Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort
暂无分享,去创建一个
[1] T. Sandler,et al. Too Much of a Good Thing? , 2004 .
[2] Bruno S. Frey,et al. Decentralization as a disincentive for terror , 2004 .
[3] Vicki M. Bier,et al. Subsidized Security and Stability of Equilibrium Solutions in an N-Player Game with Errors ⁄ , 2006 .
[4] T. Sandler,et al. Global Terrorism: Deterrence Versus Pre-Emption , 2006 .
[5] Vicki M. Bier,et al. Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..
[6] Kai A. Konrad. The Investment Problem in Terrorism , 2004 .
[7] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[8] Ian Bellany. Superpower games: applying game theory to superpower conflict , 1986 .
[9] Robert Powell,et al. Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.
[10] R. Zeckhauser,et al. The Ecology of Terror Defense , 2003 .
[11] Gerard Debreu,et al. A Social Equilibrium Existence Theorem* , 1952, Proceedings of the National Academy of Sciences.
[12] Bernard Harris. Mathematical Methods in Combating Terrorism , 2002 .
[13] Todd Sandler,et al. The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.
[14] Harvey E. Lapan,et al. To Bargain or Not to Bargain: That is the Question , 1988 .
[15] I. Glicksberg. A FURTHER GENERALIZATION OF THE KAKUTANI FIXED POINT THEOREM, WITH APPLICATION TO NASH EQUILIBRIUM POINTS , 1952 .
[16] J. Tirole. The Theory of Industrial Organization , 1988 .
[17] E. Maskin,et al. The Existence of Equilibrium in Discontinuous Economic Games, I: Theory , 1986 .
[18] J. Hirshleifer. Conflict and rent-seeking success functions: Ratio vs. difference models of relative success , 1989 .
[19] G. Beitel,et al. Balanced Scorecard Method For Predicting TheProbability Of A Terrorist Attack , 2004 .
[20] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[21] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[22] Huseyin Cavusoglu,et al. Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches , 2004, Decis. Anal..
[23] Ethan Bueno de Mesquita. Conciliation, Counterterrorism, and Patterns of Terrorist Violence , 2005, International Organization.
[24] Ethan Bueno de Mesquita. The Terrorist Endgame , 2005 .
[25] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[26] Todd Sandler,et al. Terrorists versus the Government , 2006 .
[27] Vicki M. Bier,et al. Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .
[28] James H. Clifford,et al. Protecting the American Homeland: A Preliminary Analysis , 2003 .
[29] Bernard Harris. Mathematical methods in combatting terrorism. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[30] C. Perrow. Shrink the Targets , 2006, IEEE Spectrum.
[31] Herschel I. Grossman,et al. Swords or Plowshares? A Theory of the Security of Claims to Property , 1995, Journal of Political Economy.
[32] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[33] B. Frey,et al. How to Fight Terrorism: Alternatives to Deterrence , 2003 .
[34] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[35] Seth D. Guikema,et al. Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art , 2009 .
[36] G. Woo. Quantitative Terrorism Risk Assessment , 2002 .
[37] Ethan Bueno de Mesquita. The Terrorist Endgame , 2005 .
[38] Scott Farrow,et al. THE ECONOMICS OF HOMELAND SECURITY EXPENDITURES: FOUNDATIONAL EXPECTED COST‐EFFECTIVENESS APPROACHES , 2007 .
[39] K. Fan. Fixed-point and Minimax Theorems in Locally Convex Topological Linear Spaces. , 1952, Proceedings of the National Academy of Sciences of the United States of America.
[40] Huseyin Cavusoglu,et al. The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..
[41] D. B. Montgomery,et al. First‐mover advantages , 1988 .
[42] S. Skaperdas. Contest success functions , 1996 .
[43] J. Frey. The 9/11 Commission Report: Final Report of the National Commission on Terrorist attacks upon the United States , 2004 .
[44] Peter R. Orszag,et al. Protecting the American Homeland: A Preliminary Analysis , 2002 .
[45] Vicki M. Bier,et al. Subsidies in Interdependent Security With Heterogeneous Discount Rates , 2007 .