Security and Game Theory: Evaluating Deployed Decision-Support Systems for Security: Challenges, Analysis, and Approaches

This chapter discusses the difficult problem of evaluating deployed security-focused decision support systems. In a security setting, one can never expect the adversary to cooperate in evaluation, which disallows many kinds of controlled studies. Furthermore, data is typically sparse — there are thankfully relatively few terrorist attacks on major infrastructure in the U.S. Still, evaluating security measures is critical in ensuring efficient allocation of security resources. We discuss a variety of approaches for evaluating such systems, using the deployed ARMOR and IRIS systems as exemplars. Taken as a whole, the evidence supports the effectiveness of these systems, but there are clearly opportunities to improve our methods for assessing the value proposition of all types of security systems.

[1]  K. R. Hammond Probabilistic functioning and the clinical method. , 1955, Psychological review.

[2]  John R. Madden,et al.  The impact of the 2002–2003 drought on Australia , 2005 .

[3]  Vincent Conitzer,et al.  Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.

[4]  D. von Winterfeldt,et al.  Identifying and Structuring the Objectives of Terrorists , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[5]  M. Elisabeth Paté-Cornell Warning Systems and Risk Reduction , 1985 .

[6]  Marshall A. Wise,et al.  International Equity and Differentiation in Global Warming Policy , 1998 .

[7]  P. Fishburn,et al.  Dispersive equity and social risk , 1991 .

[8]  Louis Anthony (Tony) Cox,et al.  Some Limitations of Qualitative Risk Rating Systems , 2005, Risk analysis : an official publication of the Society for Risk Analysis.

[9]  Kelly E. See,et al.  Between ignorance and truth: Partition dependence and learning in judgment under uncertainty. , 2006, Journal of experimental psychology. Learning, memory, and cognition.

[10]  P Slovic,et al.  Assessment of the Regional Economic Impacts of Catastrophic Events: CGE Analysis of Resource Loss and Behavioral Effects of an RDD Attack Scenario , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[11]  Dimitris Bertsimas,et al.  Robust game theory , 2006, Math. Program..

[12]  P. Slovic Perception of risk. , 1987, Science.

[13]  Leonard J. Savage,et al.  The Theory of Statistical Decision , 1951 .

[14]  Ali E. Abbas,et al.  One-Switch Conditions for Multiattribute Utility Functions , 2012, Oper. Res..

[15]  Jeffrey D. Berejikian Model Building With Prospect Theory: A Cognitive Approach to International Relations , 2002 .

[16]  Robert Powell Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..

[17]  A. Rose,et al.  Modeling Regional Economic Resilience to Disasters: A Computable General Equilibrium Analysis of Water Service Disruptions , 2005 .

[18]  S. Galea,et al.  Measuring Capacities for Community Resilience , 2010 .

[19]  R. Duncan Luce,et al.  Individual Choice Behavior , 1959 .

[20]  Kiseop Lee,et al.  T-Statistics for Weighted Means in Credit Risk Modelling , 2005 .

[21]  Zheng Cao,et al.  Optimal Stopping Analysis of a Radiation Detection System to Protect Cities from a Nuclear Terrorist Attack , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[22]  Lawrence M Wein,et al.  Analyzing Evacuation Versus Shelter‐in‐Place Strategies After a Terrorist Nuclear Detonation , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[23]  A. Colman Cooperation, psychological game theory, and limitations of rationality in social interaction , 2003, Behavioral and Brain Sciences.

[24]  János Aczél,et al.  The Role of Some Functional Equations in Decision Analysis , 2010, Decis. Anal..

[25]  A. Rose Input-output economics and computable general equilibrium models , 1995 .

[26]  Richard Mesic,et al.  Implementing Security Improvement Options at Los Angeles International Airport , 2006 .

[27]  Ward Edwards,et al.  Conservatism in Complex Probabilistic Inference , 1966 .

[28]  M. Douglas,et al.  Terrorism: A Positive Feedback Game , 2003 .

[29]  Winston Harrington,et al.  On the Accuracy of Regulatory Cost Estimates , 2000 .

[30]  Laurent El Ghaoui,et al.  Robust Control of Markov Decision Processes with Uncertain Transition Matrices , 2005, Oper. Res..

[31]  S. Brock Blomberg,et al.  Total Economic Consequences of Terrorist Attacks: Insights from 9/11 , 2010 .

[32]  Detlof von Winterfeldt,et al.  Meeting the Challenges of Terrorism Risk Analysis , 2007 .

[33]  Roberto Szechtman,et al.  Scheduling policies for an antiterrorist surveillance system , 2009 .

[34]  B Fischhoff,et al.  A Deliberative Method for Ranking Risks (I): Overview and Test Bed Development , 2001, Risk analysis : an official publication of the Society for Risk Analysis.

[35]  J. Shoven,et al.  Applied General Equilibrium Models of Taxation and International Trade , 1983 .

[36]  Gary H. McClelland,et al.  The Effect of Risk Beliefs on Property Values: A Case Study of a Hazardous Waste Site1 , 1990 .

[37]  Peter J. Lambert,et al.  Inequality Decomposition Analysis and the Gini Coefficient Revisited , 1993 .

[38]  Richard E. Wilson,et al.  COMBATING TERRORISM: AN EVENT TREE APPROACH , 2003 .

[39]  A. Raftery,et al.  Discussion: Performance of Bayesian Model Averaging , 2003 .

[40]  Harvey E. Lapan,et al.  To Bargain or Not to Bargain: That is the Question , 1988 .

[41]  Hamid Mohtadi,et al.  The risk of catastrophic terrorism: an extreme value approach , 2009 .

[42]  C. Starr Social benefit versus technological risk. , 1969, Science.

[43]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[44]  J. Quiggin A theory of anticipated utility , 1982 .

[45]  M. Wardman Review and meta-analysis of U.K. time elasticities of travel demand , 2012 .

[46]  D. McFadden Quantal Choice Analysis: A Survey , 1976 .

[47]  Horst Zank,et al.  Cumulative Prospect Theory for Parametric and Multiattribute Utilities , 2001, Math. Oper. Res..

[48]  Randy A. Freeman,et al.  Robust Nonlinear Control Design , 1996 .

[49]  Jun Zhuang,et al.  Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[50]  T. Sandler,et al.  A Theoretical Analysis of Transnational Terrorism , 1983, American Political Science Review.

[51]  James A Giesecke,et al.  Development of a Large-scale Single US Region CGE Model using IMPLAN Data: A Los Angeles County Example with a Productivity Shock Application , 2011 .

[52]  Peter B. Dixon,et al.  You can't have a CGE recession without excess capacity , 2011 .

[53]  John C. McDonald,et al.  Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..

[54]  D. Paton,et al.  Disasters and communities: vulnerability, resilience and preparedness , 2001 .

[55]  Ali E. Abbas,et al.  One-Switch Independence for Multiattribute Utility Functions , 2011, Oper. Res..

[56]  Gerald G. Brown,et al.  When Is Uncertainty About Uncertainty Worth Characterizing? , 2008, Interfaces.

[57]  JiYoung Park The Economic Impacts of Dirty Bomb Attacks on the Los Angeles and Long Beach Ports: Applying the Supply-Driven NIEMO (National Interstate Economic Model) , 2008 .

[58]  Dimitris Bertsimas,et al.  The Price of Fairness , 2011, Oper. Res..

[59]  Chen Wang,et al.  Impact of intelligence on target-hardening decisions , 2009, 2009 IEEE Conference on Technologies for Homeland Security.

[60]  H. Akaike A new look at the statistical model identification , 1974 .

[61]  Steve Leach,et al.  Transmission potential of smallpox in contemporary populations , 2001, Nature.

[62]  Ralph L. Keeney,et al.  Understanding Life-Threatening Risks , 1995 .

[63]  Ronald A. Howard,et al.  Decision analysis: practice and promise , 1988 .

[64]  C. S. Holling Resilience and Stability of Ecological Systems , 1973 .

[65]  Milind Tambe,et al.  Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.

[66]  H. Kunreuther,et al.  IDS Models of Airline Security , 2005 .

[67]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[68]  Adam Rose,et al.  INPUT-OUTPUT STRUCTURAL DECOMPOSITION ANALYSIS: A CRITICAL APPRAISAL , 1996 .

[69]  Michael D. White Port of Los Angeles , 2008 .

[70]  D. Kahneman,et al.  Timid choices and bold forecasts: a cognitive perspective on risk taking , 1993 .

[71]  W. RobertsBryan,et al.  The Macroeconomic Impacts of the 9/11 Attack: Evidence from Real-Time Forecasting , 2009 .

[72]  Adam Rose,et al.  Economic Impacts of Potential Foot and Mouth Disease Agroterrorism in the USA: A General Equilibrium Analysis , 2012 .

[73]  Harry W. Richardson,et al.  The State‐by‐State Economic Impacts of the 2002 Shutdown of the Los Angeles–Long Beach Ports , 2008 .

[74]  G F Cooper,et al.  A New Prior for Bayesian Anomaly Detection , 2009, Methods of Information in Medicine.

[75]  H. J. Einhorn Use of nonlinear, noncompensatory models as a function of task and amount of information , 1971 .

[76]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[77]  Benjamin Van Roy,et al.  On Constraint Sampling in the Linear Programming Approach to Approximate Dynamic Programming , 2004, Math. Oper. Res..

[78]  Michel Bruneau,et al.  A Framework to Quantitatively Assess and Enhance the Seismic Resilience of Communities , 2003 .

[79]  Ashley Winston,et al.  Textile and Apparel Barriers and Rules of Origin: What’s Left to Gain after the Agreement on Textiles and Clothing? , 2008 .

[80]  D. Winterfeldt,et al.  Comparing Hierarchical and Nonhierarchical Weighting Methods for Eliciting Multiattribute Value Models , 1987 .

[81]  Jason C. Kinnell,et al.  Expert and Layperson Perceptions of Ecosystem Risk , 2000, Risk analysis : an official publication of the Society for Risk Analysis.

[82]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[83]  Jun Zhuang,et al.  Balancing congestion and security in the presence of strategic applicants with private information , 2011, Eur. J. Oper. Res..

[84]  R. Keeney,et al.  Eliciting public values for complex policy decisions , 1990 .

[85]  Henry H. Willis,et al.  Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[86]  George Horwich,et al.  Economic Lessons of the Kobe Earthquake , 2000, Economic Development and Cultural Change.

[87]  Bryan C. Price,et al.  Targeting Top Terrorists: How Leadership Decapitation Contributes to Counterterrorism , 2012, International Security.

[88]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[89]  Eric F. Taquechel,et al.  Validation of rational deterrence theory : analysis of U.S. government and adversary risk propensity and relative emphasis on gain or loss , 2010 .

[90]  David E. Bell,et al.  Multiattribute Utility Functions: Decompositions Using Interpolation , 1979 .

[91]  A. Tversky,et al.  Contingent weighting in judgment and choice , 1988 .

[92]  R. L. Keeney,et al.  Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.

[93]  Park JiYoung,et al.  Identifying the Regional Economic Impacts of 9/11 , 2009 .

[94]  W. Edwards,et al.  Conservatism in a simple probability inference task. , 1966, Journal of experimental psychology.

[95]  Charles ReVelle,et al.  Concepts and applications of backup coverage , 1986 .

[96]  J. M. Smith The theory of games and the evolution of animal conflicts. , 1974, Journal of theoretical biology.

[97]  P. Dixon,et al.  The Us Economy from 1992 to 1998: Results from a Detailed CGE Model , 2004 .

[98]  R. Nickerson Confirmation Bias: A Ubiquitous Phenomenon in Many Guises , 1998 .

[99]  Melissa L. Finucane,et al.  Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[100]  R. Howard On Making Life and Death Decisions , 1980 .

