Security and Game Theory: Evaluating Deployed Decision-Support Systems for Security: Challenges, Analysis, and Approaches
暂无分享,去创建一个
[1] K. R. Hammond. Probabilistic functioning and the clinical method. , 1955, Psychological review.
[2] John R. Madden,et al. The impact of the 2002–2003 drought on Australia , 2005 .
[3] Vincent Conitzer,et al. Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.
[4] D. von Winterfeldt,et al. Identifying and Structuring the Objectives of Terrorists , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[5] M. Elisabeth Paté-Cornell. Warning Systems and Risk Reduction , 1985 .
[6] Marshall A. Wise,et al. International Equity and Differentiation in Global Warming Policy , 1998 .
[7] P. Fishburn,et al. Dispersive equity and social risk , 1991 .
[8] Louis Anthony (Tony) Cox,et al. Some Limitations of Qualitative Risk Rating Systems , 2005, Risk analysis : an official publication of the Society for Risk Analysis.
[9] Kelly E. See,et al. Between ignorance and truth: Partition dependence and learning in judgment under uncertainty. , 2006, Journal of experimental psychology. Learning, memory, and cognition.
[10] P Slovic,et al. Assessment of the Regional Economic Impacts of Catastrophic Events: CGE Analysis of Resource Loss and Behavioral Effects of an RDD Attack Scenario , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[11] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[12] P. Slovic. Perception of risk. , 1987, Science.
[13] Leonard J. Savage,et al. The Theory of Statistical Decision , 1951 .
[14] Ali E. Abbas,et al. One-Switch Conditions for Multiattribute Utility Functions , 2012, Oper. Res..
[15] Jeffrey D. Berejikian. Model Building With Prospect Theory: A Cognitive Approach to International Relations , 2002 .
[16] Robert Powell. Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..
[17] A. Rose,et al. Modeling Regional Economic Resilience to Disasters: A Computable General Equilibrium Analysis of Water Service Disruptions , 2005 .
[18] S. Galea,et al. Measuring Capacities for Community Resilience , 2010 .
[19] R. Duncan Luce,et al. Individual Choice Behavior , 1959 .
[20] Kiseop Lee,et al. T-Statistics for Weighted Means in Credit Risk Modelling , 2005 .
[21] Zheng Cao,et al. Optimal Stopping Analysis of a Radiation Detection System to Protect Cities from a Nuclear Terrorist Attack , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[22] Lawrence M Wein,et al. Analyzing Evacuation Versus Shelter‐in‐Place Strategies After a Terrorist Nuclear Detonation , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[23] A. Colman. Cooperation, psychological game theory, and limitations of rationality in social interaction , 2003, Behavioral and Brain Sciences.
[24] János Aczél,et al. The Role of Some Functional Equations in Decision Analysis , 2010, Decis. Anal..
[25] A. Rose. Input-output economics and computable general equilibrium models , 1995 .
[26] Richard Mesic,et al. Implementing Security Improvement Options at Los Angeles International Airport , 2006 .
[27] Ward Edwards,et al. Conservatism in Complex Probabilistic Inference , 1966 .
[28] M. Douglas,et al. Terrorism: A Positive Feedback Game , 2003 .
[29] Winston Harrington,et al. On the Accuracy of Regulatory Cost Estimates , 2000 .
[30] Laurent El Ghaoui,et al. Robust Control of Markov Decision Processes with Uncertain Transition Matrices , 2005, Oper. Res..
[31] S. Brock Blomberg,et al. Total Economic Consequences of Terrorist Attacks: Insights from 9/11 , 2010 .
[32] Detlof von Winterfeldt,et al. Meeting the Challenges of Terrorism Risk Analysis , 2007 .
[33] Roberto Szechtman,et al. Scheduling policies for an antiterrorist surveillance system , 2009 .
[34] B Fischhoff,et al. A Deliberative Method for Ranking Risks (I): Overview and Test Bed Development , 2001, Risk analysis : an official publication of the Society for Risk Analysis.
[35] J. Shoven,et al. Applied General Equilibrium Models of Taxation and International Trade , 1983 .
[36] Gary H. McClelland,et al. The Effect of Risk Beliefs on Property Values: A Case Study of a Hazardous Waste Site1 , 1990 .
[37] Peter J. Lambert,et al. Inequality Decomposition Analysis and the Gini Coefficient Revisited , 1993 .
[38] Richard E. Wilson,et al. COMBATING TERRORISM: AN EVENT TREE APPROACH , 2003 .
[39] A. Raftery,et al. Discussion: Performance of Bayesian Model Averaging , 2003 .
[40] Harvey E. Lapan,et al. To Bargain or Not to Bargain: That is the Question , 1988 .
[41] Hamid Mohtadi,et al. The risk of catastrophic terrorism: an extreme value approach , 2009 .
[42] C. Starr. Social benefit versus technological risk. , 1969, Science.
[43] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[44] J. Quiggin. A theory of anticipated utility , 1982 .
[45] M. Wardman. Review and meta-analysis of U.K. time elasticities of travel demand , 2012 .
[46] D. McFadden. Quantal Choice Analysis: A Survey , 1976 .
[47] Horst Zank,et al. Cumulative Prospect Theory for Parametric and Multiattribute Utilities , 2001, Math. Oper. Res..
[48] Randy A. Freeman,et al. Robust Nonlinear Control Design , 1996 .
[49] Jun Zhuang,et al. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[50] T. Sandler,et al. A Theoretical Analysis of Transnational Terrorism , 1983, American Political Science Review.
[51] James A Giesecke,et al. Development of a Large-scale Single US Region CGE Model using IMPLAN Data: A Los Angeles County Example with a Productivity Shock Application , 2011 .
