IDEAS home Printed from https://ideas.repec.org/r/wly/riskan/v25y2005i2p361-376.html
   My bibliography  Save this item

A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as


Cited by:

  1. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
  2. D E Salazar A & C M Rocco S & E Zio, 2008. "Optimal protection of complex networks exposed to a terrorist hazard: A multi-objective evolutionary approach," Journal of Risk and Reliability, , vol. 222(3), pages 327-335, September.
  3. Joost R. Santos, 2006. "Inoperability input‐output modeling of disruptions to interdependent economic systems," Systems Engineering, John Wiley & Sons, vol. 9(1), pages 20-34, March.
  4. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
  5. Williams, James Bryan, 2021. "Critical flow centrality measures on interdependent networks with time-varying demands," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
  6. Stephanie E. Chang & Timothy McDaniels & Jana Fox & Rajan Dhariwal & Holly Longstaff, 2014. "Toward Disaster‐Resilient Cities: Characterizing Resilience of Infrastructure Systems with Expert Judgments," Risk Analysis, John Wiley & Sons, vol. 34(3), pages 416-434, March.
  7. Jeffrey S. Simonoff & Carlos E. Restrepo & Rae Zimmerman, 2007. "Risk‐Management and Risk‐Analysis‐Based Decision Tools for Attacks on Electric Power," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 547-570, June.
  8. David L. Alderson & Gerald G. Brown & W. Matthew Carlyle, 2015. "Operational Models of Infrastructure Resilience," Risk Analysis, John Wiley & Sons, vol. 35(4), pages 562-586, April.
  9. T. R. Wang & N. Pedroni & E. Zio & V. Mousseau, 2020. "Identification of Protective Actions to Reduce the Vulnerability of Safety‐Critical Systems to Malevolent Intentional Acts: An Optimization‐Based Decision‐Making Approach," Risk Analysis, John Wiley & Sons, vol. 40(3), pages 565-587, March.
  10. Chenyang Lian & Yacov Y. Haimes, 2006. "Managing the risk of terrorism to interdependent infrastructure systems through the dynamic inoperability input–output model," Systems Engineering, John Wiley & Sons, vol. 9(3), pages 241-258, September.
  11. Linn Svegrup & Jonas Johansson & Henrik Hassel, 2019. "Integration of Critical Infrastructure and Societal Consequence Models: Impact on Swedish Power System Mitigation Decisions," Risk Analysis, John Wiley & Sons, vol. 39(9), pages 1970-1996, September.
  12. Rehak, David & Senovsky, Pavel & Hromada, Martin & Lovecek, Tomas & Novotny, Petr, 2018. "Cascading Impact Assessment in a Critical Infrastructure System," International Journal of Critical Infrastructure Protection, Elsevier, vol. 22(C), pages 125-138.
  13. Zachary Walchuk & Kash Barker, 2013. "Analyzing interdependent impacts of resource sustainability," Environment Systems and Decisions, Springer, vol. 33(3), pages 391-403, September.
  14. P. Daniel Wright & Matthew J. Liberatore & Robert L. Nydick, 2006. "A Survey of Operations Research Models and Applications in Homeland Security," Interfaces, INFORMS, vol. 36(6), pages 514-529, December.
  15. Zhang, Zili & Li, Xiangyang & Li, Hengyun, 2015. "A quantitative approach for assessing the critical nodal and linear elements of a railway infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 8(C), pages 3-15.
  16. Edouard Kujawski, 2006. "Multi‐period model for disruptive events in interdependent systems," Systems Engineering, John Wiley & Sons, vol. 9(4), pages 281-295, December.
  17. Terje Aven & Ortwin Renn, 2009. "The Role of Quantitative Risk Assessments for Characterizing Risk and Uncertainty and Delineating Appropriate Risk Management Options, with Special Emphasis on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 29(4), pages 587-600, April.
  18. Michael Greenberg, 2012. "Our Deteriorating Physical Structures and Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 32(12), pages 2008-2009, December.
  19. R. Piccinelli & G. Sansavini & R. Lucchetti & E. Zio, 2017. "A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2182-2190, November.
  20. Hsieh, Cheng-Hsien & Feng, Cheng-Min, 2020. "The highway resilience and vulnerability in Taiwan," Transport Policy, Elsevier, vol. 87(C), pages 1-9.
