Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Bueno de Mesquita, Ethan
and
Dickson, Eric S.
2007.
The Propaganda of the Deed: Terrorism, Counterterrorism, and Mobilization.
American Journal of Political Science,
Vol. 51,
Issue. 2,
p.
364.
Sandler, Todd
and
Arce, Daniel G.
2007.
Handbook of Defense Economics - Defense in a Globalized World.
Vol. 2,
Issue. ,
p.
775.
Arce, Daniel G.
and
Sandler, Todd
2009.
Mathematical Methods in Counterterrorism.
p.
333.
Levitin, G.
and
Hausken, K.
2009.
Redundancy vs. Protection vs. False Targets for Systems Under Attack.
IEEE Transactions on Reliability,
Vol. 58,
Issue. 1,
p.
58.
Levitin, Gregory
and
Hausken, Kjell
2009.
False targets vs. redundancy in homogeneous parallel systems.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 2,
p.
588.
Rios Insua, David
Rios, Jesus
and
Banks, David
2009.
Adversarial Risk Analysis.
Journal of the American Statistical Association,
Vol. 104,
Issue. 486,
p.
841.
Melese, Francois
2009.
Mathematical Methods in Counterterrorism.
p.
319.
Levitin, Gregory
and
Hausken, Kjell
2009.
Intelligence and impact contests in systems with redundancy, false targets, and partial protection.
Reliability Engineering & System Safety,
Vol. 94,
Issue. 12,
p.
1927.
Wang, Chen
and
Bier, Vicki M.
2009.
Impact of intelligence on target-hardening decisions.
p.
373.
Sandler, Todd
and
Siqueira, Kevin
2009.
Games and Terrorism.
Simulation & Gaming,
Vol. 40,
Issue. 2,
p.
164.
Arce, Daniel G.
and
Sandler, Todd
2010.
Terrorist Spectaculars: Backlash Attacks and the Focus of Intelligence.
Journal of Conflict Resolution,
Vol. 54,
Issue. 2,
p.
354.
Sandler, Todd
2010.
Terrorism and Policy: Introduction.
Journal of Conflict Resolution,
Vol. 54,
Issue. 2,
p.
203.
Yoshida, Mamoru
and
Kobayashi, Kiyoshi
2010.
Disclosure strategies for critical infrastructure against terror attacks.
p.
3194.
Wang, Shouqiang
and
Banks, David
2011.
Network routing for insurgency: An adversarial risk analysis framework.
Naval Research Logistics (NRL),
Vol. 58,
Issue. 6,
p.
595.
Kyung, Minjung
Gill, Jeff
and
Casella, George
2011.
New findings from terrorism data: Dirichlet process random-effects models for latent groups.
Journal of the Royal Statistical Society: Series C (Applied Statistics),
Vol. 60,
Issue. 5,
p.
701.
Bapat, Navin A.
2011.
Terrorism, democratization, and US foreign policy.
Public Choice,
Vol. 149,
Issue. 3-4,
p.
315.
Phillips, Peter J.
2011.
Terrorist Network Infiltration, Asymmetric Information, and Quality Uncertainty.
Journal of Applied Security Research,
Vol. 6,
Issue. 3,
p.
339.
Yoshida, Mamoru
and
Kobayashi, Kiyoshi
2011.
Disclosure strategy for critical infrastructure under common knowledge of ‘naive government’.
p.
3463.
Hausken, Kjell
2011.
Protecting complex infrastructures against multiple strategic attackers.
International Journal of Systems Science,
Vol. 42,
Issue. 1,
p.
11.
Cárceles-Poveda, Eva
and
Tauman, Yair
2011.
A strategic analysis of the war against transnational terrorism.
Games and Economic Behavior,
Vol. 71,
Issue. 1,
p.
49.