[52] Peter B. Dixon,et al. You can't have a CGE recession without excess capacity , 2011 .
[53] John C. McDonald,et al. Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..
[54] D. Paton,et al. Disasters and communities: vulnerability, resilience and preparedness , 2001 .
[55] Ali E. Abbas,et al. One-Switch Independence for Multiattribute Utility Functions , 2011, Oper. Res..
[56] Gerald G. Brown,et al. When Is Uncertainty About Uncertainty Worth Characterizing? , 2008, Interfaces.
[57] JiYoung Park. The Economic Impacts of Dirty Bomb Attacks on the Los Angeles and Long Beach Ports: Applying the Supply-Driven NIEMO (National Interstate Economic Model) , 2008 .
[58] Dimitris Bertsimas,et al. The Price of Fairness , 2011, Oper. Res..
[59] Chen Wang,et al. Impact of intelligence on target-hardening decisions , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[60] H. Akaike. A new look at the statistical model identification , 1974 .
[61] Steve Leach,et al. Transmission potential of smallpox in contemporary populations , 2001, Nature.
[62] Ralph L. Keeney,et al. Understanding Life-Threatening Risks , 1995 .
[63] Ronald A. Howard,et al. Decision analysis: practice and promise , 1988 .
[64] C. S. Holling. Resilience and Stability of Ecological Systems , 1973 .
[65] Milind Tambe,et al. Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.
[66] H. Kunreuther,et al. IDS Models of Airline Security , 2005 .
[67] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[68] Adam Rose,et al. INPUT-OUTPUT STRUCTURAL DECOMPOSITION ANALYSIS: A CRITICAL APPRAISAL , 1996 .
[69] Michael D. White. Port of Los Angeles , 2008 .
[70] D. Kahneman,et al. Timid choices and bold forecasts: a cognitive perspective on risk taking , 1993 .
[71] W. RobertsBryan,et al. The Macroeconomic Impacts of the 9/11 Attack: Evidence from Real-Time Forecasting , 2009 .
[72] Adam Rose,et al. Economic Impacts of Potential Foot and Mouth Disease Agroterrorism in the USA: A General Equilibrium Analysis , 2012 .
[73] Harry W. Richardson,et al. The State‐by‐State Economic Impacts of the 2002 Shutdown of the Los Angeles–Long Beach Ports , 2008 .
[74] G F Cooper,et al. A New Prior for Bayesian Anomaly Detection , 2009, Methods of Information in Medicine.
[75] H. J. Einhorn. Use of nonlinear, noncompensatory models as a function of task and amount of information , 1971 .
[76] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[77] Benjamin Van Roy,et al. On Constraint Sampling in the Linear Programming Approach to Approximate Dynamic Programming , 2004, Math. Oper. Res..
[78] Michel Bruneau,et al. A Framework to Quantitatively Assess and Enhance the Seismic Resilience of Communities , 2003 .
[79] Ashley Winston,et al. Textile and Apparel Barriers and Rules of Origin: What’s Left to Gain after the Agreement on Textiles and Clothing? , 2008 .
[80] D. Winterfeldt,et al. Comparing Hierarchical and Nonhierarchical Weighting Methods for Eliciting Multiattribute Value Models , 1987 .
[81] Jason C. Kinnell,et al. Expert and Layperson Perceptions of Ecosystem Risk , 2000, Risk analysis : an official publication of the Society for Risk Analysis.
[82] Manish Jain,et al. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.
[83] Jun Zhuang,et al. Balancing congestion and security in the presence of strategic applicants with private information , 2011, Eur. J. Oper. Res..
[84] R. Keeney,et al. Eliciting public values for complex policy decisions , 1990 .
[85] Henry H. Willis,et al. Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[86] George Horwich,et al. Economic Lessons of the Kobe Earthquake , 2000, Economic Development and Cultural Change.
[87] Bryan C. Price,et al. Targeting Top Terrorists: How Leadership Decapitation Contributes to Counterterrorism , 2012, International Security.
[88] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[89] Eric F. Taquechel,et al. Validation of rational deterrence theory : analysis of U.S. government and adversary risk propensity and relative emphasis on gain or loss , 2010 .
[90] David E. Bell,et al. Multiattribute Utility Functions: Decompositions Using Interpolation , 1979 .
[91] A. Tversky,et al. Contingent weighting in judgment and choice , 1988 .
[92] R. L. Keeney,et al. Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.
[93] Park JiYoung,et al. Identifying the Regional Economic Impacts of 9/11 , 2009 .
[94] W. Edwards,et al. Conservatism in a simple probability inference task. , 1966, Journal of experimental psychology.
[95] Charles ReVelle,et al. Concepts and applications of backup coverage , 1986 .
[96] J. M. Smith. The theory of games and the evolution of animal conflicts. , 1974, Journal of theoretical biology.
[97] P. Dixon,et al. The Us Economy from 1992 to 1998: Results from a Detailed CGE Model , 2004 .
[98] R. Nickerson. Confirmation Bias: A Ubiquitous Phenomenon in Many Guises , 1998 .
[99] Melissa L. Finucane,et al. Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[100] R. Howard. On Making Life and Death Decisions , 1980 .
[101] Louis Anthony Cox. Improving risk-based decision making for terrorism applications. , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[102] Ronald A. Howard,et al. Information Value Theory , 1966, IEEE Trans. Syst. Sci. Cybern..
[103] K. Hausken. Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[104] Gerald G. Brown,et al. A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..
[105] Sheldon Howard Jacobson,et al. Assessing the impact of deterrence on aviation checked baggage screening strategies , 2005 .
[106] William D. Nordhaus,et al. The Economics of Hurricanes in the United States , 2006 .
