Risk Assessment of Security Systems Based on Entropy Theory and Neyman-Pearson Criterion
暂无分享,去创建一个
Haitao Lv | Zongmin Cui | Hongbo Zhou | Chao Yin | Qin Zhan | Hongbo Zhou | Zongmin Cui | Haitao Lv | Chao Yin | Qin Zhan
[1] Kjell Hausken,et al. The timing and deterrence of terrorist attacks due to exogenous dynamics , 2012, J. Oper. Res. Soc..
[2] J. L. Darby. SEAPATH: A microcomputer code for evaluating physical security effectiveness using adversary sequence diagrams , 1986 .
[3] Kathleen Mary Dame Kenyon,et al. Digging Up Jericho , 1957 .
[4] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[5] Jun Zhuang,et al. Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[6] A. Singer,et al. Detection and Estimation of , 1999 .
[7] Xiaojun Shan,et al. Subsidizing to disrupt a terrorism supply chain—a four-player game , 2014, J. Oper. Res. Soc..
[8] M. J. Hicks,et al. Physical protection systems cost and performance analysis: a case study , 1999 .
[9] Mary Lynn Garcia,et al. The Design and Evaluation of Physical Protection Systems , 2001 .
[10] Charles F. Hockett,et al. A mathematical theory of communication , 1948, MOCO.
[11] Sheldon Howard Jacobson,et al. Probability models for access security system architectures , 1997 .
[12] Xiaojun Shan,et al. Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..
[13] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[14] Leonard R. Doyon. Stochastic modeling of facility security-systems for analytical solutions , 1981 .
[15] Edward P. Halibozek,et al. Introduction to Security , 1975 .
[16] Jonathan Pollet,et al. All hazards approach for assessing readiness of critical infrastructure , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[17] Jun Zhuang,et al. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[18] David C. Walters,et al. Introduction to Security, Ninth Edition , 2012 .
[19] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .