Author:
Eiselt H A,Bhadury Joy,Burkey Mark L
Reference59 articles.
1. Abrahms, M. (2008) What terrorists really want: Terrorist motives and counterterrorism strategy. International Security 31 (4): 78–105.
2. Artificial Intelligence Lab. (2011) The university of Arizona, http://ai.arizona.edu/research/terror/ , accessed 24 November 2011.
3. Bard, J.F. (1998) Practical Bilevel Optimization. Nonconvex optimization and its applications. Vol. 30. Dordrecht: Kluwer Academic.
4. Barr, D. and Baker, A. (2001) Getting the message from ‘eco-terrorists’: Mystery group takes its campaign East. New York Times 8 January: A15.
5. Bier, V., Oliveros, S. and Samuelson, L. (2007) Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory 9 (4): 563–587.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献