Subject
Information Systems and Management,Computer Science Applications,Safety, Risk, Reliability and Quality,Modeling and Simulation
Reference31 articles.
1. G. Ackerman, P. Abhayaratne, J. Bale, A. Bhattacharjee, C. Blair, L. Hansell, A. Jayne, M. Kosal, S. Lucas, K. Moran, L. Seroki and S. Vadlamudi, Assessing Terrorist Motivations for Attacking Critical Infrastructure, UCRL-TR-227068, Lawrence Livermore National Laboratory, Livermore, California, 2007.
2. M. Ambinder and D. Grady, Deep State: Inside the Government Secrecy Industry, John Wiley and Sons, Hoboken, New Jersey, 2013.
3. D. Arce, D. Kovenock and B. Roberson, Weakest-link attacker-defender games with multiple attack technologies, Naval Research Logistics, vol. 59(6), pp. 457–469, 2012.
4. D. Arce and T. Sandler, Transnational public goods: Strategies and institutions, European Journal of Political Economy, vol. 17(3), pp. 493–516, 2001.
5. J. Bachrach, Wikihistory: Did the leaks inspire the Arab Spring? World Affairs, vol. 174(2), pp. 35–44, 2011.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献