[107] Olivier Roy,et al. Intentions, Decisions and Rationality , 2008 .
[108] Vicki M. Bier,et al. Uncertainty about probability: a reconciliation with the subjectivist viewpoint , 1996, IEEE Trans. Syst. Man Cybern. Part A.
[109] Kevin J. Boyle,et al. The Benefit-Transfer Challenges , 2010 .
[110] Shirley Dex,et al. JR 旅客販売総合システム(マルス)における運用及び管理について , 1991 .
[111] Patrick Jaillet,et al. Location and Routing Models for Emergency Response Plans with Priorities , 2012, Future Security.
[112] T Bulger,et al. TRANSPORTATION EQUITY ACT FOR THE 21ST CENTURY (TEA 21) , 1998 .
[113] Steven E. Plaut. Misplaced Applications of Economic Theory to the Middle East , 2004 .
[114] Richard L. Church,et al. The Team/Fleet Models for Simultaneous Facility and Equipment Siting , 1979 .
[115] Vincent T. Covello,et al. Risk communication, the West Nile virus epidemic, and bioterrorism: responding to the commnication challenges posed by the intentional or unintentional release of a pathogen in an urban setting , 2001, Journal of Urban Health.
[116] Manfred K. Warmuth,et al. The Weighted Majority Algorithm , 1994, Inf. Comput..
[117] Carl S. Spetzler. Advances in Decision Analysis: Building Decision Competency in Organizations , 2007 .
[118] Peter B. Dixon,et al. Effects on the U.S. of an H1N1 Epidemic: Analysis with a Quarterly CGE Model , 2010 .
[119] V. Crawford. Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions , 2003 .
[120] Harvey Waterman,et al. Reasons and Reason: Collective Political Activity in Comparative and Historical Perspective , 1981, World Politics.
[121] P. Dixon,et al. Validating a Detailed, Dynamic CGE Model of the USA , 2010 .
[122] Henry H. Willis,et al. The validity of the preference profiles used for evaluating impacts in the Dutch National Risk Assessment , 2012 .
[123] William J Bicknell,et al. The case for voluntary smallpox vaccination. , 2002, The New England journal of medicine.
[124] Michael K. Lindell,et al. ASSESSING COMMUNITY IMPACTS OF NATURAL DISASTERS , 2003 .
[125] S. Kaplan,et al. On The Quantitative Definition of Risk , 1981 .
[126] Ali E. Abbas. Invariant multiattribute utility functions , 2010 .
[127] Stuart Shapiro,et al. The Benefit-Cost Analysis of Security Focused Regulations , 2009 .
[128] Chen Wang,et al. Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility , 2011, Decis. Anal..
[129] Adam Rose,et al. Business Interruption Impacts of a Terrorist Attack on the Electric Power System of Los Angeles: Customer Resilience to a Total Blackout , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[130] Donald E. Geis,et al. By Design: The Disaster Resistant and Quality-of-Life Community , 2000 .
[131] Jr. Louis Anthony Cox,et al. Game Theory and Risk Analysis , 2009 .
[132] Robert T. Clemen,et al. Subjective Probability Assessment in Decision Analysis: Partition Dependence and Bias Toward the Ignorance Prior , 2005, Manag. Sci..
[133] Gernot D. Kleiter,et al. Propagating Imprecise Probabilities in Bayesian Networks , 1996, Artif. Intell..
[134] Rong Yang,et al. Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..
[135] Arkadi Nemirovski,et al. Robust optimization – methodology and applications , 2002, Math. Program..
[136] Jun Zhuang,et al. Robustness of Optimal Defensive Resource Allocations in the Face of Less Fully Rational Attacker , 2009 .
[137] Nevin Lianwen Zhang,et al. Probabilistic Inference in Influence Diagrams , 1998, Comput. Intell..
[138] Howard Kunreuther,et al. Is imprecise knowledge better than conflicting expertise? Evidence from insurers’ decisions in the United States , 2010 .
[139] Max Abrahms,et al. What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy , 2008, International Security.
[140] Lawrence J. Axelrod,et al. Characterizing perception of ecological risk. , 1995, Risk analysis : an official publication of the Society for Risk Analysis.
[141] Patrick D. Larkey,et al. Subjective Probability and the Theory of Games , 1982 .
[142] John A. Sokolowski,et al. Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[143] M. Naceur Azaiez,et al. Game Theoretic Risk Analysis of Security Threats , 2009 .
[144] C. Revelle,et al. A Lagrangean heuristic for the maximal covering location problem , 1996 .
[145] Seth D. Guikema,et al. Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .
[146] Peter Gordon,et al. The Economic Impacts of a Terrorist Attack on the U.S. Commercial Aviation System , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[147] S. Carpenter,et al. Social-Ecological Resilience to Coastal Disasters , 2005, Science.
[148] Scott Farrow,et al. THE ECONOMICS OF HOMELAND SECURITY EXPENDITURES: FOUNDATIONAL EXPECTED COST‐EFFECTIVENESS APPROACHES , 2007 .
[149] Siambabala Bernard Manyena,et al. The concept of resilience revisited. , 2006, Disasters.
[150] Peter C. Fishburn,et al. von Neumann-Morgenstera Utility Functions on Two Attributes , 1974, Oper. Res..
[151] Baruch Fischhoff,et al. Aggregate, Disaggregate, and Hybrid Analyses of Ecological Risk Perceptions , 2005, Risk analysis : an official publication of the Society for Risk Analysis.
[152] Alain Chateauneuf,et al. Choice under uncertainty with the best and worst in mind: Neo-additive capacities , 2007, J. Econ. Theory.
[153] Stephanie E. Chang,et al. Measuring Improvements in the Disaster Resilience of Communities , 2004 .
