4.6 Article

Robust Allocation of a Defensive Budget Considering an Attacker's Private Information

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Operations Research & Management Science

Analytical method to identify the number of containers to inspect at US ports to deter terrorist attacks

Vicki M. Bier et al.

ANNALS OF OPERATIONS RESEARCH (2011)

Article Public, Environmental & Occupational Health

Modeling Arbitrary Layers of Continuous-Level Defenses in Facing with Strategic Attackers

Mohsen Golalikhani et al.

RISK ANALYSIS (2011)

Article Public, Environmental & Occupational Health

A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management

Jason Merrick et al.

RISK ANALYSIS (2011)

Article Management

Modeling secrecy and deception in a multiple-period attacker-defender signaling game

Jun Zhuang et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2010)

Article Management

Confronting Entrenched Insurgents

Edward H. Kaplan et al.

OPERATIONS RESEARCH (2010)

Article Public, Environmental & Occupational Health

Resource Distribution in Multiple Attacks Against a Single Target

Gregory Levitin et al.

RISK ANALYSIS (2010)

Article Public, Environmental & Occupational Health

Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model

Gregory S. Parnell et al.

RISK ANALYSIS (2010)

Article Public, Environmental & Occupational Health

Probabilistic Risk Analysis and Terrorism Risk

Barry Charles Ezell et al.

RISK ANALYSIS (2010)

Article Management

False targets efficiency in defense strategy

Gregory Levitin et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2009)

Article Computer Science, Hardware & Architecture

Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts

Gregory Levitin et al.

IEEE TRANSACTIONS ON RELIABILITY (2009)

Article Statistics & Probability

Adversarial Risk Analysis

Insua Rios Insua et al.

JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION (2009)

Letter Public, Environmental & Occupational Health

The Elephant in the Room Is Called Game Theory

John R. Hall

RISK ANALYSIS (2009)

Article Public, Environmental & Occupational Health

Game Theory and Risk Analysis

Louis Anthony (Tony) Cox

RISK ANALYSIS (2009)

Article Public, Environmental & Occupational Health

Optimal resource allocation for defense of targets based on differing measures of attractiveness

Vicki M. Bier et al.

RISK ANALYSIS (2008)

Article Economics

Choosing what to protect: Strategic defensive allocation against an unknown attacker

Vicki Bier et al.

JOURNAL OF PUBLIC ECONOMIC THEORY (2007)

Article Political Science

Defending against terrorist attacks with limited resources

Robert Powell

AMERICAN POLITICAL SCIENCE REVIEW (2007)

Article Public, Environmental & Occupational Health

Modeling values for anti-terrorism analysis

Ralph L. Keeney

RISK ANALYSIS (2007)

Article Management

Defending critical infrastructure

Gerald Brown et al.

INTERFACES (2006)

Article Economics

The Colonel Blotto game

Brian Roberson

ECONOMIC THEORY (2006)

Article Computer Science, Software Engineering

Robust game theory

M Aghassi et al.

MATHEMATICAL PROGRAMMING (2006)

Article Management

A robust optimization approach to inventory theory

D Bertsimas et al.

OPERATIONS RESEARCH (2006)

Article Economics

The investment problem in terrorism

KA Konrad

ECONOMICA (2004)

Article Public, Environmental & Occupational Health

Mathematical methods in combatting terrorism

B Harris

RISK ANALYSIS (2004)

Article Management

The price of robustness

D Bertsimas et al.

OPERATIONS RESEARCH (2004)

Article Computer Science, Software Engineering

Robust discrete optimization and network flows

D Bertsimas et al.

MATHEMATICAL PROGRAMMING (2003)

Article Computer Science, Software Engineering

Robust convex quadratically constrained programs

D Goldfarb et al.

MATHEMATICAL PROGRAMMING (2003)

Article Public, Environmental & Occupational Health

Probabilistic risk analysis and game theory

K Hausken

RISK ANALYSIS (2002)