[101]  Louis Anthony Cox Improving risk-based decision making for terrorism applications. , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[102]  Ronald A. Howard,et al.  Information Value Theory , 1966, IEEE Trans. Syst. Sci. Cybern..

[103]  K. Hausken Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[104]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[105]  Sheldon Howard Jacobson,et al.  Assessing the impact of deterrence on aviation checked baggage screening strategies , 2005 .

[106]  William D. Nordhaus,et al.  The Economics of Hurricanes in the United States , 2006 .

[107]  Olivier Roy,et al.  Intentions, Decisions and Rationality , 2008 .

[108]  Vicki M. Bier,et al.  Uncertainty about probability: a reconciliation with the subjectivist viewpoint , 1996, IEEE Trans. Syst. Man Cybern. Part A.

[109]  Kevin J. Boyle,et al.  The Benefit-Transfer Challenges , 2010 .

[110]  Shirley Dex,et al.  JR 旅客販売総合システム(マルス)における運用及び管理について , 1991 .

[111]  Patrick Jaillet,et al.  Location and Routing Models for Emergency Response Plans with Priorities , 2012, Future Security.

[112]  T Bulger,et al.  TRANSPORTATION EQUITY ACT FOR THE 21ST CENTURY (TEA 21) , 1998 .

[113]  Steven E. Plaut Misplaced Applications of Economic Theory to the Middle East , 2004 .

[114]  Richard L. Church,et al.  The Team/Fleet Models for Simultaneous Facility and Equipment Siting , 1979 .

[115]  Vincent T. Covello,et al.  Risk communication, the West Nile virus epidemic, and bioterrorism: responding to the commnication challenges posed by the intentional or unintentional release of a pathogen in an urban setting , 2001, Journal of Urban Health.

[116]  Manfred K. Warmuth,et al.  The Weighted Majority Algorithm , 1994, Inf. Comput..

[117]  Carl S. Spetzler Advances in Decision Analysis: Building Decision Competency in Organizations , 2007 .

[118]  Peter B. Dixon,et al.  Effects on the U.S. of an H1N1 Epidemic: Analysis with a Quarterly CGE Model , 2010 .

[119]  V. Crawford Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions , 2003 .

[120]  Harvey Waterman,et al.  Reasons and Reason: Collective Political Activity in Comparative and Historical Perspective , 1981, World Politics.

[121]  P. Dixon,et al.  Validating a Detailed, Dynamic CGE Model of the USA , 2010 .

[122]  Henry H. Willis,et al.  The validity of the preference profiles used for evaluating impacts in the Dutch National Risk Assessment , 2012 .

[123]  William J Bicknell,et al.  The case for voluntary smallpox vaccination. , 2002, The New England journal of medicine.

[124]  Michael K. Lindell,et al.  ASSESSING COMMUNITY IMPACTS OF NATURAL DISASTERS , 2003 .

[125]  S. Kaplan,et al.  On The Quantitative Definition of Risk , 1981 .

[126]  Ali E. Abbas Invariant multiattribute utility functions , 2010 .

[127]  Stuart Shapiro,et al.  The Benefit-Cost Analysis of Security Focused Regulations , 2009 .

[128]  Chen Wang,et al.  Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility , 2011, Decis. Anal..

[129]  Adam Rose,et al.  Business Interruption Impacts of a Terrorist Attack on the Electric Power System of Los Angeles: Customer Resilience to a Total Blackout , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[130]  Donald E. Geis,et al.  By Design: The Disaster Resistant and Quality-of-Life Community , 2000 .

[131]  Jr. Louis Anthony Cox,et al.  Game Theory and Risk Analysis , 2009 .

[132]  Robert T. Clemen,et al.  Subjective Probability Assessment in Decision Analysis: Partition Dependence and Bias Toward the Ignorance Prior , 2005, Manag. Sci..

[133]  Gernot D. Kleiter,et al.  Propagating Imprecise Probabilities in Bayesian Networks , 1996, Artif. Intell..

[134]  Rong Yang,et al.  Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..

[135]  Arkadi Nemirovski,et al.  Robust optimization – methodology and applications , 2002, Math. Program..

[136]  Jun Zhuang,et al.  Robustness of Optimal Defensive Resource Allocations in the Face of Less Fully Rational Attacker , 2009 .

[137]  Nevin Lianwen Zhang,et al.  Probabilistic Inference in Influence Diagrams , 1998, Comput. Intell..

[138]  Howard Kunreuther,et al.  Is imprecise knowledge better than conflicting expertise? Evidence from insurers’ decisions in the United States , 2010 .

[139]  Max Abrahms,et al.  What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy , 2008, International Security.

[140]  Lawrence J. Axelrod,et al.  Characterizing perception of ecological risk. , 1995, Risk analysis : an official publication of the Society for Risk Analysis.

[141]  Patrick D. Larkey,et al.  Subjective Probability and the Theory of Games , 1982 .

[142]  John A. Sokolowski,et al.  Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[143]  M. Naceur Azaiez,et al.  Game Theoretic Risk Analysis of Security Threats , 2009 .

[144]  C. Revelle,et al.  A Lagrangean heuristic for the maximal covering location problem , 1996 .

[145]  Seth D. Guikema,et al.  Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .

[146]  Peter Gordon,et al.  The Economic Impacts of a Terrorist Attack on the U.S. Commercial Aviation System , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[147]  S. Carpenter,et al.  Social-Ecological Resilience to Coastal Disasters , 2005, Science.

[148]  Scott Farrow,et al.  THE ECONOMICS OF HOMELAND SECURITY EXPENDITURES: FOUNDATIONAL EXPECTED COST‐EFFECTIVENESS APPROACHES , 2007 .

[149]  Siambabala Bernard Manyena,et al.  The concept of resilience revisited. , 2006, Disasters.

[150]  Peter C. Fishburn,et al.  von Neumann-Morgenstera Utility Functions on Two Attributes , 1974, Oper. Res..

[151]  Baruch Fischhoff,et al.  Aggregate, Disaggregate, and Hybrid Analyses of Ecological Risk Perceptions , 2005, Risk analysis : an official publication of the Society for Risk Analysis.

