• Publications
  • Influence
Optimal resource allocation for security in reliability systems
TLDR
We find closed-form results for systems with moderately general structures, under the assumption that the cost of an attack against any given component increases linearly in the amount of defensive investment in that component. Expand
  • 192
  • 26
  • PDF
On the state of the art: risk communication to the public
  • V. Bier
  • Psychology, Computer Science
  • Reliab. Eng. Syst. Saf.
  • 1 February 2001
TLDR
This paper reviews the state of the art on risk communication to the public, with an emphasis on summarizing relevant empirical findings. Expand
  • 198
  • 16
Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker
TLDR
We study a strategic model in which a defender must allocate defensive resources to a collection of locations and an attacker must choose a location to attack. Expand
  • 321
  • 15
  • PDF
Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort
TLDR
We apply game theory to identify equilibrium strategies for both attacker and defender in a fully endogenous model of resource allocation for countering terrorism and natural disasters. Expand
  • 361
  • 14
  • PDF
Protection of simple series and parallel systems with components of different values
TLDR
We apply game theory, optimization, and reliability analysis to identify optimal defenses against intentional threats to system reliability, and develop qualitative guidelines that reflect those strategies. Expand
  • 199
  • 11
Methodology for identifying near-optimal interdiction strategies for a power transmission system
TLDR
We propose a relatively simple, inexpensive, and practical method (“Max Line”) for identifying promising interdiction strategies in electricity transmission systems and compare our method and results with those of other proposed approaches. Expand
  • 118
  • 9
  • PDF
Choosing what to protect.
  • V. Bier
  • Economics, Medicine
  • Risk analysis : an official publication of the…
  • 1 June 2007
We study a strategic model in which a defender must allocate defensive resources to a collection of locations, and an attacker must choose a location to attack. The defender does not know theExpand
  • 138
  • 9
  • PDF
Optimal resource allocation for defense of targets based on differing measures of attractiveness.
TLDR
This article describes the results of applying a rigorous computational model to the problem of the optimal defensive resource allocation among potential terrorist targets. Expand
  • 141
  • 8
Game-Theoretic and Reliability Methods in Counterterrorism and Security
As noted above, protecting engineered systems against intentional attacks is likely to require a combination of game theory and reliability analysis. Risk and reliability analysis by itself willExpand
  • 75
  • 6
  • PDF
A Survey of Approaches for Assessing and Managing the Risk of Extremes
In this paper, we review methods for assessing and managing the risk of extreme events, where “extreme events” are defined to be rare, severe, and outside the normal range of experience of the systemExpand
  • 112
  • 5
...
1
2
3
4
5
...