{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:37:50Z","timestamp":1742913470047,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044274"},{"type":"electronic","value":"9783642044281"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04428-1_27","type":"book-chapter","created":{"date-parts":[[2009,10,9]],"date-time":"2009-10-09T12:05:58Z","timestamp":1255089958000},"page":"306-315","source":"Crossref","is-referenced-by-count":5,"title":["Adversarial Risk Analysis: Applications to Basic Counterterrorism Models"],"prefix":"10.1007","author":[{"given":"Jesus","family":"Rios","sequence":"first","affiliation":[]},{"given":"David","family":"Rios Insua","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Aliprantis, C., Chakrabarti, S.: Games and Decision Making, Oxford, U.P (2000)"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Banks, D., Anderson, S.: Game theory and risk analysis in the context of the smallpox threat. In: Wilson, A., Wilson, G., Olwell, D. (eds.) Statistical Methods in Counterterrorism, pp. 9\u201322 (2006)","DOI":"10.1007\/0-387-35209-0_2"},{"key":"27_CR3","volume-title":"Game Theoretic Risk Analysis of Security Threats","author":"V.S. Bier","year":"2008","unstructured":"Bier, V.S., Azaiez, N.: Game Theoretic Risk Analysis of Security Threats. Springer, Heidelberg (2008)"},{"issue":"4","key":"27_CR4","first-page":"563","volume":"9","author":"V. Bier","year":"2007","unstructured":"Bier, V., Oliveros, S., Samuelson, L.: Choosing what to protect. Journal of Economic Literature\u00a09(4), 563\u2013587 (2007)","journal-title":"Journal of Economic Literature"},{"issue":"6","key":"27_CR5","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1287\/inte.1060.0252","volume":"36","author":"G. Brown","year":"2006","unstructured":"Brown, G., Carlyle, M., Salmeron, J., Wood, K.: Defending critical infrastructure. Interfaces\u00a036(6), 530\u2013544 (2006)","journal-title":"Interfaces"},{"key":"27_CR6","volume-title":"Optimizing Department of Homeland Security Defense Investments: Applying Defender-Attacker(-Defender) Optimization to Terror Risk Assessment and Mitigation, Appendix E","author":"G. Brown","year":"2008","unstructured":"Brown, G., Carlyle, W.M., Wood, R.: Optimizing Department of Homeland Security Defense Investments: Applying Defender-Attacker(-Defender) Optimization to Terror Risk Assessment and Mitigation, Appendix E. National Academies Press, Washington (2008)"},{"key":"27_CR7","unstructured":"French, S., Rios Insua, D.: Statistical Decision Theory, Arnold (2000)"},{"key":"27_CR8","volume-title":"A Primer in Game Theory","author":"R. Gibbons","year":"1992","unstructured":"Gibbons, R.: A Primer in Game Theory. Pearson Education Ltd., Harlow (1992)"},{"issue":"3","key":"27_CR9","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1287\/mnsc.14.3.159","volume":"14","author":"J. Harsanyi","year":"1967","unstructured":"Harsanyi, J.: Games with incomplete information played by \u201cBayesian\u201d players, I-III. Part I. The basic model. Management Science\u00a014(3), 159\u2013182 (1967)","journal-title":"Management Science"},{"issue":"2","key":"27_CR10","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1287\/mnsc.28.2.120","volume":"28","author":"J. Harsanyi","year":"1982","unstructured":"Harsanyi, J.: Subjective probability and the theory of games: Comments on Kadane and Larkey\u2019s paper. Management Science\u00a028(2), 120\u2013124 (1982)","journal-title":"Management Science"},{"issue":"2","key":"27_CR11","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1287\/mnsc.28.2.113","volume":"28","author":"J.B. Kadane","year":"1982","unstructured":"Kadane, J.B., Larkey, P.D.: Subjective probability and the theory of games. Management Science\u00a028(2), 113\u2013120 (1982); reply: 124","journal-title":"Management Science"},{"key":"27_CR12","volume-title":"Report on Methodological Improvements to the Department of Homeland Security\u2019s Biological Agent Risk Analysis","author":"G. Parnell","year":"2008","unstructured":"Parnell, G., Banks, D., Borio, L., Brown, G., Cox, L.A., Gannon, J., Harvill, E., Kunreuther, H., Morse, S., Pappaioanou, M., Pollack, S., Singpurwalla, N., Wilson, A.: Report on Methodological Improvements to the Department of Homeland Security\u2019s Biological Agent Risk Analysis. National Academies Press, Washington (2008)"},{"issue":"6","key":"27_CR13","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1287\/mnsc.1060.0665","volume":"53","author":"E.J. Pinker","year":"2007","unstructured":"Pinker, E.J.: An analysis of short-term responses to threats of terrorism. Management Science\u00a053(6), 865\u2013880 (2007)","journal-title":"Management Science"},{"key":"27_CR14","volume-title":"Negotiation Analysis","author":"H. Raiffa","year":"2002","unstructured":"Raiffa, H.: Negotiation Analysis. Harvard University Press, Cambridge (2002)"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Rios, J., Rios Insua, D.: Balanced increment and concession methods for negotiation support. Journal of the Spanish Royal Academy of Sciences, RACSAM (in press, 2010)","DOI":"10.1007\/BF03191880"},{"issue":"486","key":"27_CR16","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1198\/jasa.2009.0155","volume":"104","author":"D. Rios Insua","year":"2009","unstructured":"Rios Insua, D., Rios, J., Banks, D.: Adversarial risk analysis. Journal of the American Statistical Association\u00a0104(486), 841\u2013854 (2009)","journal-title":"Journal of the American Statistical Association"},{"key":"27_CR17","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1287\/deca.1070.0097","volume":"4","author":"M. Rothkopf","year":"2007","unstructured":"Rothkopf, M.: Decision Analysis: The right tool for auctions. Decision Analysis\u00a04, 167\u2013172 (2007)","journal-title":"Decision Analysis"},{"key":"27_CR18","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1287\/deca.1070.0084","volume":"4","author":"J.H. van Bingsbergen","year":"2007","unstructured":"van Bingsbergen, J.H., Marx, L.M.: Exploring relations between decision analysis and game theory. Decision Analysis\u00a04, 32\u201340 (2007)","journal-title":"Decision Analysis"},{"issue":"2","key":"27_CR19","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1287\/deca.1060.0071","volume":"3","author":"D. von Winterfeldt","year":"2006","unstructured":"von Winterfeldt, D., O\u2019Sullivan, T.M.: Should we protect commercial airplanes against surface-to-air missile attacks by terrorists? Decision Analysis\u00a03(2), 63\u201375 (2006)","journal-title":"Decision Analysis"},{"issue":"5","key":"27_CR20","doi-asserted-by":"publisher","first-page":"976","DOI":"10.1287\/opre.1070.0434","volume":"55","author":"J. Zhuang","year":"2007","unstructured":"Zhuang, J., Bier, V.: Balancing Terrorism and Natural Disasters. Defensive Strategy with endogenous attack effort. Operations Research\u00a055(5), 976\u2013991 (2007)","journal-title":"Operations Research"}],"container-title":["Lecture Notes in Computer Science","Algorithmic Decision Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04428-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,10]],"date-time":"2020-10-10T10:05:53Z","timestamp":1602324353000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04428-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044274","9783642044281"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04428-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}