[152]  Alain Chateauneuf,et al.  Choice under uncertainty with the best and worst in mind: Neo-additive capacities , 2007, J. Econ. Theory.

[153]  Stephanie E. Chang,et al.  Measuring Improvements in the Disaster Resilience of Communities , 2004 .

[154]  Dusan M. Stipanovic,et al.  Formation Control and Collision Avoidance for Multi-agent Non-holonomic Systems: Theory and Experiments , 2008, Int. J. Robotics Res..

[155]  Steve Alpern,et al.  Patrolling Games , 2011, Oper. Res..

[156]  Ralph L Keeney,et al.  Modeling Values for Anti‐Terrorism Analysis , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[157]  W. L. Shirley,et al.  Social Vulnerability to Environmental Hazards , 2003 .

[158]  Raymond J. Kopp,et al.  Social Cost of Environmental Quality Regulations: A General Equilibrium Analysis , 1990, Journal of Political Economy.

[159]  Henry H. Willis,et al.  Prioritizing Environmental Health Risks in the UAE , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[160]  S. Hora Advances in Decision Analysis: Eliciting Probabilities from Experts , 2007 .

[161]  J. Victoroff The Mind of the Terrorist , 2005 .

[162]  Vicki M. Bier,et al.  An Application of Copulas to Accident Precursor Analysis , 1998 .

[163]  Chang-Tien Lu,et al.  Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[164]  Louis Anthony Cox,et al.  What's Wrong with Risk Matrices? , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[165]  P. Jean-Jacques Herings,et al.  Fuzzy play, matching devices and coordination failures , 2001, Int. J. Game Theory.

[166]  Erin Miller Patterns of Onset and Decline Among Terrorist Organizations , 2012 .

[167]  Jonathan Shalev,et al.  Loss aversion equilibrium , 2000, Int. J. Game Theory.

[168]  Moshe Kress,et al.  Operational effectiveness of suicide-bomber-detector schemes: a best-case analysis. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[169]  J. Handmer,et al.  Uncertainty, sustainability and change☆ , 1992 .

[170]  Richard S. John,et al.  Assessment of Cost Uncertainties for Large Technology Projects: A Methodology and an Application , 2002, Interfaces.

[171]  A. Nizam,et al.  Containing Bioterrorist Smallpox , 2002, Science.

[172]  Milind Tambe,et al.  Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties , 2009, AAMAS 2009.

[173]  C. Allin Cornell,et al.  Seismic Risk Analysis of Boston , 1975 .

[174]  Jeffrey D. Berejikian A Cognitive Theory of Deterrence , 2002 .

[175]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[176]  Louis Anthony Cox,et al.  Making Terrorism Risk Analysis Less Harmful and More Useful: Another Try , 2011 .

[177]  Paul Scerri,et al.  Transitioning multiagent technology to UAV applications , 2008, AAMAS.

[178]  Ali E. Abbas,et al.  Attribute Dominance Utility , 2005, Decis. Anal..

[179]  Adam Rose,et al.  Journal of Homeland Security and Emergency Management A Framework for Analyzing the Total Economic Impacts of Terrorist Attacks and Natural Disasters , 2011 .

[180]  Robin L Dillon,et al.  Why Near‐Miss Events Can Decrease an Individual's Protective Response to Hurricanes , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[181]  Paul Gill,et al.  Comparing Role-Specific Terrorist Profiles , 2011 .

[182]  Robert F. Bordley,et al.  Effective utility functions induced by organizational target‐based incentives , 2009 .

[183]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[184]  Heidi J. Albers,et al.  Spatial modeling of extraction and enforcement in developing country protected areas , 2010 .

[185]  Werling Jeffrey,et al.  Macroeconomic and Industry Impacts of 9/11: An Interindustry Macroeconomic Approach , 2009 .

[186]  Adam Rose,et al.  Income distribution impacts of climate change mitigation policy in the Susquehanna River Basin Economy , 2007 .

[187]  Anthony S Fauci,et al.  Smallpox vaccination policy--the need for dialogue. , 2002, The New England journal of medicine.

[188]  Jianhua Xu,et al.  Evaluating an analytic–deliberative risk‐ranking process in a Chinese context , 2011 .

[189]  Alvin E. Roth,et al.  P value and the usefulness of game theoretic models , 2002 .

[190]  Sarit Kraus,et al.  Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..

[191]  Mark Phelps DO SAMS POSE A REAL THREAT TO CIVIL AVIATION , 2003 .

[192]  Mathew D. McCubbins,et al.  The Theory of Minds Within the Theory of Games , 2012 .

[193]  Richard O. Zerbe,et al.  Benefit-cost analysis , 2008 .

[194]  Santosh S. Vempala,et al.  Simulated Annealing for Convex Optimization , 2004 .

[195]  F. Norris,et al.  60,000 Disaster Victims Speak: Part II. Summary and Implications of the Disaster Mental Health Research , 2002, Psychiatry.

[196]  Peter Auer,et al.  Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.

[197]  J. C. Taylor,et al.  The U.S.-Canada Border: Cost Impacts, Causes, and Short to Long Term Management Options , 2003 .

[198]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[199]  Luis E. Ortiz,et al.  Algorithms for Interdependent Security Games , 2003, NIPS.

[200]  L. J. Savage,et al.  The Foundations of Statistics , 1955 .

[201]  R. Farrow,et al.  A missing error term in benefit-cost analysis. , 2012, Environmental science & technology.

[202]  J. Corsi,et al.  Terrorism as a Desperate Game , 1981 .

[203]  Maria E. Mayorga,et al.  The minimum p-envy location problem: a new model for equitable distribution of emergency resources , 2011 .

[204]  M. Naceur Azaiez,et al.  Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks , 2009 .

[205]  Peter B. Dixon,et al.  THE ECONOMIC COSTS TO THE U.S. OF CLOSING ITS BORDERS: A COMPUTABLE GENERAL EQUILIBRIUM ANALYSIS , 2011 .

