相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Analytical method to identify the number of containers to inspect at US ports to deter terrorist attacks
Vicki M. Bier et al.
ANNALS OF OPERATIONS RESEARCH (2011)
Modeling Arbitrary Layers of Continuous-Level Defenses in Facing with Strategic Attackers
Mohsen Golalikhani et al.
RISK ANALYSIS (2011)
A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management
Jason Merrick et al.
RISK ANALYSIS (2011)
SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI-TERRORISM RESOURCE ALLOCATION
Jun Zhuang et al.
DEFENCE AND PEACE ECONOMICS (2011)
Modeling secrecy and deception in a multiple-period attacker-defender signaling game
Jun Zhuang et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2010)
Confronting Entrenched Insurgents
Edward H. Kaplan et al.
OPERATIONS RESEARCH (2010)
Resource Distribution in Multiple Attacks Against a Single Target
Gregory Levitin et al.
RISK ANALYSIS (2010)
Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model
Gregory S. Parnell et al.
RISK ANALYSIS (2010)
Probabilistic Risk Analysis and Terrorism Risk
Barry Charles Ezell et al.
RISK ANALYSIS (2010)
IMPACTS OF SUBSIDIZED SECURITY ON STABILITY AND TOTAL SOCIAL COSTS OF EQUILIBRIUM SOLUTIONS IN AN N-PLAYER GAME WITH ERRORS
Jun Zhuang
ENGINEERING ECONOMIST (2010)
False targets efficiency in defense strategy
Gregory Levitin et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2009)
Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks
Boaz Golany et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2009)
Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts
Gregory Levitin et al.
IEEE TRANSACTIONS ON RELIABILITY (2009)
Adversarial Risk Analysis
Insua Rios Insua et al.
JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION (2009)
The Elephant in the Room Is Called Game Theory
John R. Hall
RISK ANALYSIS (2009)
Game Theory and Risk Analysis
Louis Anthony (Tony) Cox
RISK ANALYSIS (2009)
Optimal resource allocation for defense of targets based on differing measures of attractiveness
Vicki M. Bier et al.
RISK ANALYSIS (2008)
Balancing terrorism and natural disasters - Defensive strategy with endogenous attacker effort
Jun Zhuang et al.
OPERATIONS RESEARCH (2007)
Choosing what to protect: Strategic defensive allocation against an unknown attacker
Vicki Bier et al.
JOURNAL OF PUBLIC ECONOMIC THEORY (2007)
Defending against terrorist attacks with limited resources
Robert Powell
AMERICAN POLITICAL SCIENCE REVIEW (2007)
Modeling values for anti-terrorism analysis
Ralph L. Keeney
RISK ANALYSIS (2007)
Robust game theory
M Aghassi et al.
MATHEMATICAL PROGRAMMING (2006)
A robust optimization approach to inventory theory
D Bertsimas et al.
OPERATIONS RESEARCH (2006)
Mathematical methods in combatting terrorism
B Harris
RISK ANALYSIS (2004)
Robust discrete optimization and network flows
D Bertsimas et al.
MATHEMATICAL PROGRAMMING (2003)
Robust convex quadratically constrained programs
D Goldfarb et al.
MATHEMATICAL PROGRAMMING (2003)
Probabilistic risk analysis and game theory
K Hausken
RISK ANALYSIS (2002)