Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?
暂无分享,去创建一个
[1] George E Apostolakis,et al. A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism , 2005, Risk analysis : an official publication of the Society for Risk Analysis.
[2] H. Kunreuther,et al. Interdependent Security , 2003 .
[3] H. Kunreuther,et al. IDS Models of Airline Security , 2005 .
[4] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[5] Gregory S Parnell,et al. Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[6] Elisabeth Paté-Cornell,et al. Fusion of Intelligence Information: A Bayesian Approach , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[7] Fred S. Roberts,et al. Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational Challenges , 2007, 2007 IEEE Intelligence and Security Informatics.
[8] Niyazi Onur Bakir. A Decision Tree Model for Evaluating Countermeasures to Secure Cargo at United States Southwestern Ports of Entry , 2008, Decis. Anal..
[9] Craig W. Kirkwood,et al. Strategic decision making : multiobjective decision analysis with spreadsheets : instructor's manual , 1996 .
[10] Ralph L. Keeney,et al. Decisions with multiple objectives: preferences and value tradeoffs , 1976 .
[11] Detlof von Winterfeldt,et al. Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists? , 2006, Decis. Anal..
[12] D von Winterfeldt,et al. A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[13] C. Kirkwood. Strategic Decision Making , 1996 .
[14] James H Lambert,et al. A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[15] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[16] R. L. Keeney,et al. Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.
[17] Seth D. Guikema,et al. Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .
[18] Jose Emmanuel Ramirez-Marquez,et al. Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach , 2008, Reliab. Eng. Syst. Saf..
[19] Michael Masters. Committee on Homeland Security and Governmental Affairs , 2008 .
[20] Vicki M. Bier,et al. Methodology for identifying near-optimal interdiction strategies for a power transmission system , 2007, Reliab. Eng. Syst. Saf..
[21] Vicki M. Bier,et al. Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .
[22] Alan L. Erera,et al. Optimization Approaches for Efficient Container Security Operations at Transshipment Seaports , 2003 .
[23] Ralph L Keeney,et al. Modeling Values for Anti‐Terrorism Analysis , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[24] Yacov Y Haimes,et al. Risk Filtering, Ranking, and Management Framework Using Hierarchical Holographic Modeling , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[25] T. Bedford,et al. Probabilistic Risk Analysis: Foundations and Methods , 2001 .
[26] L. Robin Keller,et al. A Multiple-Objective Decision Analysis for Terrorism Protection: Potassium Iodide Distribution in Nuclear Incidents , 2006, Decis. Anal..
[27] Vicki M. Bier,et al. Subsidies in Interdependent Security With Heterogeneous Discount Rates , 2007 .
[28] Robert T. Clemen,et al. Making Hard Decisions with Decisiontools Suite , 2000 .