  21. Chatterjee, Samrat & Thekdi, Shital, 2020. "An iterative learning and inference approach to managing dynamic cyber vulnerabilities of complex systems," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
  22. Chen, Chao & Reniers, Genserik & Khakzad, Nima, 2019. "Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: A dynamic graph approach," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
  23. Dietmar Borst & Ute Werner, 2009. "Schätzung des Risikos der Bevölkerung durch Terroranschläge als Ergänzung für sicherheitsökonomische Betrachtungen," Vierteljahrshefte zur Wirtschaftsforschung / Quarterly Journal of Economic Research, DIW Berlin, German Institute for Economic Research, vol. 78(4), pages 101-118.
  24. Laura McLay & Casey Rothschild & Seth Guikema, 2012. "Robust Adversarial Risk Analysis: A Level- k Approach," Decision Analysis, INFORMS, vol. 9(1), pages 41-54, March.
  25. Shital A. Thekdi & James H. Lambert, 2012. "Decision Analysis and Risk Models for Land Development Affecting Infrastructure Systems," Risk Analysis, John Wiley & Sons, vol. 32(7), pages 1253-1269, July.
  26. Susana Freiria & Alexandre O. Tavares & Rui Pedro Julião, 2015. "The Multiscale Importance of Road Segments in a Network Disruption Scenario: A Risk‐Based Approach," Risk Analysis, John Wiley & Sons, vol. 35(3), pages 484-500, March.
  27. Hua Li & George E. Apostolakis & Joseph Gifun & William VanSchalkwyk & Susan Leite & David Barber, 2009. "Ranking the Risks from Multiple Hazards in a Small Community," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 438-456, March.
  28. Zio, E., 2018. "The future of risk assessment," Reliability Engineering and System Safety, Elsevier, vol. 177(C), pages 176-190.
  29. H Jönsson & J Johansson & H Johansson, 2008. "Identifying critical components in technical infrastructure networks," Journal of Risk and Reliability, , vol. 222(2), pages 235-243, June.
  30. Cheng-Hsien Hsieh & Hui-Huang Tai & Yang-Ning Lee, 2014. "Port vulnerability assessment from the perspective of critical infrastructure interdependency," Maritime Policy & Management, Taylor & Francis Journals, vol. 41(6), pages 589-606, November.
  31. David L. Alderson & Gerald G. Brown & W. Matthew Carlyle & R. Kevin Wood, 2018. "Assessing and Improving the Operational Resilience of a Large Highway Infrastructure System to Worst-Case Losses," Transportation Science, INFORMS, vol. 52(4), pages 1012-1034, August.
  32. Vaibhav Gaur & Om Prakash Yadav & Gunjan Soni & Ajay Pal Singh Rathore, 2021. "A literature review on network reliability analysis and its engineering applications," Journal of Risk and Reliability, , vol. 235(2), pages 167-181, April.
  33. Baiardi, F. & Telmon, C. & Sgandurra, D., 2009. "Hierarchical, model-based risk management of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 94(9), pages 1403-1415.
  34. Bhandari, Pratik & Creighton, Douglas & Gong, Jinzhe & Boyle, Carol & Law, Kris M.Y., 2023. "Evolution of cyber-physical-human water systems: Challenges and gaps," Technological Forecasting and Social Change, Elsevier, vol. 191(C).
  35. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
  36. James H. Lambert & Mark W. Farrington, 2006. "Risk‐Based Objectives for the Allocation of Chemical, Biological, and Radiological Air Emissions Sensors," Risk Analysis, John Wiley & Sons, vol. 26(6), pages 1659-1674, December.
  37. Monroe, Jacob & Ramsey, Elizabeth & Berglund, Emily, 2018. "Allocating countermeasures to defend water distribution systems against terrorist attack," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 37-51.
  38. Walter W. Piegorsch & Susan L. Cutter & Frank Hardisty, 2007. "Benchmark Analysis for Quantifying Urban Vulnerability to Terrorist Incidents," Risk Analysis, John Wiley & Sons, vol. 27(6), pages 1411-1425, December.
  39. Yi‐Ping Fang & Giovanni Sansavini & Enrico Zio, 2019. "An Optimization‐Based Framework for the Identification of Vulnerabilities in Electric Power Grids Exposed to Natural Hazards," Risk Analysis, John Wiley & Sons, vol. 39(9), pages 1949-1969, September.
  40. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.