Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Lakdawalla, Darius
and
Talley, Eric L.
2005.
Optimal Liability for Terrorism.
SSRN Electronic Journal,
POWELL, ROBERT
2007.
Allocating Defensive Resources with Private Information about Vulnerability.
American Political Science Review,
Vol. 101,
Issue. 4,
p.
799.
Zhuang, Jun
and
Bier, Vicki M.
2007.
Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort.
Operations Research,
Vol. 55,
Issue. 5,
p.
976.
Shapiro, Jacob N.
and
Cohen, Dara Kay
2007.
Color Bind: Lessons from the Failed Homeland Security Advisory System.
International Security,
Vol. 32,
Issue. 2,
p.
121.
Bier, Vicki M.
2008.
Encyclopedia of Quantitative Risk Analysis and Assessment.
Wang, Chen
and
Bier, Vicki M.
2009.
Impact of intelligence on target-hardening decisions.
p.
373.
Levitin, Gregory
and
Hausken, Kjell
2009.
False targets vs. redundancy in homogeneous parallel systems.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 2,
p.
588.
Levitin, Gregory
and
Hausken, Kjell
2009.
Intelligence and impact contests in systems with redundancy, false targets, and partial protection.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 12,
p.
1927.
JINDAPON, PAAN
and
NEILSON, WILLIAM S.
2009.
THE IMPACT OF SOCIETAL RISK ATTITUDES ON TERRORISM AND COUNTERTERRORISM.
Economics & Politics,
Vol. 21,
Issue. 3,
p.
433.
Watson, Jean-Paul
Murray, Regan
and
Hart, William E.
2009.
Formulation and Optimization of Robust Sensor Placement Problems for Drinking Water Contamination Warning Systems.
Journal of Infrastructure Systems,
Vol. 15,
Issue. 4,
p.
330.
Helfstein, Scott
2009.
Governance of Terror: New Institutionalism and the Evolution of Terrorist Organizations.
Public Administration Review,
Vol. 69,
Issue. 4,
p.
727.
Roberts, Patrick
2009.
Jihadists and Weapons of Mass Destruction.
p.
309.
Powell, Robert
2009.
Sequential, nonzero-sum “Blotto”: Allocating defensive resources prior to attack.
Games and Economic Behavior,
Vol. 67,
Issue. 2,
p.
611.
Pinker, Edieal J.
2009.
Mathematical Methods in Counterterrorism.
p.
141.
Sandler, Todd
and
Siqueira, Kevin
2009.
Games and Terrorism.
Simulation & Gaming,
Vol. 40,
Issue. 2,
p.
164.
Levitin, G.
and
Hausken, K.
2009.
Redundancy vs. Protection vs. False Targets for Systems Under Attack.
IEEE Transactions on Reliability,
Vol. 58,
Issue. 1,
p.
58.
Mead, Lawrence M.
2010.
Scholasticism in Political Science.
Perspectives on Politics,
Vol. 8,
Issue. 2,
p.
453.
Peng, R.
Levitin, G.
Xie, M.
and
Ng, S.H.
2010.
Defending simple series and parallel systems with imperfect false targets.
Reliability Engineering & System Safety,
Vol. 95,
Issue. 6,
p.
679.
Bandyopadhyay, Subhayu
Sandler, Todd M.
and
Younas, Javed
2010.
Foreign Aid as Counterterrorism Policy.
SSRN Electronic Journal,
Garrido, Rodrigo A.
2010.
Security and Environmental Sustainability of Multimodal Transport.
p.
149.
Comments
No Comments have been published for this article.