[154] Dusan M. Stipanovic,et al. Formation Control and Collision Avoidance for Multi-agent Non-holonomic Systems: Theory and Experiments , 2008, Int. J. Robotics Res..
[155] Steve Alpern,et al. Patrolling Games , 2011, Oper. Res..
[156] Ralph L Keeney,et al. Modeling Values for Anti‐Terrorism Analysis , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[157] W. L. Shirley,et al. Social Vulnerability to Environmental Hazards , 2003 .
[158] Raymond J. Kopp,et al. Social Cost of Environmental Quality Regulations: A General Equilibrium Analysis , 1990, Journal of Political Economy.
[159] Henry H. Willis,et al. Prioritizing Environmental Health Risks in the UAE , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[160] S. Hora. Advances in Decision Analysis: Eliciting Probabilities from Experts , 2007 .
[161] J. Victoroff. The Mind of the Terrorist , 2005 .
[162] Vicki M. Bier,et al. An Application of Copulas to Accident Precursor Analysis , 1998 .
[163] Chang-Tien Lu,et al. Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
[164] Louis Anthony Cox,et al. What's Wrong with Risk Matrices? , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[165] P. Jean-Jacques Herings,et al. Fuzzy play, matching devices and coordination failures , 2001, Int. J. Game Theory.
[166] Erin Miller. Patterns of Onset and Decline Among Terrorist Organizations , 2012 .
[167] Jonathan Shalev,et al. Loss aversion equilibrium , 2000, Int. J. Game Theory.
[168] Moshe Kress,et al. Operational effectiveness of suicide-bomber-detector schemes: a best-case analysis. , 2005, Proceedings of the National Academy of Sciences of the United States of America.
[169] J. Handmer,et al. Uncertainty, sustainability and change☆ , 1992 .
[170] Richard S. John,et al. Assessment of Cost Uncertainties for Large Technology Projects: A Methodology and an Application , 2002, Interfaces.
[171] A. Nizam,et al. Containing Bioterrorist Smallpox , 2002, Science.
[172] Milind Tambe,et al. Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties , 2009, AAMAS 2009.
[173] C. Allin Cornell,et al. Seismic Risk Analysis of Boston , 1975 .
[174] Jeffrey D. Berejikian. A Cognitive Theory of Deterrence , 2002 .
[175] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[176] Louis Anthony Cox,et al. Making Terrorism Risk Analysis Less Harmful and More Useful: Another Try , 2011 .
[177] Paul Scerri,et al. Transitioning multiagent technology to UAV applications , 2008, AAMAS.
[178] Ali E. Abbas,et al. Attribute Dominance Utility , 2005, Decis. Anal..
[179] Adam Rose,et al. Journal of Homeland Security and Emergency Management A Framework for Analyzing the Total Economic Impacts of Terrorist Attacks and Natural Disasters , 2011 .
[180] Robin L Dillon,et al. Why Near‐Miss Events Can Decrease an Individual's Protective Response to Hurricanes , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[181] Paul Gill,et al. Comparing Role-Specific Terrorist Profiles , 2011 .
[182] Robert F. Bordley,et al. Effective utility functions induced by organizational target‐based incentives , 2009 .
[183] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[184] Heidi J. Albers,et al. Spatial modeling of extraction and enforcement in developing country protected areas , 2010 .
[185] Werling Jeffrey,et al. Macroeconomic and Industry Impacts of 9/11: An Interindustry Macroeconomic Approach , 2009 .
[186] Adam Rose,et al. Income distribution impacts of climate change mitigation policy in the Susquehanna River Basin Economy , 2007 .
[187] Anthony S Fauci,et al. Smallpox vaccination policy--the need for dialogue. , 2002, The New England journal of medicine.
[188] Jianhua Xu,et al. Evaluating an analytic–deliberative risk‐ranking process in a Chinese context , 2011 .
[189] Alvin E. Roth,et al. P value and the usefulness of game theoretic models , 2002 .
[190] Sarit Kraus,et al. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..
[191] Mark Phelps. DO SAMS POSE A REAL THREAT TO CIVIL AVIATION , 2003 .
[192] Mathew D. McCubbins,et al. The Theory of Minds Within the Theory of Games , 2012 .
[193] Richard O. Zerbe,et al. Benefit-cost analysis , 2008 .
[194] Santosh S. Vempala,et al. Simulated Annealing for Convex Optimization , 2004 .
[195] F. Norris,et al. 60,000 Disaster Victims Speak: Part II. Summary and Implications of the Disaster Mental Health Research , 2002, Psychiatry.
[196] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[197] J. C. Taylor,et al. The U.S.-Canada Border: Cost Impacts, Causes, and Short to Long Term Management Options , 2003 .
[198] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[199] Luis E. Ortiz,et al. Algorithms for Interdependent Security Games , 2003, NIPS.
[200] L. J. Savage,et al. The Foundations of Statistics , 1955 .
[201] R. Farrow,et al. A missing error term in benefit-cost analysis. , 2012, Environmental science & technology.
[202] J. Corsi,et al. Terrorism as a Desperate Game , 1981 .
[203] Maria E. Mayorga,et al. The minimum p-envy location problem: a new model for equitable distribution of emergency resources , 2011 .
[204] M. Naceur Azaiez,et al. Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks , 2009 .
[205] Peter B. Dixon,et al. THE ECONOMIC COSTS TO THE U.S. OF CLOSING ITS BORDERS: A COMPUTABLE GENERAL EQUILIBRIUM ANALYSIS , 2011 .
[206] Roger Frost,et al. International Organization for Standardization (ISO) , 2004 .
[207] Robin L. Dillon,et al. How Near-Misses Influence Decision Making Under Risk: A Missed Opportunity for Learning , 2008, Manag. Sci..
