Risk Analysis

Table of Contents

Volume 36 Issue 4 (April 2016)

N/A-N/A, 639-862

Issue Information

Issue Information ‐ TOC

  • Author:
  • Pub Online: Apr 19, 2016
  • DOI: 10.1111/risa.12490 (p N/A-N/A)

From the Editors

From the Editors

  • Author: Tony Cox, Karen Lowrie
  • Pub Online: Apr 19, 2016
  • DOI: 10.1111/risa.12622 (p 639-640)

Letters to the Editor

Commentary on “Risk Analysis for U.S. Offshore Wind Farms: The Need for an Integrated Approach”

  • Author: Bonnie Ram
  • Pub Online: Apr 19, 2016
  • DOI: 10.1111/risa.12610 (p 641-644)

Response

Author Response

  • Author: Andrea Staid, Seth D. Guikema
  • Pub Online: Apr 19, 2016
  • DOI: 10.1111/risa.12619 (p 645-645)

Profile

Elizabeth Anderson: Cancer Risk Assessment Pioneer

  • Author: Michael R. Greenberg, Karen Lowrie
  • Pub Online: Apr 06, 2016
  • DOI: 10.1111/risa.12620 (p 646-649)

Special Series

Introductions to Adversary Behavior: Validating the Models

  • Author: Jun Zhuang, Vicki Bier, Seth Guikema
  • Pub Online: Apr 19, 2016
  • DOI: 10.1111/risa.12621 (p 650-652)

Validation in the Absence of Observed Events

  • Author: John Lathrop, Barry Ezell
  • Pub Online: Jul 22, 2015
  • DOI: 10.1111/risa.12442 (p 653-665)

In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models

  • Author: Sumitra Bhashyam, Gilberto Montibeller
  • Pub Online: Jun 04, 2015
  • DOI: 10.1111/risa.12422 (p 666-680)

Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory

  • Author: Jason R. W. Merrick, Philip Leclerc
  • Pub Online: Jul 14, 2014
  • DOI: 10.1111/risa.12254 (p 681-693)

Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models

  • Author: Nageswara S. V. Rao, Stephen W. Poole, Chris Y. T. Ma, Fei He, Jun Zhuang, David K. Y. Yau
  • Pub Online: Apr 06, 2015
  • DOI: 10.1111/risa.12362 (p 694-710)

On the Effectiveness of Security Countermeasures for Critical Infrastructures

  • Author: Kjell Hausken, Fei He
  • Pub Online: Dec 09, 2014
  • DOI: 10.1111/risa.12318 (p 711-726)

Adversarial Risk Analysis for Urban Security Resource Allocation

  • Author: César Gil, David Rios Insua, Jesus Rios
  • Pub Online: Mar 01, 2016
  • DOI: 10.1111/risa.12580 (p 727-741)

Modeling Opponents in Adversarial Risk Analysis

  • Author: David Rios Insua, David Banks, Jesus Rios
  • Pub Online: Jul 02, 2015
  • DOI: 10.1111/risa.12439 (p 742-755)

Quantifying Adversary Capabilities to Inform Defensive Resource Allocation

  • Author: Chen Wang, Vicki M. Bier
  • Pub Online: May 01, 2015
  • DOI: 10.1111/risa.12399 (p 756-775)

Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF

  • Author: Peiqiu Guan, Jun Zhuang
  • Pub Online: Dec 29, 2015
  • DOI: 10.1111/risa.12502 (p 776-791)
Page:   1 2 Next

Related Topics

Related Publications

Related Content

Site Footer

Address:

This website is provided by John Wiley & Sons Limited, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ (Company No: 00641132, VAT No: 376766987)

Published features on StatisticsViews.com are checked for statistical accuracy by a panel from the European Network for Business and Industrial Statistics (ENBIS)   to whom Wiley and StatisticsViews.com express their gratitude. This panel are: Ron Kenett, David Steinberg, Shirley Coleman, Irena Ograjenšek, Fabrizio Ruggeri, Rainer Göb, Philippe Castagliola, Xavier Tort-Martorell, Bart De Ketelaere, Antonio Pievatolo, Martina Vandebroek, Lance Mitchell, Gilbert Saporta, Helmut Waldl and Stelios Psarakis.