References
- Azaiez, M. N., & Bier, V. M. (1995). Perfect aggregation for a class of general reliability models with Bayesian updating. Applied Mathematics and Computation, 73(2–3), 281–302. doi:10.1016/0096-3003(95)00068-2
- Azaiez, M. N., & Bier, V. M. (2007). Optimal resource allocation for security in reliability systems. European Journal of Operational Research, 181(2), 773–786. doi:10.1016/j.ejor.2006.03.057
- Ben Yaghlane, A., & Azaiez, M. N. (2016). Systems under attack-survivability rather than reliability: Concept, results, and applications. European Journal of Operational Research, 258(3), 1156–1164. doi:10.1016/j.ejor.2016.09.041
- Bennett, C. J. (2013). Estimating optimal decision rules in the presence of model parameter uncertainty. Journal of Financial Econometrics, 11(1), 47–75. doi:10.1093/jjfinec/nbs012
- Bier, V. M., & Lin, S. W. (2013). On the treatment of uncertainty and variability in making decisions about risk. Risk Analysis, 33(10), 1899–1907. doi:10.1111/risa.12071
- Bier, V. M., Nagaraj, A., & Abhichandani, V. (2005). Protection of simple series and parallel systems with components of different values. Reliability Engineering & System Safety, 87(3), 315–323. doi:10.1016/j.ress.2004.06.003
- Bier, V. M., Oliveros, S., & Samuelson, L. (2007). Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9(4), 563–587. doi:10.1111/j.1467-9779.2007.00320.x
- Cano, J., Rios Insua, D., Tedeschi, A., & Turhan, U.u. (2016). Security economics: An adversarial risk analysis approach to airport protection. Annals of Operations Research, 245(1), 359–378. doi:10.1007/s10479-014-1690-7
- Chen, Z., Du, W.-B., Cao, X.-B., & Zhou, X.-L. (2015). Cascading failure of interdependent networks with different coupling preference under targeted attack. Chaos Solitons & Fractals, 80, 7–12. doi:10.1016/j.chaos.2015.03.005
- Chopra, S. S., & Khanna, V. (2015). Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience. Physica A: Statistical Mechanics and its Applications, 436, 865–877. doi:10.1016/j.physa.2015.05.091
- Dyer, J. S., & Sarin, R. K. (1979). Measurable multiattribute value functions. Operations Research, 27(4), 810–822.10.1287/opre.27.4.810
- Ebeling, C. (1997). An introduction to reliability and maintainability engineering. New York, NY: McGraw-Hill.
- Enders, W., & Sandler, T. (2003). What do we know about the substitution effect in transnational terrorism? In A. Silke & G. Ilardi (Eds.), Researching terrorism: Trends, achievements, failures (pp. 119–137). Ilfords: Frank Cass.
- Hadorn, D., Kvizhinadze, G., Collinson, L., & Blakely, T. (2014). Use of expert knowledge elicitation to estimate parameters in health economic decision models. International Journal of Technology Assessment in Health Care, 30(4), 461–468. doi:10.1017/s0266462314000427
- Haimes, Y. Y., Horowitz, B. M., Lambert, J. H., Santos, J., Crowther, K., & Lian, C. Y. (2005). Inoperability input-output model for interdependent infrastructure sectors. II: Case studies. Journal of Infrastructure Systems, 11(2), 80–92. doi:10.1061/(asce)1076-0342(2005)11:2(80)
- Haimes, Y. Y., Horowitz, B. M., Lambert, J. H., Santos, J. R., Lian, C. Y., & Crowther, K. G. (2005). Inoperability input-output model for interdependent infrastructure sectors. I: Theory and methodology. Journal of Infrastructure Systems, 11(2), 67–79. doi:10.1061/(asce)1076-0342(2005)11:2(67)
- Harsanyi, J. C. (1967). Games with incomplete information played by “Bayesian” players, I-III. Part I. The basic model. Management Science, 14(3), 159–182. doi:10.1287/mnsc.14.3.159
- Hausken, K. (2006). Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy, 25(6), 629–665. doi:10.1016/j.jaccpubpol.2006.09.001
- Hausken, K. (2008). Strategic defense and attack for series and parallel reliability systems. European Journal of Operational Research, 186(2), 856–881. doi:10.1016/j.ejor.2007.02.013
- Hausken, K. (2010). Defense and attack of complex and dependent systems. Reliability Engineering & System Safety, 95(1), 29–42. doi:10.1016/j.ress.2009.07.006
- Hausken, K. (2011). Defense and attack of two-component multi-state systems. International Journal of Performability Engineering, 7(3), 205–216.