[208] Ali E. Abbas,et al. Multiattribute Utility Copulas , 2009, Oper. Res..
[209] Herbert Hamers,et al. Operations research games: A survey , 2001 .
[210] Yacov Y Haimes,et al. On the Definition of Vulnerabilities in Measuring Risks to Infrastructures , 2006, Risk analysis : an official publication of the Society for Risk Analysis.
[211] Garrett R. Asay,et al. The Economic Impacts of the September 11 Terrorist Attacks: A Computable General Equilibrium Analysis , 2009 .
[212] Howard Kunreuther,et al. Modeling Interdependent Risks , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[213] Maged M. Dessouky,et al. Solution approaches for facility location of medical supplies for large-scale emergencies , 2007, Comput. Ind. Eng..
[214] Robert G. Sargent,et al. Verification and validation of simulation models , 2013, Proceedings of the Winter Simulation Conference, 2005..
[215] K. Boyer,et al. American Trucking, NAFTA, and the Cost of Distance , 1997 .
[216] D. Earn,et al. Group interest versus self-interest in smallpox vaccination policy , 2003, Proceedings of the National Academy of Sciences of the United States of America.
[217] Craig R. Fox,et al. Partition Priming in Judgment Under Uncertainty , 2003, Psychological science.
[218] P. Walkenhorst,et al. Quantitative Assessment of the Benefits of Trade Facilitation , 2004 .
[219] Bernard Harris. Mathematical methods in combatting terrorism. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[220] Richard Scheines,et al. Constructing Bayesian Network Models of Gene Expression Networks from Microarray Data , 2000 .
[221] K. Arrow,et al. Capital-labor substitution and economic efficiency , 1961 .
[222] Detlof von Winterfeldt,et al. Managing potential health risks from electric powerlines: a decision analysis caught in controversy. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[223] Robert Powell,et al. Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.
[224] Donald A Henderson,et al. Contact vaccinia--transmission of vaccinia from smallpox vaccination. , 2002, JAMA.
[225] Gregory M. Paoli,et al. Modeling the public health system response to a terrorist event in the food supply. , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[226] Peter B. Dixon,et al. The Economy-Wide Effects in the United States of Replacing Crude Petroleum with Biomass , 2007 .
[227] Thomas R. Palfrey,et al. Heterogeneous quantal response equilibrium and cognitive hierarchies , 2006, J. Econ. Theory.
[228] W. McEneaney,et al. Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind , 2006 .
[229] Seokjin Kim,et al. Facility location for large-scale emergencies , 2010, Ann. Oper. Res..
[230] B. Fischhoff,et al. How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits , 1978 .
[231] Santosh S. Vempala,et al. Solving convex programs by random walks , 2004, JACM.
[232] Harvey E. Lapan,et al. Terrorism and signalling , 1993 .
[233] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[234] Ortwin Renn,et al. The Social Amplification of Risk: A Conceptual Framework , 1988 .
[235] R. Lazarick. Airport vulnerability assessment-a methodology evaluation , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[236] Martin Johnson,et al. Economy-Wide Effects of Reducing Illegal Immigrants in U.S. Employment , 2011 .
[237] Daphne Koller,et al. Multi-Agent Influence Diagrams for Representing and Solving Games , 2001, IJCAI.
[238] David Hummels,et al. Time as a Trade Barrier , 2002, GTAP Working Paper.
[239] D. Winterfeldt,et al. Cognitive Components of Risk Ratings , 1981 .
[240] Robin L. Dillon,et al. How Near-Miss Events Amplify or Attenuate Risky Decision Making , 2012, Manag. Sci..
[241] Matthew G. Bunn,et al. A Mathematical Model of the Risk of Nuclear Terrorism , 2006 .
[242] Todd Sandler,et al. The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.
[243] Richard Gonzalez,et al. Curvature of the Probability Weighting Function , 1996 .
[244] A. Haurie,et al. Sequential Stackelberg equilibria in two-person games , 1985 .
[245] Adam Rose,et al. Regional Economic Impacts of a Verdugo Scenario Earthquake Disruption of Los Angeles Water Supplies: A Computable General Equilibrium Analysis , 2011 .
[246] Jayavel Sounderpandian,et al. Ex Ante Equity in Public Risk , 1989, Oper. Res..
[247] David Lindley,et al. Plural analysis: Multiple approaches to quantitative research , 1986 .
[248] Ralph L. Keeney,et al. Generating Objectives: Can Decision Makers Articulate What They Want? , 2008, Manag. Sci..
[249] A. Rose. DEFINING AND MEASURING ECONOMIC RESILIENCE TO DISASTERS , 2004 .
[250] C. Folke. RESILIENCE: THE EMERGENCE OF A PERSPECTIVE FOR SOCIAL-ECOLOGICAL SYSTEMS ANALYSES , 2006 .
[251] David L. Craft,et al. Emergency response to a smallpox attack: The case for mass vaccination , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[252] Tito Homem-de-Mello,et al. Risk-adjusted budget allocation models with application in homeland security , 2011 .
[253] Rae Zimmerman,et al. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[254] Gerald G. Brown,et al. How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[255] A. Tversky,et al. Support theory: A nonextensional representation of subjective probability. , 1994 .
[256] Susan E. Martonosi,et al. Evaluating the Viability of 100 Per Cent Container Inspection at America's Ports , 2005 .
[257] Baruch Awerbuch,et al. Online linear optimization and adaptive routing , 2008, J. Comput. Syst. Sci..
[258] K. Arrow,et al. Uncertainty and the Evaluation of Public Investment Decisions , 2014 .
[259] Jörgen W. Weibull,et al. Testing Game Theory , 2004 .
