Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Lakdawalla, Darius
and
Talley, Eric L.
2005.
Optimal Liability for Terrorism.
SSRN Electronic Journal,
Zhuang, Jun
and
Bier, Vicki M.
2007.
Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort.
Operations Research,
Vol. 55,
Issue. 5,
p.
976.
Shapiro, Jacob N.
and
Cohen, Dara Kay
2007.
Color Bind: Lessons from the Failed Homeland Security Advisory System.
International Security,
Vol. 32,
Issue. 2,
p.
121.
POWELL, ROBERT
2007.
Allocating Defensive Resources with Private Information about Vulnerability.
American Political Science Review,
Vol. 101,
Issue. 4,
p.
799.
Bier, Vicki M.
2008.
Encyclopedia of Quantitative Risk Analysis and Assessment.
Roberts, Patrick
2009.
Jihadists and Weapons of Mass Destruction.
p.
309.
Wang, Chen
and
Bier, Vicki M.
2009.
Impact of intelligence on target-hardening decisions.
p.
373.
Levitin, G.
and
Hausken, K.
2009.
Redundancy vs. Protection vs. False Targets for Systems Under Attack.
IEEE Transactions on Reliability,
Vol. 58,
Issue. 1,
p.
58.
Levitin, Gregory
and
Hausken, Kjell
2009.
Intelligence and impact contests in systems with redundancy, false targets, and partial protection.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 12,
p.
1927.
Levitin, Gregory
and
Hausken, Kjell
2009.
False targets vs. redundancy in homogeneous parallel systems.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 2,
p.
588.
Sandler, Todd
and
Siqueira, Kevin
2009.
Games and Terrorism.
Simulation & Gaming,
Vol. 40,
Issue. 2,
p.
164.
Powell, Robert
2009.
Sequential, nonzero-sum “Blotto”: Allocating defensive resources prior to attack.
Games and Economic Behavior,
Vol. 67,
Issue. 2,
p.
611.
Helfstein, Scott
2009.
Governance of Terror: New Institutionalism and the Evolution of Terrorist Organizations.
Public Administration Review,
Vol. 69,
Issue. 4,
p.
727.
Watson, Jean-Paul
Murray, Regan
and
Hart, William E.
2009.
Formulation and Optimization of Robust Sensor Placement Problems for Drinking Water Contamination Warning Systems.
Journal of Infrastructure Systems,
Vol. 15,
Issue. 4,
p.
330.
Pinker, Edieal J.
2009.
Mathematical Methods in Counterterrorism.
p.
141.
JINDAPON, PAAN
and
NEILSON, WILLIAM S.
2009.
THE IMPACT OF SOCIETAL RISK ATTITUDES ON TERRORISM AND COUNTERTERRORISM.
Economics & Politics,
Vol. 21,
Issue. 3,
p.
433.
Yin, Xia
Dong, Zhaoyang
and
Zhang, Pei
2010.
Emerging Techniques in Power System Analysis.
p.
23.
PLÜMPER, THOMAS
and
NEUMAYER, ERIC
2010.
The friend of my enemy is my enemy: International alliances and international terrorism.
European Journal of Political Research,
Vol. 49,
Issue. 1,
p.
75.
Sandler, Todd
2010.
Terrorism and Policy: Introduction.
Journal of Conflict Resolution,
Vol. 54,
Issue. 2,
p.
203.
Jenelius, Erik
Westin, Jonas
and
Holmgren, Åke J.
2010.
Critical infrastructure protection under imperfect attacker perception.
International Journal of Critical Infrastructure Protection,
Vol. 3,
Issue. 1,
p.
16.
Comments
No Comments have been published for this article.