Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game
暂无分享,去创建一个
[1] Jun Zhuang,et al. Modelling ‘contracts’ between a terrorist group and a government in a sequential game , 2012, J. Oper. Res. Soc..
[2] L. Lave,et al. The Economic Implications of Terrorist Attack on Commercial Aviation in the USA , 2014 .
[3] Kjell Hausken and Gregory Levitin. Review of Systems Defense and Attack Models , 2012, International Journal of Performability Engineering.
[4] Jun Zhuang,et al. N-stage security screening strategies in the face of strategic applicants , 2017, Reliab. Eng. Syst. Saf..
[5] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[6] Robert Powell,et al. Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.
[7] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[8] Jing Zhang,et al. Modeling multi-target defender-attacker games with quantal response attack strategies , 2021, Reliab. Eng. Syst. Saf..
[9] V. Bier,et al. Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[10] Alois Stutzer,et al. Calculating Tragedy: Assessing the Costs of Terrorism , 2004, SSRN Electronic Journal.
[11] Kjell Hausken,et al. Choosing what to protect when attacker resources and asset valuations are uncertain , 2014 .
[12] Canan Ulu,et al. Risk Aversion, Information Acquisition, and Technology Adoption , 2017, Oper. Res..
[13] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[14] Peter Gordon,et al. The Economic Impacts of a Terrorist Attack on the U.S. Commercial Aviation System , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[15] Donghyun Park,et al. The economic impact of terrorism: A new model and its application to Pakistan , 2015 .
[16] Todd Sandler,et al. Chapter 25 Terrorism: A Game-Theoretic Approach⁎ , 2007 .
[17] Gregory Levitin,et al. Intelligence and impact contests in systems with redundancy, false targets, and partial protection , 2009, Reliab. Eng. Syst. Saf..
[18] Abdollah Shafieezadeh,et al. A decision framework for managing risk to airports from terrorist attack. , 2015, Risk analysis : an official publication of the Society for Risk Analysis.
[19] Jennifer F. Reinganum. On the diffusion of new technology: A game theoretic approach , 1981 .
[20] Peter J. Phillips,et al. The End Of Al-Qa`ida: Rationality, Survivability and Risk Aversion , 2013 .
[21] Sheldon H. Jacobson,et al. Risk-Based Policies for Airport Security Checkpoint Screening , 2010, Transp. Sci..
[22] James E. Smith,et al. Uncertainty, Information Acquisition, and Technology Adoption , 2009, Oper. Res..
[23] David A. Siegel,et al. Is this Paper Dangerous? Balancing Secrecy and Openness in Counterterrorism , 2010 .
[24] Vineet M. Payyappalli,et al. Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts , 2017, Risk analysis : an official publication of the Society for Risk Analysis.
[25] Jun Zhuang,et al. Security screening queues with impatient applicants: A new model with a case study , 2018, Eur. J. Oper. Res..
[26] Qianmei Feng. On determining specifications and selections of alternative technologies for airport checked-baggage security screening. , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[27] Michael Freeman. The Sources of Terrorist Financing: Theory and Typology , 2011 .
[28] Vu Ekhosuehi,et al. Determination of the optimal exchange rate via control of the domestic interest rate in Nigeria , 2014 .
[29] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[30] John Mueller,et al. Terrorism Risks and Cost‐Benefit Analysis of Aviation Security , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[31] Solomon Wong,et al. Evolving risk-based security: A review of current issues and emerging trends impacting security screening in the aviation industry , 2015 .
[32] Sheldon H. Jacobson,et al. The impact of aviation checkpoint queues on optimizing security screening effectiveness , 2011, Reliab. Eng. Syst. Saf..
[33] Andrea Maurizio,et al. A survey of New Yorkers after the Sept. 11, 2001, terrorist attacks. , 2003, The American journal of psychiatry.
[34] Gregory Levitin,et al. Separation in homogeneous systems with independent identical elements , 2010, Eur. J. Oper. Res..
[35] Victor Richmond R. Jose,et al. Technology Adoption, Accumulation, and Competition in Multiperiod Attacker-Defender Games , 2013 .
[36] J. Zhuang,et al. Technology Evolutionary Games in Complex Transportation Systems in the Face of Adaptive Adversaries , 2011 .
[37] Kevin Zhu,et al. Strategic Decisions of New Technology Adoption Under Asymmetric Information: A Game Theoretic Model , 2003, Decis. Sci..
[38] Micaela Demichela,et al. Risk assessment techniques for civil aviation security , 2011, Reliab. Eng. Syst. Saf..
[39] Jomon Aliyas Paul,et al. Optimal Allocation of Resources in Airport Security: Profiling vs. Screening , 2014, Oper. Res..
[40] Jun Zhuang,et al. European Journal of Operational Research on the Value of Exposure and Secrecy of Defense System: First-mover Advantage vs. Robustness , 2022 .
[41] Brian A. Jackson,et al. Assessing the Effectiveness of Layered Security for Protecting the Aviation System Against Adaptive Adversaries , 2015 .
[42] Jing Zhang,et al. The role of risk preferences in a multi-target defender-attacker resource allocation game , 2018, Reliab. Eng. Syst. Saf..
[43] Kailash C. Kapur,et al. Designing airport checked-baggage-screening strategies considering system capability and reliability , 2009, Reliab. Eng. Syst. Saf..
[44] Sheldon H Jacobson,et al. A Cost‐Benefit Analysis of Alternative Device Configurations for Aviation‐Checked Baggage Security Screening , 2006, Risk analysis : an official publication of the Society for Risk Analysis.
[45] Todd R. LaPorte,et al. Airport Security, High Reliability, and the Problem of Rationality , 2002 .
[46] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[47] Detlof von Winterfeldt,et al. Comparative Analysis of Terrorists' Objectives Hierarchies , 2020, Decis. Anal..
[48] Jun Zhuang,et al. Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors , 2018, Risk analysis : an official publication of the Society for Risk Analysis.
[49] Heather Rosoff,et al. Valuing Equal Protection in Aviation Security Screening , 2017, Risk analysis : an official publication of the Society for Risk Analysis.