Search Results

There are 49971 results for: content related to: How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts

  1. Adversarial Risk Analysis for Counterterrorism Modeling

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 894–915, Jesus Rios and David Rios Insua

    Article first published online : 8 DEC 2011, DOI: 10.1111/j.1539-6924.2011.01713.x

  2. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 930–943, Mohammad E. Nikoofal and Jun Zhuang

    Article first published online : 2 NOV 2011, DOI: 10.1111/j.1539-6924.2011.01702.x

  3. A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management

    Risk Analysis

    Volume 31, Issue 9, September 2011, Pages: 1488–1510, Jason Merrick and Gregory S. Parnell

    Article first published online : 18 MAR 2011, DOI: 10.1111/j.1539-6924.2011.01590.x

  4. Weakest-link attacker-defender games with multiple attack technologies

    Naval Research Logistics (NRL)

    Volume 59, Issue 6, September 2012, Pages: 457–469, Daniel G. Arce, Dan Kovenock and Brian Roberson

    Article first published online : 30 JUL 2012, DOI: 10.1002/nav.21500

  5. Could firewall rules be public – a game theoretical perspective

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 197–210, Qi Liao, Zhen Li and Aaron Striegel

    Article first published online : 24 JAN 2011, DOI: 10.1002/sec.307

  6. Choosing What to Protect

    Risk Analysis

    Volume 27, Issue 3, June 2007, Pages: 607–620, Vicki M. Bier

    Article first published online : 18 JUL 2007, DOI: 10.1111/j.1539-6924.2007.00906.x

  7. A Unified Theory and Test of Extended Immediate Deterrence

    American Journal of Political Science

    Volume 50, Issue 3, July 2006, Pages: 586–605, Curtis S. Signorino and Ahmer Tarar

    Article first published online : 21 JUN 2006, DOI: 10.1111/j.1540-5907.2006.00203.x

  8. Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome

    Risk Analysis

    Volume 32, Issue 2, February 2012, Pages: 304–318, Gregory Levitin and Kjell Hausken

    Article first published online : 30 JUL 2011, DOI: 10.1111/j.1539-6924.2011.01657.x

  9. Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory

    Risk Analysis

    Jason R. W. Merrick and Philip Leclerc

    Article first published online : 14 JUL 2014, DOI: 10.1111/risa.12254

  10. A Comprehensive Network Security Risk Model for Process Control Networks

    Risk Analysis

    Volume 29, Issue 2, February 2009, Pages: 223–248, Matthew H. Henry and Yacov Y. Haimes

    Article first published online : 24 OCT 2008, DOI: 10.1111/j.1539-6924.2008.01151.x

  11. A fictitious play-based response strategy for multistage intrusion defense systems

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 473–491, Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif and Salim Hariri

    Article first published online : 28 FEB 2013, DOI: 10.1002/sec.730

  12. Allocating capacity in parallel queues to improve their resilience to deliberate attack

    Naval Research Logistics (NRL)

    Volume 58, Issue 8, December 2011, Pages: 731–742, W. Matthew Carlyle, Shane G. Henderson and Roberto Szechtman

    Article first published online : 29 SEP 2011, DOI: 10.1002/nav.20478

  13. Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker

    Journal of Public Economic Theory

    Volume 9, Issue 4, August 2007, Pages: 563–587, VICKI BIER, SANTIAGO OLIVEROS and LARRY SAMUELSON

    Article first published online : 31 JUL 2007, DOI: 10.1111/j.1467-9779.2007.00320.x

  14. A game inspired defense mechanism against distributed denial of service attacks

    Security and Communication Networks

    Harkeerat Bedi, Sajjan Shiva and Sankardas Roy

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.949

  15. Network routing for insurgency: An adversarial risk analysis framework

    Naval Research Logistics (NRL)

    Volume 58, Issue 6, September 2011, Pages: 595–607, Shouqiang Wang and David Banks

    Article first published online : 11 JUL 2011, DOI: 10.1002/nav.20469

  16. Deception tactics for network interdiction: A multiobjective approach

    Networks

    Volume 60, Issue 1, August 2012, Pages: 45–58, Javier Salmerón

    Article first published online : 19 SEP 2011, DOI: 10.1002/net.20458

  17. Resource Distribution in Multiple Attacks Against a Single Target

    Risk Analysis

    Volume 30, Issue 8, August 2010, Pages: 1231–1239, Gregory Levitin and Kjell Hausken

    Article first published online : 20 APR 2010, DOI: 10.1111/j.1539-6924.2010.01410.x

  18. A Decision Framework for Managing Risk to Airports from Terrorist Attack

    Risk Analysis

    Abdollah Shafieezadeh, Eun J. Cha and Bruce R. Ellingwood

    Article first published online : 11 AUG 2014, DOI: 10.1111/risa.12266

  19. Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker

    Risk Analysis

    Volume 33, Issue 6, June 2013, Pages: 1083–1099, Xiaojun Shan and Jun Zhuang

    Article first published online : 19 DEC 2012, DOI: 10.1111/j.1539-6924.2012.01919.x

  20. Improving Risk-Based Decision Making for Terrorism Applications

    Risk Analysis

    Volume 29, Issue 3, March 2009, Pages: 336–341, Louis Anthony Cox, Jr

    Article first published online : 13 FEB 2009, DOI: 10.1111/j.1539-6924.2009.01206.x