Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Blattman, Chris
and
Miguel, Edward
2009.
Civil War.
SSRN Electronic Journal,
Levitin, G.
and
Hausken, K.
2009.
Redundancy vs. Protection vs. False Targets for Systems Under Attack.
IEEE Transactions on Reliability,
Vol. 58,
Issue. 1,
p.
58.
Helfstein, Scott
2009.
Governance of Terror: New Institutionalism and the Evolution of Terrorist Organizations.
Public Administration Review,
Vol. 69,
Issue. 4,
p.
727.
Levitin, Gregory
and
Hausken, Kjell
2009.
Intelligence and impact contests in systems with redundancy, false targets, and partial protection.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 12,
p.
1927.
Levitin, Gregory
and
Hausken, Kjell
2009.
False targets vs. redundancy in homogeneous parallel systems.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 2,
p.
588.
Rios Insua, David
Rios, Jesus
and
Banks, David
2009.
Adversarial Risk Analysis.
Journal of the American Statistical Association,
Vol. 104,
Issue. 486,
p.
841.
Hausken, Kjell
2010.
Defense and attack of complex and dependent systems.
Reliability Engineering & System Safety,
Vol. 95,
Issue. 1,
p.
29.
Zhuang, Jun
Bier, Vicki M.
and
Alagoz, Oguzhan
2010.
Modeling secrecy and deception in a multiple-period attacker–defender signaling game.
European Journal of Operational Research,
Vol. 203,
Issue. 2,
p.
409.
Lee, Sanghoon
2010.
Dynamic Inconsistency in Counterterrorism.
Conflict Management and Peace Science,
Vol. 27,
Issue. 4,
p.
369.
Peng, R.
Levitin, G.
Xie, M.
and
Ng, S.H.
2010.
Defending simple series and parallel systems with imperfect false targets.
Reliability Engineering & System Safety,
Vol. 95,
Issue. 6,
p.
679.
Jenelius, Erik
Westin, Jonas
and
Holmgren, Åke J.
2010.
Critical infrastructure protection under imperfect attacker perception.
International Journal of Critical Infrastructure Protection,
Vol. 3,
Issue. 1,
p.
16.
Zhuang, Jun
and
Bier, Vicki M.
2010.
Reasons for Secrecy and Deception in Homeland-Security Resource Allocation.
Risk Analysis,
Vol. 30,
Issue. 12,
p.
1737.
Zhuang, Jun
and
Bier, Vicki M.
2011.
SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION.
Defence and Peace Economics,
Vol. 22,
Issue. 1,
p.
43.
Peng, R
Levitin, G
Xie, M
and
Ng, S H
2011.
Optimal defence of single object with imperfect false targets.
Journal of the Operational Research Society,
Vol. 62,
Issue. 1,
p.
134.
DRAGU, TIBERIU
2011.
Is There a Trade-off between Security and Liberty? Executive Bias, Privacy Protections, and Terrorism Prevention.
American Political Science Review,
Vol. 105,
Issue. 1,
p.
64.
Yoshida, Mamoru
and
Kobayashi, Kiyoshi
2011.
Disclosure strategy for critical infrastructure under common knowledge of ‘naive government’.
p.
3463.
Hausken, Kjell
2011.
Protecting complex infrastructures against multiple strategic attackers.
International Journal of Systems Science,
Vol. 42,
Issue. 1,
p.
11.
Wang, Chen
and
Bier, Vicki M.
2011.
Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility.
Decision Analysis,
Vol. 8,
Issue. 4,
p.
286.
YOSHIDA, Mamoru
and
KOBAYASHI, Kiyoshi
2011.
RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES.
Journal of Japan Society of Civil Engineers, Ser. D3 (Infrastructure Planning and Management),
Vol. 67,
Issue. 4,
p.
510.
Rios, Jesus
and
Insua, David Rios
2012.
Adversarial Risk Analysis for Counterterrorism Modeling.
Risk Analysis,
Vol. 32,
Issue. 5,
p.
894.
Comments
No Comments have been published for this article.