BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

125 related articles for article (PubMed ID: 19000071)

  • 1. Some limitations of "Risk = Threat x Vulnerability x Consequence" for risk analysis of terrorist attacks.
    Cox LA
    Risk Anal; 2008 Dec; 28(6):1749-61. PubMed ID: 19000071
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Development of a security vulnerability assessment process for the RAMCAP chemical sector.
    Moore DA; Fuller B; Hazzan M; Jones JW
    J Hazard Mater; 2007 Apr; 142(3):689-94. PubMed ID: 16920260
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Choosing what to protect.
    Bier VM
    Risk Anal; 2007 Jun; 27(3):607-20. PubMed ID: 17640211
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Improving risk-based decision making for terrorism applications.
    Cox LA
    Risk Anal; 2009 Mar; 29(3):336-41; discussion 342-3. PubMed ID: 19243534
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Risk analysis for critical asset protection.
    McGill WL; Ayyub BM; Kaminskiy M
    Risk Anal; 2007 Oct; 27(5):1265-81. PubMed ID: 18076495
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Critical asset and portfolio risk analysis: an all-hazards framework.
    Ayyub BM; McGill WL; Kaminskiy M
    Risk Anal; 2007 Aug; 27(4):789-801. PubMed ID: 17958492
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A risk-based approach to setting priorities in protecting bridges against terrorist attacks.
    Leung M; Lambert JH; Mosenthal A
    Risk Anal; 2004 Aug; 24(4):963-84. PubMed ID: 15357821
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Optimal resource allocation for defense of targets based on differing measures of attractiveness.
    Bier VM; Haphuriwat N; Menoyo J; Zimmerman R; Culpen AM
    Risk Anal; 2008 Jun; 28(3):763-70. PubMed ID: 18643831
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Using probabilistic terrorism risk modeling for regulatory benefit-cost analysis: application to the Western hemisphere travel initiative in the land environment.
    Willis HH; LaTourrette T
    Risk Anal; 2008 Apr; 28(2):325-39. PubMed ID: 18419652
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Robust allocation of a defensive budget considering an attacker's private information.
    Nikoofal ME; Zhuang J
    Risk Anal; 2012 May; 32(5):930-43. PubMed ID: 22050276
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Probabilistic risk analysis and terrorism risk.
    Ezell BC; Bennett SP; von Winterfeldt D; Sokolowski J; Collins AJ
    Risk Anal; 2010 Apr; 30(4):575-89. PubMed ID: 20522198
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Resource distribution in multiple attacks with imperfect detection of the attack outcome.
    Levitin G; Hausken K
    Risk Anal; 2012 Feb; 32(2):304-18. PubMed ID: 21801189
    [TBL] [Abstract][Full Text] [Related]  

  • 13. What's wrong with hazard-ranking systems? An expository note.
    Cox LA
    Risk Anal; 2009 Jul; 29(7):940-8. PubMed ID: 19486474
    [TBL] [Abstract][Full Text] [Related]  

  • 14. How probabilistic risk assessment can mislead terrorism risk analysts.
    Brown GG; Cox LA
    Risk Anal; 2011 Feb; 31(2):196-204. PubMed ID: 20846169
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Defense resource distribution between protection and redundancy for constant resource stockpiling pace.
    Levitin G; Hausken K
    Risk Anal; 2011 Oct; 31(10):1632-45. PubMed ID: 21388424
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Adversarial risk analysis for counterterrorism modeling.
    Rios J; Rios Insua D
    Risk Anal; 2012 May; 32(5):894-915. PubMed ID: 22150163
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.
    Dutt V; Ahn YS; Gonzalez C
    Hum Factors; 2013 Jun; 55(3):605-18. PubMed ID: 23829034
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management.
    Merrick J; Parnell GS
    Risk Anal; 2011 Sep; 31(9):1488-510. PubMed ID: 21418080
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Evaluating and improving risk formulas for allocating limited budgets to expensive risk-reduction opportunities.
    Cox LA
    Risk Anal; 2012 Jul; 32(7):1244-52. PubMed ID: 22150317
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Vulnerability and risk assessment in the environment of care.
    Owles RE; Vellani KH
    J Healthc Prot Manage; 2007; 23(2):67-77. PubMed ID: 17907611
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.