[206]  Roger Frost,et al.  International Organization for Standardization (ISO) , 2004 .

[207]  Robin L. Dillon,et al.  How Near-Misses Influence Decision Making Under Risk: A Missed Opportunity for Learning , 2008, Manag. Sci..

[208]  Ali E. Abbas,et al.  Multiattribute Utility Copulas , 2009, Oper. Res..

[209]  Herbert Hamers,et al.  Operations research games: A survey , 2001 .

[210]  Yacov Y Haimes,et al.  On the Definition of Vulnerabilities in Measuring Risks to Infrastructures , 2006, Risk analysis : an official publication of the Society for Risk Analysis.

[211]  Garrett R. Asay,et al.  The Economic Impacts of the September 11 Terrorist Attacks: A Computable General Equilibrium Analysis , 2009 .

[212]  Howard Kunreuther,et al.  Modeling Interdependent Risks , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[213]  Maged M. Dessouky,et al.  Solution approaches for facility location of medical supplies for large-scale emergencies , 2007, Comput. Ind. Eng..

[214]  Robert G. Sargent,et al.  Verification and validation of simulation models , 2013, Proceedings of the Winter Simulation Conference, 2005..

[215]  K. Boyer,et al.  American Trucking, NAFTA, and the Cost of Distance , 1997 .

[216]  D. Earn,et al.  Group interest versus self-interest in smallpox vaccination policy , 2003, Proceedings of the National Academy of Sciences of the United States of America.

[217]  Craig R. Fox,et al.  Partition Priming in Judgment Under Uncertainty , 2003, Psychological science.

[218]  P. Walkenhorst,et al.  Quantitative Assessment of the Benefits of Trade Facilitation , 2004 .

[219]  Bernard Harris Mathematical methods in combatting terrorism. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[220]  Richard Scheines,et al.  Constructing Bayesian Network Models of Gene Expression Networks from Microarray Data , 2000 .

[221]  K. Arrow,et al.  Capital-labor substitution and economic efficiency , 1961 .

[222]  Detlof von Winterfeldt,et al.  Managing potential health risks from electric powerlines: a decision analysis caught in controversy. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[223]  Robert Powell,et al.  Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.

[224]  Donald A Henderson,et al.  Contact vaccinia--transmission of vaccinia from smallpox vaccination. , 2002, JAMA.

[225]  Gregory M. Paoli,et al.  Modeling the public health system response to a terrorist event in the food supply. , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[226]  Peter B. Dixon,et al.  The Economy-Wide Effects in the United States of Replacing Crude Petroleum with Biomass , 2007 .

[227]  Thomas R. Palfrey,et al.  Heterogeneous quantal response equilibrium and cognitive hierarchies , 2006, J. Econ. Theory.

[228]  W. McEneaney,et al.  Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind , 2006 .

[229]  Seokjin Kim,et al.  Facility location for large-scale emergencies , 2010, Ann. Oper. Res..

[230]  B. Fischhoff,et al.  How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits , 1978 .

[231]  Santosh S. Vempala,et al.  Solving convex programs by random walks , 2004, JACM.

[232]  Harvey E. Lapan,et al.  Terrorism and signalling , 1993 .

[233]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[234]  Ortwin Renn,et al.  The Social Amplification of Risk: A Conceptual Framework , 1988 .

[235]  R. Lazarick Airport vulnerability assessment-a methodology evaluation , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[236]  Martin Johnson,et al.  Economy-Wide Effects of Reducing Illegal Immigrants in U.S. Employment , 2011 .

[237]  Daphne Koller,et al.  Multi-Agent Influence Diagrams for Representing and Solving Games , 2001, IJCAI.

[238]  David Hummels,et al.  Time as a Trade Barrier , 2002, GTAP Working Paper.

[239]  D. Winterfeldt,et al.  Cognitive Components of Risk Ratings , 1981 .

[240]  Robin L. Dillon,et al.  How Near-Miss Events Amplify or Attenuate Risky Decision Making , 2012, Manag. Sci..

[241]  Matthew G. Bunn,et al.  A Mathematical Model of the Risk of Nuclear Terrorism , 2006 .

[242]  Todd Sandler,et al.  The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.

[243]  Richard Gonzalez,et al.  Curvature of the Probability Weighting Function , 1996 .

[244]  A. Haurie,et al.  Sequential Stackelberg equilibria in two-person games , 1985 .

[245]  Adam Rose,et al.  Regional Economic Impacts of a Verdugo Scenario Earthquake Disruption of Los Angeles Water Supplies: A Computable General Equilibrium Analysis , 2011 .

[246]  Jayavel Sounderpandian,et al.  Ex Ante Equity in Public Risk , 1989, Oper. Res..

[247]  David Lindley,et al.  Plural analysis: Multiple approaches to quantitative research , 1986 .

[248]  Ralph L. Keeney,et al.  Generating Objectives: Can Decision Makers Articulate What They Want? , 2008, Manag. Sci..

[249]  A. Rose DEFINING AND MEASURING ECONOMIC RESILIENCE TO DISASTERS , 2004 .

[250]  C. Folke RESILIENCE: THE EMERGENCE OF A PERSPECTIVE FOR SOCIAL-ECOLOGICAL SYSTEMS ANALYSES , 2006 .

[251]  David L. Craft,et al.  Emergency response to a smallpox attack: The case for mass vaccination , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[252]  Tito Homem-de-Mello,et al.  Risk-adjusted budget allocation models with application in homeland security , 2011 .

[253]  Rae Zimmerman,et al.  Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[254]  Gerald G. Brown,et al.  How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[255]  A. Tversky,et al.  Support theory: A nonextensional representation of subjective probability. , 1994 .

[256]  Susan E. Martonosi,et al.  Evaluating the Viability of 100 Per Cent Container Inspection at America's Ports , 2005 .

[257]  Baruch Awerbuch,et al.  Online linear optimization and adaptive routing , 2008, J. Comput. Syst. Sci..

[258]  K. Arrow,et al.  Uncertainty and the Evaluation of Public Investment Decisions , 2014 .

