Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Bueno de Mesquita, Ethan
and
Dickson, Eric S.
2007.
The Propaganda of the Deed: Terrorism, Counterterrorism, and Mobilization.
American Journal of Political Science,
Vol. 51,
Issue. 2,
p.
364.
Sandler, Todd
and
Arce, Daniel G.
2007.
Handbook of Defense Economics - Defense in a Globalized World.
Vol. 2,
Issue. ,
p.
775.
Melese, Francois
2009.
Mathematical Methods in Counterterrorism.
p.
319.
Sandler, Todd
and
Siqueira, Kevin
2009.
Games and Terrorism.
Simulation & Gaming,
Vol. 40,
Issue. 2,
p.
164.
Levitin, Gregory
and
Hausken, Kjell
2009.
False targets vs. redundancy in homogeneous parallel systems.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 2,
p.
588.
Arce, Daniel G.
and
Sandler, Todd
2009.
Mathematical Methods in Counterterrorism.
p.
333.
Levitin, G.
and
Hausken, K.
2009.
Redundancy vs. Protection vs. False Targets for Systems Under Attack.
IEEE Transactions on Reliability,
Vol. 58,
Issue. 1,
p.
58.
Levitin, Gregory
and
Hausken, Kjell
2009.
Intelligence and impact contests in systems with redundancy, false targets, and partial protection.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 12,
p.
1927.
Wang, Chen
and
Bier, Vicki M.
2009.
Impact of intelligence on target-hardening decisions.
p.
373.
Rios Insua, David
Rios, Jesus
and
Banks, David
2009.
Adversarial Risk Analysis.
Journal of the American Statistical Association,
Vol. 104,
Issue. 486,
p.
841.
Sandler, Todd
2010.
Terrorism and Policy: Introduction.
Journal of Conflict Resolution,
Vol. 54,
Issue. 2,
p.
203.
Arce, Daniel G.
and
Sandler, Todd
2010.
Terrorist Spectaculars: Backlash Attacks and the Focus of Intelligence.
Journal of Conflict Resolution,
Vol. 54,
Issue. 2,
p.
354.
Yoshida, Mamoru
and
Kobayashi, Kiyoshi
2010.
Disclosure strategies for critical infrastructure against terror attacks.
p.
3194.
Bapat, Navin A
2011.
Transnational terrorism, US military aid, and the incentive to misrepresent.
Journal of Peace Research,
Vol. 48,
Issue. 3,
p.
303.
Yoshida, Mamoru
and
Kobayashi, Kiyoshi
2011.
Disclosure strategy for critical infrastructure under common knowledge of ‘naive government’.
p.
3463.
Abrahms, Max
2011.
Does Terrorism Really Work? Evolution in the Conventional Wisdom since 9/11.
Defence and Peace Economics,
Vol. 22,
Issue. 6,
p.
583.
Wang, Shouqiang
and
Banks, David
2011.
Network routing for insurgency: An adversarial risk analysis framework.
Naval Research Logistics (NRL),
Vol. 58,
Issue. 6,
p.
595.
Hausken, Kjell
2011.
Protecting complex infrastructures against multiple strategic attackers.
International Journal of Systems Science,
Vol. 42,
Issue. 1,
p.
11.
Phillips, Peter J.
2011.
Terrorist Network Infiltration, Asymmetric Information, and Quality Uncertainty.
Journal of Applied Security Research,
Vol. 6,
Issue. 3,
p.
339.
Bapat, Navin A.
2011.
Terrorism, democratization, and US foreign policy.
Public Choice,
Vol. 149,
Issue. 3-4,
p.
315.