey nets , Security through deception , 2001 .
 G. Woo. Quantitative Terrorism Risk Assessment , 2002 .
 Yacov Y. Haimes. Roadmap for Modeling Risks of Terrorism to the Homeland , 2002 .
 John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
 Henry H. Willis,et al. Estimating Terrorism Risk , 2002 .
 T. Sandler,et al. Terrorism & Game Theory , 2003 .
 I. M. Destler,et al. Protecting the American Homeland , 2003 .
 D. Cousins. Bureau of Customs and Border Protection , 2003 .
 B. Zycher. A Preliminary Benefit / Cost Framework for Counterterrorism Public Expenditures , 2003 .
 Vicki M. Bier,et al. Optimal Allocation of Resources for Defense of Simple Series and Parallel Systems from Determined Adversaries , 2003 .
 H. Kunreuther,et al. Interdependent Security , 2003 .
 T. Sandler,et al. What do we know about the substitution effect in transnational terrorism , 2003 .
 B. Frey,et al. How to Fight Terrorism: Alternatives to Deterrence , 2003 .
 R. Zeckhauser,et al. The Ecology of Terror Defense , 2003 .
 T. Sandler,et al. An economic perspective on transnational terrorism , 2004 .
 Budi Arief,et al. Computer security impaired by legitimate users , 2004, Computers & security.
 J. Mueller. A False Sense of Insecurity , 2004 .
 Kenneth Hendricks,et al. Feints , 2004 .
 Vicki M. Bier,et al. Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..
 Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
 A. Brunet. Grant Funding to State and Local Governments and Systematic Assessment of Vulnerability , 2005 .
 Veronique de Rugy. What Does Homeland Security Spending Buy , 2005 .
 David L. Banks,et al. Combining Game Theory and Risk Analysis in Counterterrorism: A Smallpox Example , 2006 .