Protection Intensity Evaluation for a Security System Based on Entropy Theory
暂无分享,去创建一个
Ruimin Hu | Jun Chen | Haitao Lv | Zheng He | Shihong Chen | R. Hu | Shihong Chen | Jun Chen | Haitao Lv | Zheng He
[1] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[2] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[3] J. L. Darby. SEAPATH: A microcomputer code for evaluating physical security effectiveness using adversary sequence diagrams , 1986 .
[4] Jun Zhuang,et al. Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[5] Jun Zhuang,et al. Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[6] Rudolf Clausius,et al. The Mechanical Theory of Heat: With Its Applications to the Steam-Engine and to the Physical Properties of Bodies , 2015 .
[7] Edward P. Halibozek,et al. Introduction to Security , 1975 .
[8] Sheldon Howard Jacobson,et al. Probability models for access security system architectures , 1997 .
[9] Xiaojun Shan,et al. Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..
[10] S. Sandler. Chemical and engineering thermodynamics , 1977 .
[11] W. J. Schneider,et al. Countermeasures development in the physical security design process: an anti-terrorist perspective , 1989, Proceedings. International Carnahan Conference on Security Technology.
[12] Kjell Hausken,et al. The timing and deterrence of terrorist attacks due to exogenous dynamics , 2012, J. Oper. Res. Soc..
[13] H. A. Bennett,et al. Evaluation methodology for fixed-site physical protection systems. [Safeguards Upgrade Rule] , 1980 .
[14] Jonathan Pollet,et al. All hazards approach for assessing readiness of critical infrastructure , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[15] Jun Zhuang,et al. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[16] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[17] Leonard R. Doyon. Stochastic modeling of facility security-systems for analytical solutions , 1981 .
[18] Sheldon Howard Jacobson,et al. A Detection Theoretic approach to Modeling Aviation Security Problems using the Knapsack Problem , 2001 .
[19] Mary Lynn Garcia,et al. The Design and Evaluation of Physical Protection Systems , 2001 .
[20] Claude E. Shannon,et al. The mathematical theory of communication , 1950 .
[21] Kathleen Mary Dame Kenyon,et al. Digging Up Jericho , 1957 .
[22] M. J. Hicks,et al. Physical protection systems cost and performance analysis: a case study , 1999 .