Critical infrastructure protection under imperfect attacker perception
暂无分享,去创建一个
[1] K. Hausken. Income, interdependence, and substitution effects affecting incentives for security investment , 2006 .
[2] Scott Beveridge,et al. Income , 2002 .
[3] Todd Sandler,et al. The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.
[4] Joe Straw,et al. Insurance , 2003, Washington Information Directory 2021–2022.
[5] Ward Hanson,et al. Optimizing Multinomial Logit Profit Functions , 1996 .
[6] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[7] Robert Powell,et al. Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.
[8] Åke J. Holmgren,et al. Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks , 2007, IEEE Transactions on Power Systems.
[9] Drew Fudenberg,et al. Game theory (3. pr.) , 1991 .
[10] William M. Landes,et al. An Economic Study of U. S. Aircraft Hijacking, 1961-1976 , 1978, The Journal of Law and Economics.
[11] H. Kunreuther,et al. Interdependent Security , 2003 .
[12] Ferenc Jordán. Predicting target selection by terrorists: a network analysis of the 2005 London underground attacks , 2008, Int. J. Crit. Infrastructures.
[13] White House Administrative Office. The national strategy for the physical protection of critical infrastructures and key assets , 2003 .
[14] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[15] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[16] Vicki M. Bier,et al. Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..
[17] T. G. Lewis,et al. A general defender-attacker risk model for networks , 2008 .
[18] Göran Grimvall. Risks in technological systems , 2010 .
[19] Richard L. Church,et al. Protecting Critical Assets: The r-interdiction median problem with fortification , 2007 .
[20] R. Powell,et al. Defending Against Strategic Terrorists Over the Long Run: A Basic Approach to Resource Allocation , 2006 .
[21] B. Frey,et al. How to Fight Terrorism: Alternatives to Deterrence , 2003 .
[22] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[23] Richard Wilson. Risk analysis , 1986, Nature.