[259]  Jörgen W. Weibull,et al.  Testing Game Theory , 2004 .

[260]  L. Goulder,et al.  The Substantial Bias from Ignoring General Equilibrium Effects in Estimating Excess Burden, and a Practical Solution , 2003, Journal of Political Economy.

[261]  Reinhard Selten,et al.  Evolutionary stability in extensive two-person games - correction and further development , 1988 .

[262]  H. Florig,et al.  A Deliberative Method for Ranking Risks (II): Evaluation of Validity and Agreement among Risk Managers , 2001, Risk analysis : an official publication of the Society for Risk Analysis.

[263]  Lawrence V. Snyder,et al.  Facility location under uncertainty: a review , 2006 .

[264]  S. Cutter,et al.  Journal of Homeland Security and Emergency Management Disaster Resilience Indicators for Benchmarking Baseline Conditions , 2011 .

[265]  J. Breckenridge,et al.  The Strategy of Terrorism and the Psychology of Mass-Mediated Fear , 2006 .

[266]  Garrick L. Wallstrom,et al.  Measuring the effect of commuting on the performance of the Bayesian Aerosol Release Detector , 2009, BMC Medical Informatics Decis. Mak..

[267]  Henry H. Willis,et al.  Ecological Risk Ranking: Development and Evaluation of a Method for Improving Public Participation in Environmental Decision Making , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[268]  Roberto Szechtman,et al.  Why Defeating Insurgencies Is Hard: The Effect of Intelligence in Counterinsurgency Operations - A Best-Case Scenario , 2009, Oper. Res..

[269]  Peter C. Fishburn,et al.  Equity Axioms for Public Risks , 1984, Oper. Res..

[270]  W. Adger Social and ecological resilience: are they related? , 2000 .

[271]  Peter Auer,et al.  The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..

[272]  Marco Zaffalon,et al.  Bayesian Networks with Imprecise Probabilities: Theory and Application to Classification , 2012 .

[273]  Niyazi Onur Bakir,et al.  Is Better Nuclear Weapon Detection Capability Justified? , 2011 .

[274]  M. Morgan,et al.  Categorizing Risks for Risk Ranking , 2000, Risk analysis : an official publication of the Society for Risk Analysis.

[275]  Bilal M Ayyub,et al.  Risk analysis for critical asset protection. , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[276]  Lawrence D. Phillips,et al.  Advances in Decision Analysis: Decision Conferencing , 2007 .

[277]  Adam Rose,et al.  Economic Impacts of Potential Foot and Mouth Disease Agro-terrorism in the United States: A Computable General Equilibrium Analysis , 2013 .

[278]  V. Rich Personal communication , 1989, Nature.

[279]  Martin W. P. Savelsbergh,et al.  Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..

[280]  J. Davenport Editor , 1960 .

[281]  David Lindley Scoring rules and the inevitability of probability , 1982 .

[282]  F. Scholz Maximum Likelihood Estimation , 2006 .

[283]  Peter B. Dixon,et al.  Economywide Implications from US Bioenergy Expansion , 2010 .

[284]  R. Selten,et al.  A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .

[285]  L. Robin Keller,et al.  Fair Processes for Societal Decisions Involving Distributional Inequalities , 1995 .

[286]  Rae Zimmerman,et al.  Analysis of Electrical Power and Oil and Gas Pipeline Failures , 2007, Critical Infrastructure Protection.

[287]  Ali E. Abbas,et al.  Normative decision making with multiattribute performance targets , 2009 .

[288]  Louise K. Comfort,et al.  Risk and Resilience: Inter‐organizational Learning Following the Northridge Earthquake of 17 January 1994 , 1994 .

[289]  Heather Rosoff,et al.  The Dynamics of Evolving Beliefs, Concerns Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative Archival Samples , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[290]  W. Leontief Quantitative Input and Output Relations in the Economic Systems of the United States , 1936 .

[291]  Peter B. Dixon,et al.  Immigration Policy and its Possible Effects on U.S. Agriculture and the Market for Hired Farm Labor: A Simulation Analysis , 2012 .

[292]  Roberto Szechtman,et al.  Confronting Entrenched Insurgents , 2010, Oper. Res..

[293]  H. J. Einhorn The use of nonlinear, noncompensatory models in decision making. , 1970, Psychological bulletin.

[294]  V. Bier Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[295]  Daniel Kahneman,et al.  Availability: A heuristic for judging frequency and probability , 1973 .

[296]  Maged Dessouky,et al.  A modeling framework for facility location of medical services for large-scale emergencies , 2007 .

[297]  Maged Dessouky,et al.  The Stochastic Vehicle Routing Problem for Minimum Unmet Demand , 2009 .

[298]  Karl-Dieter Opp,et al.  Rational Choice and Rebellious Collective Action , 1986, American Political Science Review.

[299]  Simon M. Lucas,et al.  A Survey of Monte Carlo Tree Search Methods , 2012, IEEE Transactions on Computational Intelligence and AI in Games.

[300]  Larry Reznick,et al.  Setting priorities , 1994 .

[301]  Jie Zhang,et al.  TOWARDS A NEW FRAMEWORK FOR ACCOUNTING AND MODELLING THE REGIONAL AND LOCAL IMPACTS OF TOURISM , 2010 .

[302]  Adam Rose,et al.  Modeling a major source of economic resilience to disasters: recapturing lost production , 2011 .

[303]  Andrea L. Bertozzi,et al.  c ○ World Scientific Publishing Company A STATISTICAL MODEL OF CRIMINAL BEHAVIOR , 2008 .

[304]  James H. Lambert,et al.  Risks of Cyber Attack to Water Utility Supervisory Control and Data Acquisition Systems , 2001 .

[305]  V. Bier,et al.  Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[306]  Lauri Ojala,et al.  Trade Logistics in the Global Economy: The Logistics Performance Index and Its Indicators , 2016 .

[307]  Seth D. Guikema,et al.  Robust Adversarial Risk Analysis: A Level-k Approach , 2012, Decis. Anal..

