SEARCH

SEARCH BY CITATION

Cited in:

CrossRef

This article has been cited by:

  1. 1
    Chi Zhang, José Emmanuel Ramirez-Marquez, Jianhui Wang, Critical infrastructure protection using secrecy – A discrete simultaneous game, European Journal of Operational Research, 2015, 242, 1, 212

    CrossRef

  2. 2
    Cameron A. MacKenzie, Hiba Baroud, Kash Barker, Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill, Annals of Operations Research, 2014,

    CrossRef

  3. 3
    Bo An, Fernando Ordóñez, Milind Tambe, Eric Shieh, Rong Yang, Craig Baldwin, Joseph DiRenzo, Kathryn Moretti, Ben Maule, Garrett Meyer, A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard, Interfaces, 2013, 43, 5, 400

    CrossRef

  4. 4
    Kevin S. Ni, Daniel Faissol, Thomas Edmunds, Richard Wheeler, Exploitation of Ambiguous Cues to Infer Terrorist Activity, Decision Analysis, 2013, 10, 1, 42

    CrossRef

  5. 5
    Xing Gao, Weijun Zhong, Shue Mei, Information Security Investment When Hackers Disseminate Knowledge, Decision Analysis, 2013, 10, 4, 352

    CrossRef

  6. 6
    Michael Greenberg, Paul Lioy, Birnur Ozbas, Nancy Mantell, Sastry Isukapalli, Michael Lahr, Tayfur Altiok, Joseph Bober, Clifton Lacy, Karen Lowrie, Henry Mayer, Jennifer Rovito, Passenger Rail Security, Planning, and Resilience: Application of Network, Plume, and Economic Simulation Models as Decision Support Tools, Risk Analysis, 2013, 33, 11
  7. 7
    M. Elisabeth Paté-Cornell, Games, Risks, and Analytics: Several Illustrative Cases Involving National Security and Management Situations, Decision Analysis, 2012, 9, 2, 186

    CrossRef

  8. You have free access to this content8
    Michael Greenberg, Charles Haas, Anthony Cox, Karen Lowrie, Katherine McComas, Warner North, Ten Most Important Accomplishments in Risk Analysis, 1980–2010, Risk Analysis, 2012, 32, 5
  9. 9
    Yacov Y. Haimes, On the Complex Quantification of Risk: Systems-Based Perspective on Terrorism, Risk Analysis, 2011, 31, 8
  10. 10
    Jeffrey S. Simonoff, Carlos E. Restrepo, Rae Zimmerman, Zvia Segal Naphtali, Henry H. Willis, Resource allocation, emergency response capability, and infrastructure concentration around vulnerable sites, Journal of Risk Research, 2011, 14, 5, 597

    CrossRef

  11. 11
    David J Brooks, Security risk management: A psychometric map of expert knowledge structure, Risk Management, 2011, 13, 1-2, 17

    CrossRef

  12. 12
    Chen Wang, Vicki M. Bier, Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility, Decision Analysis, 2011, 8, 4, 286

    CrossRef

  13. 13
    Dan Bernhardt, Mattias K. Polborn, Non-convexities and the gains from concealing defenses from committed terrorists, Economics Letters, 2010, 107, 1, 52

    CrossRef

  14. 14
    Manish Jain, Jason Tsai, James Pita, Christopher Kiekintveld, Shyamsunder Rathi, Milind Tambe, Fernando Ordóñez, Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service, Interfaces, 2010, 40, 4, 267

    CrossRef

  15. 15
    Islam H. El-adaway, Amr A. Kandil, Contractors’ Claims Insurance: A Risk Retention Approach, Journal of Construction Engineering and Management, 2009, 135, 9, 819

    CrossRef

  16. 16
    Louis Anthony Cox, Jr, Improving Risk-Based Decision Making for Terrorism Applications, Risk Analysis, 2009, 29, 3
  17. You have free access to this content17
    Robin L. Dillon, Robert M. Liebe, Thomas Bestafka, Risk-Based Decision Making for Terrorism Applications, Risk Analysis, 2009, 29, 3
  18. 18
    Yacov Y. Haimes, Kenneth Crowther, Barry M. Horowitz, Homeland security preparedness: Balancing protection with resilience in emergent systems, Systems Engineering, 2008, 11, 4
  19. 19
    Navid Ghaffarzadegan, How a System Backfires: Dynamics of Redundancy Problems in Security, Risk Analysis, 2008, 28, 6
  20. 20
    Michael P. Atkinson, Zheng Cao, Lawrence M. Wein, Optimal Stopping Analysis of a Radiation Detection System to Protect Cities from a Nuclear Terrorist Attack, Risk Analysis, 2008, 28, 2
  21. 21
    Vicki M. Bier, Game Theoretic Methods, Wiley StatsRef: Statistics Reference Online,
  22. 22
    Vicki M. Bier, Game-Theoretic Methods in CounterTerrorism and Security, Wiley Encyclopedia of Operations Research and Management Science,
  23. 23
    Nicholas A. Linacre, Marc J. Cohen, Bonwoo Koo, Regina Birner, The Use of Threat, Vulnerability, and Consequence (TVC) Analysis for Decision Making on The Deployment of Limited Security Resources, Wiley Handbook of Science and Technology for Homeland Security,