[260] L. Goulder,et al. The Substantial Bias from Ignoring General Equilibrium Effects in Estimating Excess Burden, and a Practical Solution , 2003, Journal of Political Economy.
[261] Reinhard Selten,et al. Evolutionary stability in extensive two-person games - correction and further development , 1988 .
[262] H. Florig,et al. A Deliberative Method for Ranking Risks (II): Evaluation of Validity and Agreement among Risk Managers , 2001, Risk analysis : an official publication of the Society for Risk Analysis.
[263] Lawrence V. Snyder,et al. Facility location under uncertainty: a review , 2006 .
[264] S. Cutter,et al. Journal of Homeland Security and Emergency Management Disaster Resilience Indicators for Benchmarking Baseline Conditions , 2011 .
[265] J. Breckenridge,et al. The Strategy of Terrorism and the Psychology of Mass-Mediated Fear , 2006 .
[266] Garrick L. Wallstrom,et al. Measuring the effect of commuting on the performance of the Bayesian Aerosol Release Detector , 2009, BMC Medical Informatics Decis. Mak..
[267] Henry H. Willis,et al. Ecological Risk Ranking: Development and Evaluation of a Method for Improving Public Participation in Environmental Decision Making , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[268] Roberto Szechtman,et al. Why Defeating Insurgencies Is Hard: The Effect of Intelligence in Counterinsurgency Operations - A Best-Case Scenario , 2009, Oper. Res..
[269] Peter C. Fishburn,et al. Equity Axioms for Public Risks , 1984, Oper. Res..
[270] W. Adger. Social and ecological resilience: are they related? , 2000 .
[271] Peter Auer,et al. The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..
[272] Marco Zaffalon,et al. Bayesian Networks with Imprecise Probabilities: Theory and Application to Classification , 2012 .
[273] Niyazi Onur Bakir,et al. Is Better Nuclear Weapon Detection Capability Justified? , 2011 .
[274] M. Morgan,et al. Categorizing Risks for Risk Ranking , 2000, Risk analysis : an official publication of the Society for Risk Analysis.
[275] Bilal M Ayyub,et al. Risk analysis for critical asset protection. , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[276] Lawrence D. Phillips,et al. Advances in Decision Analysis: Decision Conferencing , 2007 .
[277] Adam Rose,et al. Economic Impacts of Potential Foot and Mouth Disease Agro-terrorism in the United States: A Computable General Equilibrium Analysis , 2013 .
[278] V. Rich. Personal communication , 1989, Nature.
[279] Martin W. P. Savelsbergh,et al. Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..
[280] J. Davenport. Editor , 1960 .
[281] David Lindley. Scoring rules and the inevitability of probability , 1982 .
[282] F. Scholz. Maximum Likelihood Estimation , 2006 .
[283] Peter B. Dixon,et al. Economywide Implications from US Bioenergy Expansion , 2010 .
[284] R. Selten,et al. A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .
[285] L. Robin Keller,et al. Fair Processes for Societal Decisions Involving Distributional Inequalities , 1995 .
[286] Rae Zimmerman,et al. Analysis of Electrical Power and Oil and Gas Pipeline Failures , 2007, Critical Infrastructure Protection.
[287] Ali E. Abbas,et al. Normative decision making with multiattribute performance targets , 2009 .
[288] Louise K. Comfort,et al. Risk and Resilience: Inter‐organizational Learning Following the Northridge Earthquake of 17 January 1994 , 1994 .
[289] Heather Rosoff,et al. The Dynamics of Evolving Beliefs, Concerns Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative Archival Samples , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[290] W. Leontief. Quantitative Input and Output Relations in the Economic Systems of the United States , 1936 .
[291] Peter B. Dixon,et al. Immigration Policy and its Possible Effects on U.S. Agriculture and the Market for Hired Farm Labor: A Simulation Analysis , 2012 .
[292] Roberto Szechtman,et al. Confronting Entrenched Insurgents , 2010, Oper. Res..
[293] H. J. Einhorn. The use of nonlinear, noncompensatory models in decision making. , 1970, Psychological bulletin.
[294] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[295] Daniel Kahneman,et al. Availability: A heuristic for judging frequency and probability , 1973 .
[296] Maged Dessouky,et al. A modeling framework for facility location of medical services for large-scale emergencies , 2007 .
[297] Maged Dessouky,et al. The Stochastic Vehicle Routing Problem for Minimum Unmet Demand , 2009 .
[298] Karl-Dieter Opp,et al. Rational Choice and Rebellious Collective Action , 1986, American Political Science Review.
[299] Simon M. Lucas,et al. A Survey of Monte Carlo Tree Search Methods , 2012, IEEE Transactions on Computational Intelligence and AI in Games.
[300] Larry Reznick,et al. Setting priorities , 1994 .
[301] Jie Zhang,et al. TOWARDS A NEW FRAMEWORK FOR ACCOUNTING AND MODELLING THE REGIONAL AND LOCAL IMPACTS OF TOURISM , 2010 .
[302] Adam Rose,et al. Modeling a major source of economic resilience to disasters: recapturing lost production , 2011 .
[303] Andrea L. Bertozzi,et al. c ○ World Scientific Publishing Company A STATISTICAL MODEL OF CRIMINAL BEHAVIOR , 2008 .
[304] James H. Lambert,et al. Risks of Cyber Attack to Water Utility Supervisory Control and Data Acquisition Systems , 2001 .
[305] V. Bier,et al. Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[306] Lauri Ojala,et al. Trade Logistics in the Global Economy: The Logistics Performance Index and Its Indicators , 2016 .
[307] Seth D. Guikema,et al. Robust Adversarial Risk Analysis: A Level-k Approach , 2012, Decis. Anal..
