Probabilistic Risk Analysis and Terrorism Risk
暂无分享,去创建一个
John A. Sokolowski | Detlof von Winterfeldt | Barry Charles Ezell | Steven P Bennett | John Sokolowski | Andrew J Collins | D. von Winterfeldt | B. Ezell | Andrew J. Collins | Steven P. Bennett
[1] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[2] M. Douglas,et al. Terrorism: A Positive Feedback Game , 2003 .
[3] Charles H. Anderton,et al. Applying Intermediate Microeconomics to Terrorism , 2004 .
[4] Deborah Goodwin. The Military and Negotiation: The Role of the Soldier-Diplomat , 2005 .
[5] Bilal M Ayyub,et al. Risk analysis for critical asset protection. , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[6] Steven E. Plaut. Misplaced Applications of Economic Theory to the Middle East , 2004 .
[7] Roger M. Cooke,et al. Probabilistic Risk Analysis: Probabilistic risk analysis , 2001 .
[8] Henry H. Willis,et al. Estimating Terrorism Risk , 2002 .
[9] Robin L. Dillon-Merrill,et al. Logic Trees: Fault, Success, Attack, Event, Probability, and Decision Trees , 2009 .
[10] Herbert Hamers,et al. Operations research games: A survey , 2001 .
[11] Kjell Hausken,et al. Defending Against Terrorism, Natural Disaster, and All Hazards , 2009 .
[12] W. Kip Viscusi. The risks of terrorism , 2003 .
[13] Sarit Kraus,et al. Bayesian stackelberg games and their application for security at Los Angeles international airport , 2008, SECO.
[14] Richard E. Wilson,et al. COMBATING TERRORISM: AN EVENT TREE APPROACH , 2003 .
[15] J. Neumann,et al. The Theory of Games and Economic Behaviour , 1944 .
[16] Roger Anderson,et al. Homeland Security , 2004, Gov. Inf. Q..
[17] G. Apostolakis. The concept of probability in safety assessments of technological systems. , 1990, Science.
[18] Harvey E. Lapan,et al. To Bargain or Not to Bargain: That is the Question , 1988 .
[19] Hiromitsu Kumamoto,et al. Probabilistic Risk Assessment and Management for Engineers and Scientists , 1996 .
[20] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[21] Anthony H. Cordesman. The challenge of biological terrorism , 2005 .
[22] J. M. Smith. The theory of games and the evolution of animal conflicts. , 1974, Journal of theoretical biology.
[23] Seth D. Guikema,et al. Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .
[24] Robert J. Aumann,et al. Repeated Games with Incomplete Information , 1995 .
[25] P. Jean-Jacques Herings,et al. Fuzzy play, matching devices and coordination failures , 2001, Int. J. Game Theory.
[26] Howard Kunreuther,et al. You Can Only Die Once: Interdependent Security in an Uncertain World , 2005 .
[27] J. Harsanyi. Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .
[28] James H. Lambert,et al. Risks of Cyber Attack to Water Utility Supervisory Control and Data Acquisition Systems , 2001 .
[29] Larry G. Blackwood. Risk Modeling for Determining Value and Decision Making , 2001, Technometrics.
[30] J. Nash. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[31] W. McEneaney,et al. Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind , 2006 .
[32] John C. McDonald,et al. Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..
[33] Ralph L. Keeney,et al. Eliciting probabilities from experts in complex technical problems , 1991 .
[34] Richard Scheines,et al. Constructing Bayesian Network Models of Gene Expression Networks from Microarray Data , 2000 .
[35] C. Allin Cornell,et al. Seismic Risk Analysis of Boston , 1975 .
[36] D. Earn,et al. Group interest versus self-interest in smallpox vaccination policy , 2003, Proceedings of the National Academy of Sciences of the United States of America.
[37] S. Kaplan,et al. On The Quantitative Definition of Risk , 1981 .
[38] M. Elisabeth Paté-Cornell,et al. Advances in Decision Analysis: The Engineering Risk-Analysis Method and Some Applications , 2007 .
[39] N. Abrahamson,et al. On the Use of Logic Trees for Ground-Motion Prediction Equations in Seismic-Hazard Analysis , 2005 .
[40] J. Harsanyi. Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .
[41] Detlof von Winterfeldt,et al. Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists? , 2006, Decis. Anal..
[42] D von Winterfeldt,et al. A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[43] Nicholas R. Jennings,et al. Computational-Mechanism Design: A Call to Arms , 2003, IEEE Intell. Syst..
[44] Kathryn B. Laskey,et al. An Application of Bayesian Networks to Antiterrorism Risk Management for Military Planners , 2005 .