- Hausken, K. (2014). Choosing what to protect when attacker resources and asset valuations are uncertain. Operations Research and Decisions, 24(3), 23–44.
- Hausken, K. (2017). Defense and attack for interdependent systems. European Journal of Operational Research, 256(2), 582–591. doi:10.1016/j.ejor.2016.06.033
- Hausken, K., & Levitin, G. (2009). Minmax defense strategy for complex multi-state systems. Reliability Engineering & System Safety, 94(2), 577–587. doi:10.1016/j.ress.2008.06.005
- Hausken, K., & Levitin, G. (2012). Review of systems defense and attack models. International Journal of Performability Engineering, 8(4), 355–366.
- Jaccard, M., & Dennis, M. (2006). Estimating home energy decision parameters for a hybrid energy-economy policy model. Environmental Modeling & Assessment, 11(2), 91–100. doi:10.1007/s10666-005-9036-0
- Johansson, J., & Hassel, H. (2010). An approach for modelling interdependent infrastructures in the context of vulnerability analysis. Reliability Engineering & System Safety, 95(12), 1335–1344. doi:10.1016/j.ress.2010.06.010
- Kasper, G. M. (1996). A theory of decision support system design for user calibration. Information Systems Research, 7(2), 215–232. doi:10.1287/isre.7.2.215
- Kunreuther, H., & Heal, G. (2003). Interdependent security. Journal of Risk and Uncertainty, 26(2–3), 231–249. doi:10.1023/a:1024119208153
- Lamrock, F., Cairns, K., Kee, F., Conrads-Frank, A., Schnell-Inderst, P., Salomaa, V., … Siebert, U. (2015). Improving parameter estimation for a decision-analytic markov model to evaluate the use of novel biomarker led strategies for prevention of cardiovascular disease. Value in Health, 18(3), A13–A13.10.1016/j.jval.2015.03.084
- Leontief, W. W. (1966). Input-output economics. New York, NY: Oxford University Press.
- Levitin, G. (2007). Optimal defense strategy against intentional attacks. IEEE Transactions on Reliability, 56(1), 148–157. doi:10.1109/tr.2006.884599
- Li, R.-Q., Sun, S.-W., Ma, Y.-L., Wang, L., & Xia, C.-Y. (2015). Effect of clustering on attack vulnerability of interdependent scale-free networks. Chaos Solitons & Fractals, 80, 109–116. doi:10.1016/j.chaos.2015.06.022
- Lian, C., Santos, J. R., & Haimes, Y. Y. (2007). Extreme risk analysis of interdependent economic and infrastructure sectors. Risk Analysis, 27(4), 1053–1064. doi:10.1111/j.1539-6924.2007.00943.x
- Lisnianski, A., & Levitin, G. (2003). Multi-state system reliability: Assessment, optimization and applications (Vol. 6). River Edge, NJ: World Scientific.10.1142/SQRES
- Nikoofal, M. E., & Zhuang, J. (2015). On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness. European Journal of Operational Research, 246(1), 320–330. doi:10.1016/j.ejor.2015.04.043
- Ouyang, M. (2014). Review on modeling and simulation of interdependent critical infrastructure systems. Reliability Engineering & System Safety, 121, 43–60. doi:10.1016/j.ress.2013.06.040
- Pakes, A., Ostrovsky, M., & Berry, S. (2007). Simple estimators for the parameters of discrete dynamic games (with entry/exit examples). Rand Journal of Economics, 38(2), 373–399. doi:10.1111/j.1756-2171.2007.tb00073.x
- Parnell, G. S., Borio, L. L., Brown, G. G., Banks, D., & Wilson, A. G. (2008). Scientists urge DHS to improve bioterrorism risk assessment. Biosecurity and Bioterrorism-Biodefense Strategy Practice and Science, 6(4), 353–356. doi:10.1089/bsp.2008.0930
- Parnell, G. S., Smith, C. M., & Moxley, F. I. (2010). Intelligent adversary risk analysis: A bioterrorism risk management model. Risk Analysis, 30(1), 32–48. doi:10.1111/j.1539-6924.2009.01319.x
- Quijano, E. G., Rios Insua, D., & Cano, J. (2016). Critical networked infrastructure protection from adversaries. Reliability Engineering and System Safety. doi:10.1016/j.ress.2016.10.015. Retrieved from https://www.sciencedirect.com/science/article/pii/S0951832016307037
- Raiffa, H., Richardson, J., & Metcalfe, D. (2002). Negotiation analysis : The science and art of collaborative decision making. Cambridge, MA: Belknap Press of Harvard University Press.