[308] Raymond J. Burby,et al. Creating Hazard Resilient Communities through Land-Use Planning , 2000 .
[309] Mark S. Daskin,et al. Stochastic p-robust location problems , 2006 .
[310] David R. Anderson,et al. Model selection and multimodel inference : a practical information-theoretic approach , 2003 .
[311] Kjell Hausken,et al. Defending against multiple different attackers , 2011, Eur. J. Oper. Res..
[312] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[313] A. Abbas. General decompositions of multiattribute utility functions with partial utility independence , 2010 .
[314] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[315] Monica Costa Dias,et al. Alternative approaches to evaluation in empirical microeconomics , 2002, The Journal of Human Resources.
[316] Alexandre M. Bayen,et al. A time-dependent Hamilton-Jacobi formulation of reachable sets for continuous dynamic games , 2005, IEEE Transactions on Automatic Control.
[317] Ralph L. Keeney,et al. Advances in Decision Analysis: Developing Objectives and Attributes , 2007 .
[318] Robert J. Nicholls,et al. Resilience to natural hazards: How useful is this concept? , 2003 .
[319] D. Kahneman. A perspective on judgment and choice: mapping bounded rationality. , 2003, The American psychologist.
[320] A. Tversky,et al. Subjective Probability: A Judgment of Representativeness , 1972 .
[321] W. Kip Viscusi. The risks of terrorism , 2003 .
[322] Peter C. Fishburn,et al. Approximations of Two-Attribute Utility Functions , 1977, Math. Oper. Res..
[323] Sarit Kraus,et al. Bayesian stackelberg games and their application for security at Los Angeles international airport , 2008, SECO.
[324] Scott Farrow,et al. Towards Principles and Standards for the Benefit-Cost Analysis of Safety , 2011 .
[325] Ulrich Schmidt,et al. Additive Utility in Prospect Theory , 2009, Manag. Sci..
[326] Naira Hovakimyan,et al. Guaranteed Strategies for nonlinear Multi-Player Pursuit-Evasion Games , 2010, IGTR.
[327] Scott Ferson,et al. Varying correlation coefficients can underestimate uncertainty in probabilistic models , 2006, Reliab. Eng. Syst. Saf..
[328] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[329] Jun Zhuang. Impacts of Subsidized Security on Stability and Total Social Costs of Equilibrium Solutions in an N-Player Game with Errors , 2010 .
[330] Ralph L. Keeney,et al. Using Values in Operations Research , 1994, Oper. Res..
[331] Ralph L. Keeney,et al. Estimating Fatalities Induced by the Economic Costs of Regulations , 1997 .
[332] Klaus Ritzberger. On games under expected utility with rank dependent probabilities , 1996 .
[333] Douglas Paton,et al. Managing company risk and resilience through business continuity management , 2006 .
[334] John Rollins. Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy , 2010 .
[335] C. V. Anderson,et al. The Federal Emergency Management Agency (FEMA) , 2002 .
[336] Gregory Levitin,et al. Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts , 2009, IEEE Transactions on Reliability.
[337] Marizio Falcone,et al. Discrete time high-order schemes for viscosity solutions of Hamilton-Jacobi-Bellman equations , 1994 .
[338] Glyn Wittwer,et al. Economic Modeling of Water: The Australian CGE Experience , 2012 .
[339] J. March,et al. Learning from Samples of One or Fewer , 1991 .
[340] James H Lambert,et al. A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[341] Erwann O. Michel-Kerjan,et al. Terrorisme à grande échelle partage de risques et politiques publiques , 2003 .
[342] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[343] D. Winterfeldt. On the Relevance of Behavioral Decision Research for Decision Analysis , 1999 .
[344] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[345] Robert W. Hahn,et al. Risks, Costs and Lives Saved: GETTING BETTER RESULTS FROM REGULATION , 1996 .
[346] N. Abrahamson,et al. On the Use of Logic Trees for Ground-Motion Prediction Equations in Seismic-Hazard Analysis , 2005 .
[347] J. Harsanyi. Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .
[348] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[349] A. Rose. Economic Resilience to Disasters , 2009 .
[350] Edward H. Kaplan,et al. Terror Queues , 2010, Oper. Res..
[351] J. Dyer. Remarks on the analytic hierarchy process , 1990 .
[352] Andrew Schmitz,et al. Applied welfare economics , 2008 .
[353] G. Leitmann. On generalized Stackelberg strategies , 1978 .
[354] N. Megiddo,et al. The Maximum Coverage Location Problem , 1983 .
[355] Bintong Chen,et al. Minmax‐regret robust 1‐median location on a tree , 1998 .
[356] Kjell Hausken,et al. Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures , 2011, Ann. Oper. Res..
[357] C. Starmer. Developments in Non-expected Utility Theory: The Hunt for a Descriptive Theory of Choice under Risk , 2000 .
[358] Jun Zhuang,et al. Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker , 2013, Risk Analysis.
[359] Richard C. Larson,et al. Responding to Emergencies: Lessons Learned and the Need for Analysis , 2006, Interfaces.
[360] Christopher Butler. Prospect Theory and Coercive Bargaining , 2007 .
[361] Jun Zhuang,et al. Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[362] Robin L. Dillon-Merrill,et al. Logic Trees: Fault, Success, Attack, Event, Probability, and Decision Trees , 2009 .
[363] David R. Godschalk,et al. Urban Hazard Mitigation: Creating Resilient Cities , 2003 .
[364] James Yetman,et al. SUICIDAL TERRORISM AND DISCRIMINATORY SCREENING: AN EFFICIENCY‐EQUITY TRADE‐OFF , 2004 .
