Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Levitin, Gregory
and
Hausken, Kjell
2009.
False targets vs. redundancy in homogeneous parallel systems.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 2,
p.
588.
Levitin, Gregory
and
Hausken, Kjell
2009.
Intelligence and impact contests in systems with redundancy, false targets, and partial protection.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 12,
p.
1927.
Blattman, Chris
and
Miguel, Edward
2009.
Civil War.
SSRN Electronic Journal,
Levitin, G.
and
Hausken, K.
2009.
Redundancy vs. Protection vs. False Targets for Systems Under Attack.
IEEE Transactions on Reliability,
Vol. 58,
Issue. 1,
p.
58.
Helfstein, Scott
2009.
Governance of Terror: New Institutionalism and the Evolution of Terrorist Organizations.
Public Administration Review,
Vol. 69,
Issue. 4,
p.
727.
Rios Insua, David
Rios, Jesus
and
Banks, David
2009.
Adversarial Risk Analysis.
Journal of the American Statistical Association,
Vol. 104,
Issue. 486,
p.
841.
Zhuang, Jun
and
Bier, Vicki M.
2010.
Reasons for Secrecy and Deception in Homeland-Security Resource Allocation.
Risk Analysis,
Vol. 30,
Issue. 12,
p.
1737.
Zhuang, Jun
Bier, Vicki M.
and
Alagoz, Oguzhan
2010.
Modeling secrecy and deception in a multiple-period attacker–defender signaling game.
European Journal of Operational Research,
Vol. 203,
Issue. 2,
p.
409.
Hausken, Kjell
2010.
Defense and attack of complex and dependent systems.
Reliability Engineering & System Safety,
Vol. 95,
Issue. 1,
p.
29.
Jenelius, Erik
Westin, Jonas
and
Holmgren, Åke J.
2010.
Critical infrastructure protection under imperfect attacker perception.
International Journal of Critical Infrastructure Protection,
Vol. 3,
Issue. 1,
p.
16.
Peng, R.
Levitin, G.
Xie, M.
and
Ng, S.H.
2010.
Defending simple series and parallel systems with imperfect false targets.
Reliability Engineering & System Safety,
Vol. 95,
Issue. 6,
p.
679.
Lee, Sanghoon
2010.
Dynamic Inconsistency in Counterterrorism.
Conflict Management and Peace Science,
Vol. 27,
Issue. 4,
p.
369.
Yoshida, Mamoru
and
Kobayashi, Kiyoshi
2011.
Disclosure strategy for critical infrastructure under common knowledge of ‘naive government’.
p.
3463.
Zhuang, Jun
and
Bier, Vicki M.
2011.
SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION.
Defence and Peace Economics,
Vol. 22,
Issue. 1,
p.
43.
Hausken, Kjell
2011.
Protecting complex infrastructures against multiple strategic attackers.
International Journal of Systems Science,
Vol. 42,
Issue. 1,
p.
11.
YOSHIDA, Mamoru
and
KOBAYASHI, Kiyoshi
2011.
RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES.
Journal of Japan Society of Civil Engineers, Ser. D3 (Infrastructure Planning and Management),
Vol. 67,
Issue. 4,
p.
510.
Peng, R
Levitin, G
Xie, M
and
Ng, S H
2011.
Optimal defence of single object with imperfect false targets.
Journal of the Operational Research Society,
Vol. 62,
Issue. 1,
p.
134.
DRAGU, TIBERIU
2011.
Is There a Trade-off between Security and Liberty? Executive Bias, Privacy Protections, and Terrorism Prevention.
American Political Science Review,
Vol. 105,
Issue. 1,
p.
64.
Wang, Chen
and
Bier, Vicki M.
2011.
Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility.
Decision Analysis,
Vol. 8,
Issue. 4,
p.
286.
Jensen, Thomas
2012.
National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision.
SSRN Electronic Journal,
Comments
No Comments have been published for this article.