Search Results

There are 19093 results for: content related to: A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management

  1. Adversarial Risk Analysis for Counterterrorism Modeling

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 894–915, Jesus Rios and David Rios Insua

    Version of Record online : 8 DEC 2011, DOI: 10.1111/j.1539-6924.2011.01713.x

  2. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information

    Risk Analysis

    Volume 32, Issue 5, May 2012, Pages: 930–943, Mohammad E. Nikoofal and Jun Zhuang

    Version of Record online : 2 NOV 2011, DOI: 10.1111/j.1539-6924.2011.01702.x

  3. Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model

    Risk Analysis

    Volume 30, Issue 1, January 2010, Pages: 32–48, Gregory S. Parnell, Christopher M. Smith and Frederick I. Moxley

    Version of Record online : 11 DEC 2009, DOI: 10.1111/j.1539-6924.2009.01319.x

  4. Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome

    Risk Analysis

    Volume 32, Issue 2, February 2012, Pages: 304–318, Gregory Levitin and Kjell Hausken

    Version of Record online : 30 JUL 2011, DOI: 10.1111/j.1539-6924.2011.01657.x

  5. A Comprehensive Network Security Risk Model for Process Control Networks

    Risk Analysis

    Volume 29, Issue 2, February 2009, Pages: 223–248, Matthew H. Henry and Yacov Y. Haimes

    Version of Record online : 24 OCT 2008, DOI: 10.1111/j.1539-6924.2008.01151.x

  6. Modeling Arbitrary Layers of Continuous-Level Defenses in Facing with Strategic Attackers

    Risk Analysis

    Volume 31, Issue 4, April 2011, Pages: 533–547, Mohsen Golalikhani and Jun Zhuang

    Version of Record online : 24 NOV 2010, DOI: 10.1111/j.1539-6924.2010.01531.x

  7. Resource Distribution in Multiple Attacks Against a Single Target

    Risk Analysis

    Volume 30, Issue 8, August 2010, Pages: 1231–1239, Gregory Levitin and Kjell Hausken

    Version of Record online : 20 APR 2010, DOI: 10.1111/j.1539-6924.2010.01410.x

  8. Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity

    Risk Analysis

    Volume 28, Issue 5, October 2008, Pages: 1477–1486, Kjell Hausken and Gregory Levitin

    Version of Record online : 9 JUL 2008, DOI: 10.1111/j.1539-6924.2008.01090.x

  9. Game Theory and Risk Analysis

    Risk Analysis

    Volume 29, Issue 8, August 2009, Pages: 1062–1068, Louis Anthony (Tony) Cox, Jr.

    Version of Record online : 24 JUN 2009, DOI: 10.1111/j.1539-6924.2009.01247.x

  10. Securing Passenger Aircraft from the Threat of Man-Portable Air Defense Systems (MANPADS)

    Risk Analysis

    Volume 28, Issue 6, December 2008, Pages: 1583–1599, Uche Okpara and Vicki M. Bier

    Version of Record online : 26 SEP 2008, DOI: 10.1111/j.1539-6924.2008.01133.x

  11. Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks

    Risk Analysis

    Volume 28, Issue 6, December 2008, Pages: 1749–1761, Louis Anthony (Tony) Cox, Jr

    Version of Record online : 20 OCT 2008, DOI: 10.1111/j.1539-6924.2008.01142.x

  12. Quantifying Adversary Capabilities to Inform Defensive Resource Allocation

    Risk Analysis

    Volume 36, Issue 4, April 2016, Pages: 756–775, Chen Wang and Vicki M. Bier

    Version of Record online : 1 MAY 2015, DOI: 10.1111/risa.12399

  13. Network routing for insurgency: An adversarial risk analysis framework

    Naval Research Logistics (NRL)

    Volume 58, Issue 6, September 2011, Pages: 595–607, Shouqiang Wang and David Banks

    Version of Record online : 11 JUL 2011, DOI: 10.1002/nav.20469

  14. Defense Resource Distribution Between Protection and Redundancy for Constant Resource Stockpiling Pace

    Risk Analysis

    Volume 31, Issue 10, October 2011, Pages: 1632–1645, Gregory Levitin and Kjell Hausken

    Version of Record online : 9 MAR 2011, DOI: 10.1111/j.1539-6924.2011.01593.x

  15. Strategy Alternatives for Homeland Air and Cruise Missile Defense

    Risk Analysis

    Volume 30, Issue 10, October 2010, Pages: 1507–1519, Eric M. Murphy, Michael D. Payne and Glenn W. VanDerWoude

    Version of Record online : 12 JUL 2010, DOI: 10.1111/j.1539-6924.2010.01449.x

  16. Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts

    Risk Analysis

    Vineet M. Payyappalli, Jun Zhuang and Victor Richmond R. Jose

    Version of Record online : 17 MAR 2017, DOI: 10.1111/risa.12768

  17. Denial-of-Service Attacks on VoIP and IMS Services

    SIP Security

    Dorgham Sisalem, John Floroiu, Jiri Kuthan, Ulrich Abend, Henning Schulzrinne, Pages: 225–290, 2009

    Published Online : 11 MAY 2009, DOI: 10.1002/9780470516997.ch8

  18. Could firewall rules be public – a game theoretical perspective

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 197–210, Qi Liao, Zhen Li and Aaron Striegel

    Version of Record online : 24 JAN 2011, DOI: 10.1002/sec.307

  19. Modeling Resources Allocation in Attacker-Defender Games with “Warm Up” CSF

    Risk Analysis

    Volume 36, Issue 4, April 2016, Pages: 776–791, Peiqiu Guan and Jun Zhuang

    Version of Record online : 29 DEC 2015, DOI: 10.1111/risa.12502

  20. Adversarial Risk Analysis with Incomplete Information: A Level-k Approach

    Risk Analysis

    Volume 32, Issue 7, July 2012, Pages: 1219–1231, Casey Rothschild, Laura McLay and Seth Guikema

    Version of Record online : 28 OCT 2011, DOI: 10.1111/j.1539-6924.2011.01701.x