- Ramirez-Marquez, J. E., & Coit, D. W. (2005). A Monte-Carlo simulation approach for approximating multi-state two-terminal reliability. Reliability Engineering & System Safety, 87(2), 253–264. doi:10.1016/j.ress.2004.05.002
- Rios Insua, D., Cano, J., Pellot, M., & Ortega, R. (2016). Multithreat multisite protection: A security case study. European Journal of Operational Research, 252(3), 888–899. doi:10.1016/j.ejor.2016.01.041
- Rios Insua, D., Rios, J., & Banks, D. (2009). Adversarial risk analysis. Journal of the American Statistical Association, 104(486), 841–854. doi:10.1198/jasa.2009.0155
- Rios Insua, D., Rios, J., & Banks, D. (2016). Modeling opponents in adversarial risk analysis. Risk Analysis, 36(4), 742–755. doi:10.1111/risa.12439
- Rothschild, C., McLay, L., & Guikema, S. (2012). Adversarial risk analysis with incomplete information: A level-k approach. Risk Analysis, 32(7), 1219–1231. doi:10.1111/j.1539-6924.2011.01701.x
- Simon, H. (1969). The sciences of the artificial. Cambridge, MA: MIT Press.
- Taylor, J. G. (1980a). Lanchester-type models of warfare (Vol. I). Monterey, CA: Naval Postgraduate School.
- Taylor, J. G. (1980b). Lanchester-type models of warfare (Vol. II). Monterey, CA: Naval Postgraduate School.
- Tullock, G. (1980). Efficient rent-seeking. In J. M. Buchanan, R. D. Tollison, & G. Tullock (Eds.), Toward a theory of the rent-seeking society (pp. 97–112). College Station, TX: Texas A. & M. University Press.
- Wang, J., Wu, Y., & Li, Y. (2015). Attack robustness of cascading load model in interdependent networks. International Journal of Modern Physics C, 26(3), 1550030. doi:10.1142/s0129183115500308
- Wang, S., Hong, L., & Chen, X. (2012). Vulnerability analysis of interdependent infrastructure systems: A methodological framework. Physica A: Statistical Mechanics and its Applications, 391(11), 3323–3335. doi:10.1016/j.physa.2011.12.043
- Wang, S., Hong, L., Ouyang, M., Zhang, J., & Chen, X. (2013). Vulnerability analysis of interdependent infrastructure systems under edge attack strategies. Safety Science, 51(1), 328–337. doi:10.1016/j.ssci.2012.07.003
- Wu, B., Tang, A., & Wu, J. (2016). Modeling cascading failures in interdependent infrastructures under terrorist attacks. Reliability Engineering & System Safety, 147, 1–8. doi:10.1016/j.ress.2015.10.019
- Zhang, P., Cheng, B., Zhao, Z., Li, D., Lu, G., Wang, Y., & Xiao, J. (2013). The robustness of interdependent transportation networks under targeted attack. EPL, 103(6), 68005. doi:10.1209/0295-5075/103/68005
- Zhuang, J., Dighe, N. S., & Bier, V. M. (2009). Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence. International Journal of Performability Engineering, 5(1), 31–43.
- Zio, E., & Podofillini, L. (2003). Monte Carlo simulation analysis of the effects of different system performance levels on the importance of multi-state components. Reliability Engineering & System Safety, 82(1), 63–73. doi:10.1016/s0951-8320(03)00124-8