My bibliography
Save this item
Probabilistic Risk Analysis and Terrorism Risk
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
- Christopher W. Karvetski & David R. Mandel & Daniel Irwin, 2020. "Improving Probability Judgment in Intelligence Analysis: From Structured Analysis to Statistical Aggregation," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1040-1057, May.
- David L. Alderson & Gerald G. Brown & W. Matthew Carlyle, 2015. "Operational Models of Infrastructure Resilience," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 562-586, April.
- Edouard Kujawski, 2016. "A Probabilistic Game‐Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems," Systems Engineering, John Wiley & Sons, vol. 19(6), pages 549-566, November.
- Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
- Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
- Jiaqi Ren & Jin Liu & Yibo Dong & Zhe Li & Weili Li, 2024. "NIGA: A Novel Method for Investigating the Attacker–Defender Model within Critical Infrastructure Networks," Mathematics, MDPI, vol. 12(16), pages 1-24, August.
- Ryan J. B. Garcia & Detlof von Winterfeldt, 2016. "Defender–Attacker Decision Tree Analysis to Combat Terrorism," Risk Analysis, John Wiley & Sons, vol. 36(12), pages 2258-2271, December.
- Mark G. Stewart & John Mueller, 2013. "Terrorism Risks and Cost‐Benefit Analysis of Aviation Security," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 893-908, May.
- White, Richard & Boult, Terrance & Chow, Edward, 2014. "A computational asset vulnerability model for the strategic protection of the critical infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(3), pages 167-177.
- Yanling Chang & Alan Erera & Chelsea White, 2015. "Value of information for a leader–follower partially observed Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 129-153, December.
- E. S. Levine, 2012. "Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 294-303, February.
- David J. Caswell & Ronald A. Howard & M. Elisabeth Paté-Cornell, 2011. "Analysis of National Strategies to Counter a Country's Nuclear Weapons Program," Decision Analysis, INFORMS, vol. 8(1), pages 30-45, March.
- Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
- Zhongbei Li & Xiangchun Li & Chen Dong & Fanfan Guo & Fan Zhang & Qi Zhang, 2021. "Quantitative Analysis of Global Terrorist Attacks Based on the Global Terrorism Database," Sustainability, MDPI, vol. 13(14), pages 1-19, July.
- Laobing Zhang & Genserik Reniers, 2016. "A Game‐Theoretical Model to Improve Process Plant Protection from Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 36(12), pages 2285-2297, December.
- William M. Kroshl & Shahram Sarkani & Thomas A Mazzuchi, 2015. "Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent‐Based Simulation," Risk Analysis, John Wiley & Sons, vol. 35(9), pages 1690-1705, September.
- Robin L. Dillon & William J. Burns & Richard S. John, 2018. "Insights for Critical Alarm-Based Warning Systems from a Risk Analysis of Commercial Aviation Passenger Screening," Decision Analysis, INFORMS, vol. 15(3), pages 154-173, September.
- Michael R. Greenberg & Karen Lowrie & Henry Mayer & Tayfur Altiok, 2011. "Risk‐Based Decision Support Tools: Protecting Rail‐Centered Transit Corridors from Cascading Effects," Risk Analysis, John Wiley & Sons, vol. 31(12), pages 1849-1858, December.
- Rongchen Zhu & Xiaofeng Hu & Xin Li & Han Ye & Nan Jia, 2020. "Modeling and Risk Analysis of Chemical Terrorist Attacks: A Bayesian Network Method," IJERPH, MDPI, vol. 17(6), pages 1-23, March.
- Johannes G. Jaspersen & Gilberto Montibeller, 2015. "Probability Elicitation Under Severe Time Pressure: A Rank‐Based Method," Risk Analysis, John Wiley & Sons, vol. 35(7), pages 1317-1335, July.
- John Hamer Powell & Michael Hammond & Albert Chen & Navonil Mustafee, 2018. "Human Agency in Disaster Planning: A Systems Approach," Risk Analysis, John Wiley & Sons, vol. 38(7), pages 1422-1443, July.
- Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
- L. Elbakidze & Y. H. Jin, 2015. "Are Economic Development and Education Improvement Associated with Participation in Transnational Terrorism?," Risk Analysis, John Wiley & Sons, vol. 35(8), pages 1520-1535, August.
- Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
- Barry Ezell & Andrew Collins, 2011. "Letter to the Editor," Risk Analysis, John Wiley & Sons, vol. 31(2), pages 192-192, February.
- Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
- Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
- Jonathan B. Wiener, 2020. "Learning to Manage the Multirisk World," Risk Analysis, John Wiley & Sons, vol. 40(S1), pages 2137-2143, November.
- Tsvetan Tsvetkov, 2013. "Economic Aspects of Terrorism and Tools for Their Research," Economic Alternatives, University of National and World Economy, Sofia, Bulgaria, issue 1, pages 20-34, Janyary.
- G. Quijano, Eduardo & RÃos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
- Robin L. Dillon & Genevieve Lester & Richard S. John & Catherine H. Tinsley, 2012. "Differentiating Conflicts in Beliefs Versus Value Tradeoffs in the Domestic Intelligence Policy Debate," Risk Analysis, John Wiley & Sons, vol. 32(4), pages 713-728, April.
- Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.