Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Levitin, Gregory
and
Hausken, Kjell
2009.
Intelligence and impact contests in systems with redundancy, false targets, and partial protection.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 12,
p.
1927.
Levitin, G.
and
Hausken, K.
2009.
Redundancy vs. Protection vs. False Targets for Systems Under Attack.
IEEE Transactions on Reliability,
Vol. 58,
Issue. 1,
p.
58.
Levitin, Gregory
and
Hausken, Kjell
2009.
False targets vs. redundancy in homogeneous parallel systems.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 2,
p.
588.
Helfstein, Scott
2009.
Governance of Terror: New Institutionalism and the Evolution of Terrorist Organizations.
Public Administration Review,
Vol. 69,
Issue. 4,
p.
727.
Rios Insua, David
Rios, Jesus
and
Banks, David
2009.
Adversarial Risk Analysis.
Journal of the American Statistical Association,
Vol. 104,
Issue. 486,
p.
841.
Blattman, Chris
and
Miguel, Edward
2009.
Civil War.
SSRN Electronic Journal,
Peng, R.
Levitin, G.
Xie, M.
and
Ng, S.H.
2010.
Defending simple series and parallel systems with imperfect false targets.
Reliability Engineering & System Safety,
Vol. 95,
Issue. 6,
p.
679.
Zhuang, Jun
and
Bier, Vicki M.
2010.
Reasons for Secrecy and Deception in Homeland-Security Resource Allocation.
Risk Analysis,
Vol. 30,
Issue. 12,
p.
1737.
Hausken, Kjell
2010.
Defense and attack of complex and dependent systems.
Reliability Engineering & System Safety,
Vol. 95,
Issue. 1,
p.
29.
Zhuang, Jun
Bier, Vicki M.
and
Alagoz, Oguzhan
2010.
Modeling secrecy and deception in a multiple-period attacker–defender signaling game.
European Journal of Operational Research,
Vol. 203,
Issue. 2,
p.
409.
Lee, Sanghoon
2010.
Dynamic Inconsistency in Counterterrorism.
Conflict Management and Peace Science,
Vol. 27,
Issue. 4,
p.
369.
Jenelius, Erik
Westin, Jonas
and
Holmgren, Åke J.
2010.
Critical infrastructure protection under imperfect attacker perception.
International Journal of Critical Infrastructure Protection,
Vol. 3,
Issue. 1,
p.
16.
Yoshida, Mamoru
and
Kobayashi, Kiyoshi
2011.
Disclosure strategy for critical infrastructure under common knowledge of ‘naive government’.
p.
3463.
Hausken, Kjell
2011.
Protecting complex infrastructures against multiple strategic attackers.
International Journal of Systems Science,
Vol. 42,
Issue. 1,
p.
11.
Peng, R
Levitin, G
Xie, M
and
Ng, S H
2011.
Optimal defence of single object with imperfect false targets.
Journal of the Operational Research Society,
Vol. 62,
Issue. 1,
p.
134.
Zhuang, Jun
and
Bier, Vicki M.
2011.
SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION.
Defence and Peace Economics,
Vol. 22,
Issue. 1,
p.
43.
DRAGU, TIBERIU
2011.
Is There a Trade-off between Security and Liberty? Executive Bias, Privacy Protections, and Terrorism Prevention.
American Political Science Review,
Vol. 105,
Issue. 1,
p.
64.
Wang, Chen
and
Bier, Vicki M.
2011.
Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility.
Decision Analysis,
Vol. 8,
Issue. 4,
p.
286.
YOSHIDA, Mamoru
and
KOBAYASHI, Kiyoshi
2011.
RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES.
Journal of Japan Society of Civil Engineers, Ser. D3 (Infrastructure Planning and Management),
Vol. 67,
Issue. 4,
p.
510.
Denter, Philipp
and
Sisak, Dana
2012.
The Fragility of Deterrence in Conflicts.
SSRN Electronic Journal,
Comments
No Comments have been published for this article.