Search Results

There are 11610 results for: content related to: Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks

  1. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.911

  2. A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management

    Risk Analysis

    Volume 31, Issue 9, September 2011, Pages: 1488–1510, Jason Merrick and Gregory S. Parnell

    Version of Record online : 18 MAR 2011, DOI: 10.1111/j.1539-6924.2011.01590.x

  3. Improving Risk-Based Decision Making for Terrorism Applications

    Risk Analysis

    Volume 29, Issue 3, March 2009, Pages: 336–341, Louis Anthony Cox, Jr

    Version of Record online : 13 FEB 2009, DOI: 10.1111/j.1539-6924.2009.01206.x

  4. A Comprehensive Network Security Risk Model for Process Control Networks

    Risk Analysis

    Volume 29, Issue 2, February 2009, Pages: 223–248, Matthew H. Henry and Yacov Y. Haimes

    Version of Record online : 24 OCT 2008, DOI: 10.1111/j.1539-6924.2008.01151.x

  5. Quantifying Adversary Capabilities to Inform Defensive Resource Allocation

    Risk Analysis

    Volume 36, Issue 4, April 2016, Pages: 756–775, Chen Wang and Vicki M. Bier

    Version of Record online : 1 MAY 2015, DOI: 10.1111/risa.12399

  6. Adversarial Risk Analysis for Counterterrorism Modeling

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 894–915, Jesus Rios and David Rios Insua

    Version of Record online : 8 DEC 2011, DOI: 10.1111/j.1539-6924.2011.01713.x

  7. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 930–943, Mohammad E. Nikoofal and Jun Zhuang

    Version of Record online : 2 NOV 2011, DOI: 10.1111/j.1539-6924.2011.01702.x

  8. Automated Testing of Physical Security: Red Teaming Through Machine Learning

    Computational Intelligence

    Volume 31, Issue 3, August 2015, Pages: 465–497, Chris Thornton, Ori Cohen, Jörg Denzinger and Jeffrey E. Boyd

    Version of Record online : 27 FEB 2014, DOI: 10.1111/coin.12034

  9. Modeling Resources Allocation in Attacker-Defender Games with “Warm Up” CSF

    Risk Analysis

    Volume 36, Issue 4, April 2016, Pages: 776–791, Peiqiu Guan and Jun Zhuang

    Version of Record online : 29 DEC 2015, DOI: 10.1111/risa.12502

  10. A fictitious play-based response strategy for multistage intrusion defense systems

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 473–491, Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif and Salim Hariri

    Version of Record online : 28 FEB 2013, DOI: 10.1002/sec.730

  11. How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts

    Risk Analysis

    Volume 31, Issue 2, February 2011, Pages: 196–204, Gerald G. Brown and Louis Anthony (Tony) Cox, Jr.

    Version of Record online : 15 SEP 2010, DOI: 10.1111/j.1539-6924.2010.01492.x

  12. Managing Enterprise Risks of Technological Systems: An Exploratory Empirical Analysis of Vulnerability Characteristics as Drivers of Exploit Publication

    Decision Sciences

    Ravi Sen and Gregory R. Heim

    Version of Record online : 8 JAN 2016, DOI: 10.1111/deci.12212

  13. A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2171–2188, Hailun Tan, Wen Hu and Sanjay Jha

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1162

  14. Choosing What to Protect

    Risk Analysis

    Volume 27, Issue 3, June 2007, Pages: 607–620, Vicki M. Bier

    Version of Record online : 18 JUL 2007, DOI: 10.1111/j.1539-6924.2007.00906.x

  15. Resource Distribution in Multiple Attacks Against a Single Target

    Risk Analysis

    Volume 30, Issue 8, August 2010, Pages: 1231–1239, Gregory Levitin and Kjell Hausken

    Version of Record online : 20 APR 2010, DOI: 10.1111/j.1539-6924.2010.01410.x

  16. Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory

    Risk Analysis

    Volume 36, Issue 4, April 2016, Pages: 681–693, Jason R. W. Merrick and Philip Leclerc

    Version of Record online : 14 JUL 2014, DOI: 10.1111/risa.12254

  17. Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome

    Risk Analysis

    Volume 32, Issue 2, February 2012, Pages: 304–318, Gregory Levitin and Kjell Hausken

    Version of Record online : 30 JUL 2011, DOI: 10.1111/j.1539-6924.2011.01657.x

  18. Frenzied attacks. A micro-sociological analysis of the emotional dynamics of extreme youth violence

    The British Journal of Sociology

    Volume 65, Issue 3, September 2014, Pages: 411–433, Don Weenink

    Version of Record online : 23 SEP 2014, DOI: 10.1111/1468-4446.12088

    Corrected by:

    Corrigendum: Corrigendum

    Vol. 65, Issue 4, ii, Version of Record online: 17 DEC 2014

  19. Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model

    Risk Analysis

    Volume 30, Issue 1, January 2010, Pages: 32–48, Gregory S. Parnell, Christopher M. Smith and Frederick I. Moxley

    Version of Record online : 11 DEC 2009, DOI: 10.1111/j.1539-6924.2009.01319.x

  20. Could firewall rules be public – a game theoretical perspective

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 197–210, Qi Liao, Zhen Li and Aaron Striegel

    Version of Record online : 24 JAN 2011, DOI: 10.1002/sec.307