Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Lakdawalla, Darius
and
Talley, Eric L.
2005.
Optimal Liability for Terrorism.
SSRN Electronic Journal,
POWELL, ROBERT
2007.
Allocating Defensive Resources with Private Information about Vulnerability.
American Political Science Review,
Vol. 101,
Issue. 4,
p.
799.
Zhuang, Jun
and
Bier, Vicki M.
2007.
Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort.
Operations Research,
Vol. 55,
Issue. 5,
p.
976.
Shapiro, Jacob N.
and
Cohen, Dara Kay
2007.
Color Bind: Lessons from the Failed Homeland Security Advisory System.
International Security,
Vol. 32,
Issue. 2,
p.
121.
Bier, Vicki M.
2008.
Encyclopedia of Quantitative Risk Analysis and Assessment.
Levitin, G.
and
Hausken, K.
2009.
Redundancy vs. Protection vs. False Targets for Systems Under Attack.
IEEE Transactions on Reliability,
Vol. 58,
Issue. 1,
p.
58.
Helfstein, Scott
2009.
Governance of Terror: New Institutionalism and the Evolution of Terrorist Organizations.
Public Administration Review,
Vol. 69,
Issue. 4,
p.
727.
Levitin, Gregory
and
Hausken, Kjell
2009.
Intelligence and impact contests in systems with redundancy, false targets, and partial protection.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 12,
p.
1927.
JINDAPON, PAAN
and
NEILSON, WILLIAM S.
2009.
THE IMPACT OF SOCIETAL RISK ATTITUDES ON TERRORISM AND COUNTERTERRORISM.
Economics & Politics,
Vol. 21,
Issue. 3,
p.
433.
Pinker, Edieal J.
2009.
Mathematical Methods in Counterterrorism.
p.
141.
Wang, Chen
and
Bier, Vicki M.
2009.
Impact of intelligence on target-hardening decisions.
p.
373.
Levitin, Gregory
and
Hausken, Kjell
2009.
False targets vs. redundancy in homogeneous parallel systems.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 2,
p.
588.
Roberts, Patrick
2009.
Jihadists and Weapons of Mass Destruction.
p.
309.
Sandler, Todd
and
Siqueira, Kevin
2009.
Games and Terrorism.
Simulation & Gaming,
Vol. 40,
Issue. 2,
p.
164.
Watson, Jean-Paul
Murray, Regan
and
Hart, William E.
2009.
Formulation and Optimization of Robust Sensor Placement Problems for Drinking Water Contamination Warning Systems.
Journal of Infrastructure Systems,
Vol. 15,
Issue. 4,
p.
330.
Powell, Robert
2009.
Sequential, nonzero-sum “Blotto”: Allocating defensive resources prior to attack.
Games and Economic Behavior,
Vol. 67,
Issue. 2,
p.
611.
Mead, Lawrence M.
2010.
Scholasticism in Political Science.
Perspectives on Politics,
Vol. 8,
Issue. 2,
p.
453.
Yin, Xia
Dong, Zhaoyang
and
Zhang, Pei
2010.
Emerging Techniques in Power System Analysis.
p.
23.
Sandler, Todd
2010.
Terrorism and Policy: Introduction.
Journal of Conflict Resolution,
Vol. 54,
Issue. 2,
p.
203.
Peng, R.
Levitin, G.
Xie, M.
and
Ng, S.H.
2010.
Defending simple series and parallel systems with imperfect false targets.
Reliability Engineering & System Safety,
Vol. 95,
Issue. 6,
p.
679.
Comments
No Comments have been published for this article.