Game-Theoretic and Reliability Methods in Counterterrorism and Security

作者: Vicki Bier

DOI: 10.1007/0-387-35209-0_3

关键词:

摘要: … For example, consider the supply chain for food and agricultural products, in which companies could be vulnerable to contamination introduced upstream in the supply chain, and hence …

参考文章(84)
Louis Anthony Cox, A Probabilistic Risk Assessment Program for Analyzing Security Risks New Risks: Issues and Management. pp. 331- 340 ,(1990) , 10.1007/978-1-4899-0759-2_38
Ivo H. Daalder, I. M. Destler, Robert E. Litan, James M. Lindsay, Michael O'Hanlon, David L. Gunter, Protecting the American Homeland Brookings Institution Press. ,(2003)
Alyson Wilson, Nikolaos Limnios, Sallie Keller-McNulty, Yvonne Armijo, Modern Statistical and Mathematical Methods in Reliability WORLD SCIENTIFIC. ,(2005) , 10.1142/5844
R. Anderson, Why information security is hard - an economic perspective annual computer security applications conference. pp. 358- 365 ,(2001) , 10.1109/ACSAC.2001.991552
Steven J. Brams, Game Theory and Politics ,(1975)