Nature plays with dice – terrorists do not: Allocating resources to counter strategic versus probabilistic risks
Tài liệu tham khảo
Apostolakis, 2005, A screening methodology for identification and ranking of infrastructure vulnerabilities due to terrorism, Risk Analysis, 25, 361, 10.1111/j.1539-6924.2005.00595.x
M. Baveja, L.M. Wein, An effective two-finger, two-stage biometric startegy for the US-VISIT program, Working paper, Graduate School of Business, Stanford University, 2006.
V.M. Bier, Should the model for security be game theory rather than reliability theory, Communications of the Fourth International Conference on Mathematical Methods in Reliability: Methodology and Practice, Santa Fe, New Mexico, 2004.
Brown, 2006, Defending critical infrastructure, Interfaces, 36, 530, 10.1287/inte.1060.0252
A. Brunet, Grant funding to state and local governments and systematic assessment of vulnerability. CREATE Report 05-018. Center for Risk and Economic Analysis of Terrorism Events, University of Southern California, Los Angeles, California, 2005.
Coughlin, 1992, Pure strategy equilibria in a class of systems defence games, International Journal of Game Theory, 20, 195, 10.1007/BF01253775
Department of Homeland Security, FY2006 Homeland Security Grant Program, Program Guidelines and Application Kit, December 2005.
Harris, 2004, Mathematical methods in combatting terrorism, Risk Analysis, 24, 985, 10.1111/j.0272-4332.2004.00501.x
Kaplan, 1998, Allocating HIV prevention resources, Socio-Economic Planning Sciences, 32, 257, 10.1016/S0038-0121(98)00002-0
E. Kardes, R. Halls, Survey of the literature on strategic decision making in the presence of adversaries, unpublished manuscript, 2005.
Kuno, 1991, A linear-time algorithm for solving continuous maximum knapsack problems, Operations Research Letters, 10, 23, 10.1016/0167-6377(91)90082-Z
Leung, 2004, A risk-based approach to setting priorities in protecting bridges against terrorist attacks, Risk Analysis, 24, 963, 10.1111/j.0272-4332.2004.00500.x
National Commission on Terrorist Attacks, The 9/11 Commission Report, Norton, New York, 2004.
Osborne, 1994
S. Reese, Risk-Based Funding in Holmeland Security Grant Legislation: Analysis of Issues for the 109th Congress, CRS Report (Order Code: RL33050), 2005.
Rockafellar, 1970
Rosenblatt, 1994, Optimality of cut/expand across the board’ rule for constrained optimization problems with an application to an inventory model, IIE Transactions, 26, 102, 10.1080/07408179408966601
Sandler, 2003, Terrorism and game theory, Simulation and Gaming, 34, 319, 10.1177/1046878103255492
Sarewitz, 2003, Vulnerability and risk: some thoughts from a political and policy perspective, Risk Analysis, 23, 805, 10.1111/1539-6924.00357
Shubik, 1982
M. Shubik, R. Weber, Competitive valuation of cooperative games, Discussion Paper No. 482, Cowles Foundation For Research in Economics, Yale University, 1978.
Shubik, 1981, Systems defense games: Colonel Blotto, command and control, Naval Research Logistics Quarterly, 28, 281, 10.1002/nav.3800280210
Von Neumann, 1944
Wein, 2005, Using fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indication Technology Program, Proceedings of the National Academy of Sciences, 1020, 7772, 10.1073/pnas.0407496102