SEARCH

SEARCH BY CITATION

Cited in:

CrossRef

This article has been cited by:

  1. 1
    Kjell Hausken, Individual versus overarching protection and attack of assets, Central European Journal of Operations Research, 2014, 22, 1, 89

    CrossRef

  2. 2
    Hiba Baroud, Kash Barker, Jose E. Ramirez-Marquez, Claudio M. Rocco, Inherent Costs and Interdependent Impacts of Infrastructure Network Resilience, Risk Analysis, 2014, 34, 6
  3. 3
    Xiaojun (Gene) Shan, Jun Zhuang, Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection—A Three-Stage Game, Decision Analysis, 2014, 11, 1, 43

    CrossRef

  4. 4
    Jan Trockel, Changing bonuses and the resulting effects of employees’ incentives to an inspection game, Journal of Business Economics, 2013, 83, 7, 759

    CrossRef

  5. 5
    KJELL HAUSKEN, COMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACK, Asia-Pacific Journal of Operational Research, 2013, 30, 02, 1250056

    CrossRef

  6. 6
    Xiaojun Shan, Jun Zhuang, Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker, Risk Analysis, 2013, 33, 6
  7. 7
    Xiaojun Shan, Jun Zhuang, Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game, European Journal of Operational Research, 2013, 228, 1, 262

    CrossRef

  8. 8
    Federico Perea, Justo Puerto, Revisiting a game theoretic framework for the robust railway network design against intentional attacks, European Journal of Operational Research, 2013, 226, 2, 286

    CrossRef

  9. 9
    B. Golany, N. Goldberg, U. G. Rothblum, Allocating multiple defensive resources in a zero-sum game setting, Annals of Operations Research, 2012,

    CrossRef

  10. 10
    E. Zio, L.R. Golea, Analyzing the topological, electrical and reliability characteristics of a power transmission system for identifying its critical elements, Reliability Engineering & System Safety, 2012, 101, 67

    CrossRef

  11. 11
    Shital A. Thekdi, James H. Lambert, Decision Analysis and Risk Models for Land Development Affecting Infrastructure Systems, Risk Analysis, 2012, 32, 7
  12. 12
    G Levitin, K Hausken, Individual versus overarching protection against strategic attacks, Journal of the Operational Research Society, 2012, 63, 7, 969

    CrossRef

  13. 13
    B J Lunday, H D Sherali, Minimizing the maximum network flow: models and algorithms with resource synergy considerations, Journal of the Operational Research Society, 2012, 63, 12, 1693

    CrossRef

  14. 14
    Mohammad E. Nikoofal, Jun Zhuang, Robust Allocation of a Defensive Budget Considering an Attacker's Private Information, Risk Analysis, 2012, 32, 5
  15. 15
    Justin Yates, Irene Casas, Role of Spatial Data in the Protection of Critical Infrastructure and Homeland Defense, Applied Spatial Analysis and Policy, 2012, 5, 1, 1

    CrossRef

  16. You have free access to this content16
    Michael Greenberg, Charles Haas, Anthony Cox, Karen Lowrie, Katherine McComas, Warner North, Ten Most Important Accomplishments in Risk Analysis, 1980–2010, Risk Analysis, 2012, 32, 5
  17. 17
    Jose Emmanuel Ramirez-Marquez, Claudio M. Rocco, Vulnerability based robust protection strategy selection in service networks, Computers & Industrial Engineering, 2012, 63, 1, 235

    CrossRef

  18. 18
    Niyazi Onur Bakır, A Stackelberg game model for resource allocation in cargo container security, Annals of Operations Research, 2011, 187, 1, 5

    CrossRef

  19. 19
    Vicki M. Bier, Naraphorn Haphuriwat, Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks, Annals of Operations Research, 2011, 187, 1, 137

    CrossRef

  20. 20
    Stanislava Stungurienė, Laima Urbšienė, Assessment of construction object financing solutions, Technological and Economic Development of Economy, 2011, 17, 4, 579

    CrossRef

  21. 21
    John E. Bell, Stanley E. Griffis, William A. Cunningham, Jon A. Eberlan, Location optimization of strategic alert sites for homeland defense, Omega, 2011, 39, 2, 151

    CrossRef

  22. 22
    Mohsen Golalikhani, Jun Zhuang, Modeling Arbitrary Layers of Continuous-Level Defenses in Facing with Strategic Attackers, Risk Analysis, 2011, 31, 4
  23. 23
    Jeffrey S. Simonoff, Carlos E. Restrepo, Rae Zimmerman, Zvia Segal Naphtali, Henry H. Willis, Resource allocation, emergency response capability, and infrastructure concentration around vulnerable sites, Journal of Risk Research, 2011, 14, 5, 597

    CrossRef

  24. 24
    Jian Hu, Tito Homem-de-Mello, Sanjay Mehrotra, Risk-adjusted budget allocation models with application in homeland security, IIE Transactions, 2011, 43, 12, 819

    CrossRef

  25. 25
    Chen Wang, Vicki M. Bier, Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility, Decision Analysis, 2011, 8, 4, 286

    CrossRef

  26. 26
    N. Haphuriwat, V.M. Bier, Trade-offs between target hardening and overarching protection, European Journal of Operational Research, 2011, 213, 1, 320

    CrossRef

  27. 27
    Jing Zhang, Shifei Shen, Rui Yang, The impacts of adaptive attacking and defending strategies on mitigation of intentional threats, Kybernetes, 2010, 39, 5, 825

    CrossRef

  28. 28
    Brian J. Lunday, Hanif D. Sherali, Theodore S. Glickman, The Nested Event Tree Model with Application to Combating Terrorism, INFORMS Journal on Computing, 2010, 22, 4, 620

    CrossRef

  29. 29
    Vicki M. Bier, Game-Theoretic Methods in CounterTerrorism and Security, Wiley Encyclopedia of Operations Research and Management Science,