[308]  Raymond J. Burby,et al.  Creating Hazard Resilient Communities through Land-Use Planning , 2000 .

[309]  Mark S. Daskin,et al.  Stochastic p-robust location problems , 2006 .

[310]  David R. Anderson,et al.  Model selection and multimodel inference : a practical information-theoretic approach , 2003 .

[311]  Kjell Hausken,et al.  Defending against multiple different attackers , 2011, Eur. J. Oper. Res..

[312]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[313]  A. Abbas General decompositions of multiattribute utility functions with partial utility independence , 2010 .

[314]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[315]  Monica Costa Dias,et al.  Alternative approaches to evaluation in empirical microeconomics , 2002, The Journal of Human Resources.

[316]  Alexandre M. Bayen,et al.  A time-dependent Hamilton-Jacobi formulation of reachable sets for continuous dynamic games , 2005, IEEE Transactions on Automatic Control.

[317]  Ralph L. Keeney,et al.  Advances in Decision Analysis: Developing Objectives and Attributes , 2007 .

[318]  Robert J. Nicholls,et al.  Resilience to natural hazards: How useful is this concept? , 2003 .

[319]  D. Kahneman A perspective on judgment and choice: mapping bounded rationality. , 2003, The American psychologist.

[320]  A. Tversky,et al.  Subjective Probability: A Judgment of Representativeness , 1972 .

[321]  W. Kip Viscusi The risks of terrorism , 2003 .

[322]  Peter C. Fishburn,et al.  Approximations of Two-Attribute Utility Functions , 1977, Math. Oper. Res..

[323]  Sarit Kraus,et al.  Bayesian stackelberg games and their application for security at Los Angeles international airport , 2008, SECO.

[324]  Scott Farrow,et al.  Towards Principles and Standards for the Benefit-Cost Analysis of Safety , 2011 .

[325]  Ulrich Schmidt,et al.  Additive Utility in Prospect Theory , 2009, Manag. Sci..

[326]  Naira Hovakimyan,et al.  Guaranteed Strategies for nonlinear Multi-Player Pursuit-Evasion Games , 2010, IGTR.

[327]  Scott Ferson,et al.  Varying correlation coefficients can underestimate uncertainty in probabilistic models , 2006, Reliab. Eng. Syst. Saf..

[328]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[329]  Jun Zhuang Impacts of Subsidized Security on Stability and Total Social Costs of Equilibrium Solutions in an N-Player Game with Errors , 2010 .

[330]  Ralph L. Keeney,et al.  Using Values in Operations Research , 1994, Oper. Res..

[331]  Ralph L. Keeney,et al.  Estimating Fatalities Induced by the Economic Costs of Regulations , 1997 .

[332]  Klaus Ritzberger On games under expected utility with rank dependent probabilities , 1996 .

[333]  Douglas Paton,et al.  Managing company risk and resilience through business continuity management , 2006 .

[334]  John Rollins Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy , 2010 .

[335]  C. V. Anderson,et al.  The Federal Emergency Management Agency (FEMA) , 2002 .

[336]  Gregory Levitin,et al.  Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts , 2009, IEEE Transactions on Reliability.

[337]  Marizio Falcone,et al.  Discrete time high-order schemes for viscosity solutions of Hamilton-Jacobi-Bellman equations , 1994 .

[338]  Glyn Wittwer,et al.  Economic Modeling of Water: The Australian CGE Experience , 2012 .

[339]  J. March,et al.  Learning from Samples of One or Fewer , 1991 .

[340]  James H Lambert,et al.  A Risk‐Based Approach to Setting Priorities in Protecting Bridges Against Terrorist Attacks , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[341]  Erwann O. Michel-Kerjan,et al.  Terrorisme à grande échelle partage de risques et politiques publiques , 2003 .

[342]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[343]  D. Winterfeldt On the Relevance of Behavioral Decision Research for Decision Analysis , 1999 .

[344]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[345]  Robert W. Hahn,et al.  Risks, Costs and Lives Saved: GETTING BETTER RESULTS FROM REGULATION , 1996 .

[346]  N. Abrahamson,et al.  On the Use of Logic Trees for Ground-Motion Prediction Equations in Seismic-Hazard Analysis , 2005 .

[347]  J. Harsanyi Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .

[348]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[349]  A. Rose Economic Resilience to Disasters , 2009 .

[350]  Edward H. Kaplan,et al.  Terror Queues , 2010, Oper. Res..

[351]  J. Dyer Remarks on the analytic hierarchy process , 1990 .

[352]  Andrew Schmitz,et al.  Applied welfare economics , 2008 .

[353]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[354]  N. Megiddo,et al.  The Maximum Coverage Location Problem , 1983 .

[355]  Bintong Chen,et al.  Minmax‐regret robust 1‐median location on a tree , 1998 .

[356]  Kjell Hausken,et al.  Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures , 2011, Ann. Oper. Res..

[357]  C. Starmer Developments in Non-expected Utility Theory: The Hunt for a Descriptive Theory of Choice under Risk , 2000 .

[358]  Jun Zhuang,et al.  Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker , 2013, Risk Analysis.

[359]  Richard C. Larson,et al.  Responding to Emergencies: Lessons Learned and the Need for Analysis , 2006, Interfaces.

[360]  Christopher Butler Prospect Theory and Coercive Bargaining , 2007 .

[361]  Jun Zhuang,et al.  Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[362]  Robin L. Dillon-Merrill,et al.  Logic Trees: Fault, Success, Attack, Event, Probability, and Decision Trees , 2009 .

[363]  David R. Godschalk,et al.  Urban Hazard Mitigation: Creating Resilient Cities , 2003 .

[364]  James Yetman,et al.  SUICIDAL TERRORISM AND DISCRIMINATORY SCREENING: AN EFFICIENCY‐EQUITY TRADE‐OFF , 2004 .

[365]  C. Everett Koop "Prepared Statement Presented before the House Subcommittee on Health and the Environment of the House Committee on Energy and Commerce, Washington, DC" [Reminiscence] , 2003 .

