• 1
    Parnell G, Dillon RL, Bresnick T. Integrating risk management with homeland security and antiterrorism resource allocation decision-making. Pp. 431462 in KamienD (ed). The McGraw-Hill Handbook of Homeland Security. Columbus , OH : McGraw-Hill, 2005.
  • 2
    Masse T, O'Neil S, Rollins J. CRS Report for Congress: The Department of Homeland Security's Risk Assessment Methodology: Evolution, Issues, and Options for Congress. Washington , DC : Congressional Research Service Report No. Rl33858, 2007.
  • 3
    Government Accounting Office. Combating Terrorism: Actions Needed to Guide Services Antiterrorism Efforts at Installations. Washington , DC : Government Accounting Office Report GAO 03–14, November, 2002.
  • 4
    Garrick BJ. Perspectives on the use of risk assessment to address terrorism. Risk Analysis, 2002; 22(3):421422.
  • 5
    Paté-Cornell ME, Dillon RL. The respective roles of risk and decision analyses in decision support. Decision Analysis, 2006; 3(4):113.
  • 6
    Bier VM, Von Winterfeldt D. Meeting the challenges of terrorism risk analysis. Risk Analysis, 2007; 27(3):503504.
  • 7
    Deisler PF, Schwing RC. History of the Society for Risk Analysis Through the Year 2000. White paper available from the Society of Risk Analysis, 2000.
  • 8
    Bier VM. Game-Theoretic and Reliability Methods in Counter-terrorism and Security in Modern Statistical and Mathematical Methods in Reliability, Series on Quality, Reliability and Engineering Statistics. Hackensack , NJ : World Scientific Publishing Co., 2005.
  • 9
    Paté-Cornell ME, Guikema SD. Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures. Military Operations Research, 2002; 7(4):523.
  • 10
    Bier VM. Choosing what to protect. Risk Analysis, 2007; 27(3):607620.
  • 11
    Bier VM. Optimal resource allocation for defense of targets based on differing measures of attractiveness, Working paper under review, 2008.
  • 12
    Willis HH. Guiding resource allocations based on terrorism risk. Risk Analysis, 2007; 27(3):597606.
  • 13
    Biringer BE, Matalucci RV, O'Connor SL. Security Risk Assessment and Management. NJ : John Wiley & Sons, 2007.
  • 14
    Keeney RL. Modeling values for anti-terrorism analysis. Risk Analysis, 2007; 27(3):585596.
  • 15
    Haimes Y. Risk Modeling, Assessment, and Management, 2nd ed. Hoboken , NJ : Wiley Publishing, 2004.
  • 16
    Fischhoff B, Lichtenstein S, Slovic P, Derby SL, Keeney RL. Acceptable Risk. New York : Cambridge University Press, 1981.
  • 17
    Ayyub BM, McGill WL, Kaminskiy M. Critical asset and portfolio risk analysis: An all-hazards framework. Risk Analysis, 2007; 27(4):789801.
  • 18
    LaTourrette T, Howell DR, Mosher DE, MacDonald J. Reducing Terrorism Risk at Shopping Centers. Santa Monica , CA : RAND Technical Report, 2006.
  • 19
    Decker C. Navy Antiterrorism/Force Protection (AT/FP) Ashore Functional Needs Analysis (FNA). White Paper, Washington , DC : Department of Defense , 2004.
  • 20
    Ezell BC. Infrastructure vulnerability assessment model (I-VAM). Risk Analysis, 2007; 27(3):571583.
  • 21
    Kleinmuntz D. Robust risk-based resource allocation for counter terrorism. INFORMS conference presentation, Seattle , WA , 2007.
  • 22
    Buckshaw D, Parnell GS, Unkenholz W, Parks D, Wallner J, Saydjari O. Mission-oriented risk and design analysis of critical information systems. Journal of Military Operations Research, 2005; 10(2):1938.
  • 23
    Cox LA. What's wrong with risk matrices? Risk Analysis, 2008; 28(2):497512.
  • 24
    Metron, Inc. Anti-terrorism/force protection modeling for the US Navy. Available at:, Accessed on January 14, 2008.
  • 25
    Ares Corporation. Automated Vulnerability Evaluation for Risks of Terrorism (AVERT) software tool modeling system vulnerabilities. Available at:, Accessed on February 6, 2008.
  • 26
    SPA, Inc. Systems Planning and Analysis, Inc.'s General Campaign Analysis Model (GCAM). Available at:, Accessed on February 6, 2008.