[365] C. Everett Koop. "Prepared Statement Presented before the House Subcommittee on Health and the Environment of the House Committee on Energy and Commerce, Washington, DC" [Reminiscence] , 2003 .
[366] Kenneth O. Kortanek,et al. A Central Cutting Plane Algorithm for Convex Semi-Infinite Programming Problems , 1993, SIAM J. Optim..
[367] A. Tversky,et al. Advances in prospect theory: Cumulative representation of uncertainty , 1992 .
[368] Hirokazu Tatano,et al. Estimation of Lifeline Resilience Factors Based on Surveys of Japanese Industries , 2009 .
[369] G. Woo. Quantitative Terrorism Risk Assessment , 2002 .
[370] George H Baker. A Vulnerability Assessment Methodology for Critical Infrastructure Sites , 2005 .
[371] Bo An,et al. GUARDS and PROTECT: next generation applications of security games , 2011, SECO.
[372] Harry W. Richardson,et al. A two-step approach to estimating state-to-state commodity trade flows , 2008 .
[373] Peter H. Farquhar,et al. A Fractional Hypercube Decomposition Theorem for Multiattribute Utility Functions , 1975, Oper. Res..
[374] Peter B. Dixon,et al. Dynamic general equilibrium modelling for forecasting and policy : a practical guide and documentation of MONASH , 2002 .
[375] Vicki M. Bier,et al. A study of expert overconfidence , 2008, Reliab. Eng. Syst. Saf..
[376] Gregory S Parnell,et al. Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[377] Jason R. W. Merrick,et al. A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[378] Richard Gonzalez,et al. On the Shape of the Probability Weighting Function , 1999, Cognitive Psychology.
[379] Louis Anthony Tony Cox,et al. Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks , 2008 .
[380] H. Simon,et al. Rational choice and the structure of the environment. , 1956, Psychological review.
[381] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[382] Lawrence M. Wein,et al. OR Forum - Homeland Security: From Mathematical Models to Policy Implementation: The 2008 Philip McCord Morse Lecture , 2009, Oper. Res..
[383] Maged M. Dessouky,et al. Perishable inventory management system with a minimum volume constraint , 2011, J. Oper. Res. Soc..
[384] T. Saaty. How to Make a Decision: The Analytic Hierarchy Process , 1990 .
[385] J. Eto,et al. Understanding the cost of power interruptions to U.S. electricity consumers , 2004 .
[386] A. Rose. Economic resilience to natural and man-made disasters: Multidisciplinary origins and contextual dimensions , 2007 .
[387] A. Tversky. Elimination by aspects: A theory of choice. , 1972 .
[388] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[389] Claire J. Tomlin,et al. Monotone Approximations of Minimum and Maximum Functions and Multi-objective Problems , 2012 .
[390] F. Norris,et al. Community Resilience as a Metaphor, Theory, Set of Capacities, and Strategy for Disaster Readiness , 2008, American journal of community psychology.
[391] Richard J. Zeckhauser,et al. Critical ratios and efficient allocation , 1973 .
[392] Peter B. Dixon,et al. Macro, industry and state effects in the U.S. of removing major tariffs and quotas , 2004 .
[393] Detlof von Winterfeldt,et al. Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists? , 2006, Decis. Anal..
[394] Michael P. Wellman,et al. Selecting strategies using empirical game models: an experimental analysis of meta-strategies , 2008, AAMAS.
[395] D von Winterfeldt,et al. A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[396] Nicholas R. Jennings,et al. Computational-Mechanism Design: A Call to Arms , 2003, IEEE Intell. Syst..
[397] Adrian E. Raftery,et al. Bayesian model averaging: a tutorial (with comments by M. Clyde, David Draper and E. I. George, and a rejoinder by the authors , 1999 .
[398] Ralph L Keeney,et al. A Value Model for Evaluating Homeland Security Decisions , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[399] Vladimir Marianov,et al. The Queueing Maximal availability location problem: A model for the siting of emergency vehicles , 1996 .
[400] Ali E. Abbas,et al. Utility transversality: a value-based approach , 2005 .
[401] G. Apostolakis. The concept of probability in safety assessments of technological systems. , 1990, Science.
[402] J. Harsanyi. Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .
[403] George A. Hazelrigg,et al. Bayesian Inference for the Demand of Engineering Products , 2012 .
[404] L. Robin Keller,et al. Equity in Social Risk: Some Empirical Observations , 1988 .
[405] Anthony Michael Barrett,et al. Should cities invest in sheltering-in-place measures against chlorine truck attacks by terrorists? , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[406] Vicki M. Bier,et al. Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .
[407] J M Bland,et al. Weighted comparison of means , 1998, BMJ.
[408] Joost R. Santos,et al. Modeling the Demand Reduction Input‐Output (I‐O) Inoperability Due to Terrorism of Interconnected Infrastructures * , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[409] H. Simon,et al. A Behavioral Model of Rational Choice , 1955 .
[410] Shi-Woei Lin,et al. Should the Model for Risk‐Informed Regulation be Game Theory Rather than Decision Theory? , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[411] R. Wilcox. Applying Contemporary Statistical Techniques , 2003 .
[412] Ralph L. Keeney,et al. Improving the Generation of Decision Objectives , 2010, Decis. Anal..
[413] Gordon H. McCormick. Terrorist Decision Making , 2003 .
[414] E. Brunswik,et al. The Conceptual Framework of Psychology , 1954 .
[415] Marinos E. Tsigas,et al. Impacts of Better Trade Facilitation in Developing Countries: Analysis with a New GTAP Database for the Value of Time in Trade , 2008 .
[416] H. Edward Price,et al. The Strategy and Tactics of Revolutionary Terrorism , 1977, Comparative Studies in Society and History.