[366]  Kenneth O. Kortanek,et al.  A Central Cutting Plane Algorithm for Convex Semi-Infinite Programming Problems , 1993, SIAM J. Optim..

[367]  A. Tversky,et al.  Advances in prospect theory: Cumulative representation of uncertainty , 1992 .

[368]  Hirokazu Tatano,et al.  Estimation of Lifeline Resilience Factors Based on Surveys of Japanese Industries , 2009 .

[369]  G. Woo Quantitative Terrorism Risk Assessment , 2002 .

[370]  George H Baker A Vulnerability Assessment Methodology for Critical Infrastructure Sites , 2005 .

[371]  Bo An,et al.  GUARDS and PROTECT: next generation applications of security games , 2011, SECO.

[372]  Harry W. Richardson,et al.  A two-step approach to estimating state-to-state commodity trade flows , 2008 .

[373]  Peter H. Farquhar,et al.  A Fractional Hypercube Decomposition Theorem for Multiattribute Utility Functions , 1975, Oper. Res..

[374]  Peter B. Dixon,et al.  Dynamic general equilibrium modelling for forecasting and policy : a practical guide and documentation of MONASH , 2002 .

[375]  Vicki M. Bier,et al.  A study of expert overconfidence , 2008, Reliab. Eng. Syst. Saf..

[376]  Gregory S Parnell,et al.  Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[377]  Jason R. W. Merrick,et al.  A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[378]  Richard Gonzalez,et al.  On the Shape of the Probability Weighting Function , 1999, Cognitive Psychology.

[379]  Louis Anthony Tony Cox,et al.  Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks , 2008 .

[380]  H. Simon,et al.  Rational choice and the structure of the environment. , 1956, Psychological review.

[381]  John A. Major Advanced Techniques for Modeling Terrorism Risk , 2002 .

[382]  Lawrence M. Wein,et al.  OR Forum - Homeland Security: From Mathematical Models to Policy Implementation: The 2008 Philip McCord Morse Lecture , 2009, Oper. Res..

[383]  Maged M. Dessouky,et al.  Perishable inventory management system with a minimum volume constraint , 2011, J. Oper. Res. Soc..

[384]  T. Saaty How to Make a Decision: The Analytic Hierarchy Process , 1990 .

[385]  J. Eto,et al.  Understanding the cost of power interruptions to U.S. electricity consumers , 2004 .

[386]  A. Rose Economic resilience to natural and man-made disasters: Multidisciplinary origins and contextual dimensions , 2007 .

[387]  A. Tversky Elimination by aspects: A theory of choice. , 1972 .

[388]  J. Nash Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.

[389]  Claire J. Tomlin,et al.  Monotone Approximations of Minimum and Maximum Functions and Multi-objective Problems , 2012 .

[390]  F. Norris,et al.  Community Resilience as a Metaphor, Theory, Set of Capacities, and Strategy for Disaster Readiness , 2008, American journal of community psychology.

[391]  Richard J. Zeckhauser,et al.  Critical ratios and efficient allocation , 1973 .

[392]  Peter B. Dixon,et al.  Macro, industry and state effects in the U.S. of removing major tariffs and quotas , 2004 .

[393]  Detlof von Winterfeldt,et al.  Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists? , 2006, Decis. Anal..

[394]  Michael P. Wellman,et al.  Selecting strategies using empirical game models: an experimental analysis of meta-strategies , 2008, AAMAS.

[395]  D von Winterfeldt,et al.  A Risk and Economic Analysis of Dirty Bomb Attacks on the Ports of Los Angeles and Long Beach , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[396]  Nicholas R. Jennings,et al.  Computational-Mechanism Design: A Call to Arms , 2003, IEEE Intell. Syst..

[397]  Adrian E. Raftery,et al.  Bayesian model averaging: a tutorial (with comments by M. Clyde, David Draper and E. I. George, and a rejoinder by the authors , 1999 .

[398]  Ralph L Keeney,et al.  A Value Model for Evaluating Homeland Security Decisions , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[399]  Vladimir Marianov,et al.  The Queueing Maximal availability location problem: A model for the siting of emergency vehicles , 1996 .

[400]  Ali E. Abbas,et al.  Utility transversality: a value-based approach , 2005 .

[401]  G. Apostolakis The concept of probability in safety assessments of technological systems. , 1990, Science.

[402]  J. Harsanyi Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .

[403]  George A. Hazelrigg,et al.  Bayesian Inference for the Demand of Engineering Products , 2012 .

[404]  L. Robin Keller,et al.  Equity in Social Risk: Some Empirical Observations , 1988 .

[405]  Anthony Michael Barrett,et al.  Should cities invest in sheltering-in-place measures against chlorine truck attacks by terrorists? , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[406]  Vicki M. Bier,et al.  Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .

[407]  J M Bland,et al.  Weighted comparison of means , 1998, BMJ.

[408]  Joost R. Santos,et al.  Modeling the Demand Reduction Input‐Output (I‐O) Inoperability Due to Terrorism of Interconnected Infrastructures * , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[409]  H. Simon,et al.  A Behavioral Model of Rational Choice , 1955 .

[410]  Shi-Woei Lin,et al.  Should the Model for Risk‐Informed Regulation be Game Theory Rather than Decision Theory? , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[411]  R. Wilcox Applying Contemporary Statistical Techniques , 2003 .

[412]  Ralph L. Keeney,et al.  Improving the Generation of Decision Objectives , 2010, Decis. Anal..

[413]  Gordon H. McCormick Terrorist Decision Making , 2003 .

[414]  E. Brunswik,et al.  The Conceptual Framework of Psychology , 1954 .

[415]  Marinos E. Tsigas,et al.  Impacts of Better Trade Facilitation in Developing Countries: Analysis with a New GTAP Database for the Value of Time in Trade , 2008 .

[416]  H. Edward Price,et al.  The Strategy and Tactics of Revolutionary Terrorism , 1977, Comparative Studies in Society and History.