Defending against Terrorist Attacks with Limited Resources
暂无分享,去创建一个
[1] D. W. Blackett. Pure strategy solutions of blotto games , 1958 .
[2] Lawrence Freedman. The Problem of Strategy , 1980 .
[3] Martin Shubik,et al. Systems Defense Games: Colonel Blotto, Command and Control , 1981 .
[4] Walter Enders,et al. UN Conventions, Technology and Retaliation in the Fight Against Terrorism: An Econometric Evaluation , 1990 .
[5] Walter Enders,et al. The Effectiveness of Antiterrorism Policies: A Vector-Autoregression-Intervention Analysis , 1993, American Political Science Review.
[6] A. Mas-Colell,et al. Microeconomic Theory , 1995 .
[7] Brad Roberts. America the vulnerable , 1999 .
[8] Biological terrorism and public health , 2001 .
[9] James C. Belke. Chemical accident risks in U.S. industry - A preliminary analysis of accident risk data from U.S. hazardous chemical facilities , 2001 .
[10] C. Chyba. Toward Biological Security , 2002 .
[11] Seth D. Guikema,et al. Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .
[12] Henry H. Willis,et al. Estimating Terrorism Risk , 2002 .
[13] Walter Enders,et al. Patterns of Transnational Terrorism, 1970–1999: Alternative Time-Series Estimates , 2002, Transnational Terrorism.
[14] Viktor Mayer-Schoenberger,et al. Emergency Communications: The Quest for Interoperability in the United States and Europe , 2002 .
[15] Walter Enders,et al. PATTERNS OF TRANSNATIONAL TERRORISM , 1970-99 : ALTERNATIVE TIME SERIES ESTIMATES by , 2002 .
[16] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[17] I. M. Destler,et al. Protecting the American Homeland , 2003 .
[18] George W Bush,et al. The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets , 2003 .
[19] Protecting the American Homeland: One Year On , 2003 .
[20] T. Sandler,et al. What do we know about the substitution effect in transnational terrorism , 2003 .
[21] Donald F. Kettl,et al. The Department of Homeland Security's first year : a report card , 2004 .
[22] T. Sandler,et al. An economic perspective on transnational terrorism , 2004 .
[23] Todd Sandler,et al. The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.
[24] John D. Moteff. Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences , 2004 .
[25] T. Sandler,et al. Too Much of a Good Thing? , 2004 .
[26] E. Talley,et al. Optimal Liability for Terrorism , 2005 .
[27] Michael Chertoff. Secretary Michael Chertoff U.S. Department of Homeland Security Second Stage Review Remarks [July 13, 2005] , 2005 .
[28] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[29] T. Sandler,et al. Global Terrorism: Deterrence Versus Pre-Emption , 2006 .
[30] R. Powell,et al. Defending Against Strategic Terrorists Over the Long Run: A Basic Approach to Resource Allocation , 2006 .
[31] B. Roberson. The Colonel Blotto game , 2006 .
[32] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[33] Cycles and Substitutions in Terrorist Activities: A Spectral Approach , 2007 .
[34] Ethan Bueno de Mesquita. Politics and the Suboptimal Provision of Counterterror , 2007, International Organization.
[35] Michael Chertoff. Department of Homeland Security. , 2007, Disaster medicine and public health preparedness.
[36] Scott E. Page,et al. General Blotto: games of allocative strategic mismatch , 2009 .
[37] John D Moteff. Critical Infrastructures: Background, Policy, and Implementation , 2009 .