Comparison of Approaches for Adversary Modeling Decision Support for Counterterrorism

Part of the Understanding Complex Systems book series (UCS)


Intelligent adversaries are a fundamental component of terrorism risk analysis. Unlike natural and engineering hazards, intelligent adversaries adapt their behavior to the actions of the defender. They adapt to observed, perceived, and imputed likely future actions by those defending the system they are attempting to influence. Risk assessment models need to consider these potential adaptive behaviors to be able to provide accurate estimates of future risk from intelligent adversaries and appropriately support risk management decision making.


Decision Tree Bayesian Network Logic Tree Homeland Security Fault Tree 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Guikema, S. (2012). Modeling intelligent adversaries for terrorism risk assessment: Some necessary conditions for adversary models. Risk Analysis, 32(7), 1117–1121.CrossRefGoogle Scholar
  2. 2.
    Willis, H. H. (2008). Using risk analysis to inform intelligence analysis. CREATE Research.Google Scholar
  3. 3.
    Krizan, L. (1999). Intelligence essentials for everyone. Washington: GPO.Google Scholar
  4. 4.
    Willis, H. H., LaTourrette, T., et al. (2007). Terrorism risk modeling for intelligence analysis and infrastructure protection. Santa Monica: RAND Corporation.Google Scholar
  5. 5.
    Willis, H. H., Morral, A. R., et al. (2005). Estimating terrorism risk. Santa Monica: RAND Corporation.Google Scholar
  6. 6.
    Ezell, B. C., Bennett, S. P., et al. (2010). Probabilistic risk analysis and terrorism risk. Risk Analysis, 30(4), 575–589.CrossRefGoogle Scholar
  7. 7.
    Goodwin, D. (2005). The military and negotiation: The role of the soldier-diplomat. London: Taylor & Francis.Google Scholar
  8. 8.
    Parnell, G. S., Bresnick, T. A., Tani, S. N., & Johnson, E. R. (2013). Handbook of decision analysis. Hoboken: Wiley.CrossRefGoogle Scholar
  9. 9.
    Kumamoto, H., & Henley, E. (1996). Probabilistic risk assessment and management for engineers and scientists. New York: IEEE Press.Google Scholar
  10. 10.
    Ezell, B., Haimes, Y., et al. (2001). Risks of cyber attack to water utility supervisory control and data acquisition systems. Military Operations Research, 6(2), 30–46.CrossRefGoogle Scholar
  11. 11.
    Parnell, G. S., Smith, C. M., et al. (2009). Intelligent adversary risk analysis: A bioterrorism risk management model. Risk Analysis, 30(1), 32–48.CrossRefGoogle Scholar
  12. 12.
    Pate-Cornell, M. (2007). The engineering risk analysis method and some applications. In W. Edwards, R. J. Miles, & D. von Winterfeldt (Eds.), Advances in decision analysis. Cambridge: Cambridge University Press.Google Scholar
  13. 13.
    Crowley, M. (2004). Evaluating influence diagrams. Department of Computer Science, University of British Columbia.Google Scholar
  14. 14.
    Sterman, J. D. (2000). Business dynamics – system dynamics for a complex world. New York: McGraw Hill Higher Education.Google Scholar
  15. 15.
    Clemen, R. T., & Winkler, R. L. (1999). Combining probability distributions from experts in risk analysis. Risk Analysis, 19, 187–203.Google Scholar
  16. 16.
    Lindley, D. V. (1983). Reconciliation of probability distributions. Operations Research, 31, 866–880.CrossRefMATHMathSciNetGoogle Scholar
  17. 17.
    Lindley, D. V. (1985). Reconciliation of discrete probability distributions. In J. M. Bernardo, M. H. DeGroot, D. V. Lindley, & A. F. M. Smith (Eds.), Bayesian statistics 2 (pp. 375–390). Amsterdam: North-Holland.Google Scholar
  18. 18.
    Clemen, R. T., & Winkler, R. L. (1990). Unanimity and compromise among probability forecasters. Management Science, 36, 767–779.CrossRefMATHGoogle Scholar
  19. 19.
    Winkler, R. L. (1981). Combining probability distributions from dependent information sources. Management Science, 27(4), 479–488.CrossRefMATHGoogle Scholar
  20. 20.
    Mendel, M. B., & Sheridan, T. B. (1989). Filtering information from human experts. IEEE Transactions on Systems, Man, and Cybernetics, 36, 6–16.CrossRefGoogle Scholar
  21. 21.
    O’Hagan, A. (2003). HSSS model criticism (with discussion). In P. J. Green, N. L. Hjort, & S. T. Richardson (Eds.), Highly structured stochastic systems (pp. 423–453). Oxford: Oxford University Press.Google Scholar
  22. 22.
    Hurwitz, E., & Marwala, T. (2007). Multi-agent modeling of interaction-based card games. In Proceedings of the 3rd international North American conference on intelligent games and simulation (pp. 23–28), University of Florida, USA.Google Scholar
  23. 23.
    Merrick, J. J., & Parnell, G. S. (2011). A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management. Risk Analysis, 31(9), 1488–1510.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.Old Dominion University’s, Virginia Modeling, Analysis and Simulation CenterSuffolkUSA
  2. 2.Department of Industrial EngineeringUniversity of ArkansasFayettevilleUSA

Personalised recommendations