Gertz, Bill. 1998. “Infowar Game Shut Down U.S. Power Grid, Disabled Pacific Command,” Washington Times, April 17, p. A3.

Haimes, Yacov Y. 1998. Risk Modeling, Assessment, and Management (Wiley Series in Systems Engineering), John Wiley & Sons, New York.

Haimes, Yacov Y. 2002. “A Roadmap for Modeling the Risks of Terrorism to the Homeland,” ASCE Journal of Infrastructure Systems, Vol. 8, No. 2, June, pp. 35-41.

Haimes, Yacov Y., and Pu Jiang. 2001. “Leontief-Based Model of Risk in Complex Interconnected Infrastructures,” ASCE Journal of Infrastructure Systems, Vol. 7, No. 1, March, pp. 1-12.

Heller, Miriam. 2002. “Critical Infrastructure Interdependencies: A System Approach to Research Needs,” Infrastructure and Information Systems, National Science Foundation, presentation to the National Academies Committee on Science and Technology for Countering Terrorism: Panel on Systems Analysis and Systems Engineering, February 14.

Hillestad, Richard, and Paul K. Davis. 1998. Resource Allocation for the New Defense Strategy: The DynaRank Decision Support System, MR-996-OSD, RAND, Santa Monica, Calif. Available online at <>.

Houseman, R., and E. Dee Martin. 2001. Protecting America’s Critical Energy Infrastructure from Terrorist Attack, Bracewell and Patterson, L.L.P., Houston, Tex., November 7.

Howard, R.A. 1999. “From Influence to Relevance and Knowledge,” Influence Diagrams, Belief Nets, and Decision Analysis (Wiley Series in Probability and Mathematical Statistics), R.M. Oliver and J.Q. Smith, eds. John Wiley & Sons, New York.

Kaplan, Stan, and B. John Garrick. 1981. “On the Quantitative Definition of Risk,” Risk Analysis, Vol. 1, No. 1, pp. 11-27.

Keeney, Ralph L., and H. Raiffa. 1993. Decisions with Multiple Objectives: Preferences and Value Trade-Offs, Cambridge University Press, New York.

Keeney, Ralph L. 1976. Decisions with Multiple Objectives: Preferences and Value Tradeoffs (Wiley Series in Probability and Mathematical Statistics), John Wiley & Sons, New York.

Kennedy, Donald. 1997. Academic Duty, Harvard University Press, Cambridge, Mass.

Lempert, Robert J., Michael E. Schlesinger, and Steven C. Bankes. 1996. “When We Don’t Know the Costs or the Benefits: Adaptive Strategies for Abating Climate Change,” Climatic Change, Vol. 33, No. 2, pp. 235-274.

Lesser, Ian O., Bruce Hoffman, John Arquilla, David Ronfeldt, and Michele Zanini. 1999. Countering the New Terrorism, prepared for the U.S. Air Force, RAND, Santa Monica, Calif.

MacKay, James A., Ian Lerche, and John A. MacKay. 1999. Economic Risk in Hydrocarbon Exploration, Academic Press, San Diego, Calif.

Madnick, Stuart E. 2001. “The Misguided Silver Bullet: What XML Will and Will NOT Do to Help Information Integration,” Proceedings of the Third International Conference on Information Integration and Web-Based Applications and Services (IIWAS2001), held in Linz, Austria, September 10-12.

Moodie, Michael. 1998. Chemical and Biological Weapons: Will Deterrence Work? (The Deterrence Series), Chemical and Biological Arms Control Institute, Washington, D.C., March.

Myers, Laura. 1998. “Pentagon Has Computers Hacked,” Associated Press, April 17. Available online at <>.

Neumann, Peter G. 1995. Computer Related Risks, Addison-Wesley, Reading, Mass.

Paté-Cornell, M. Elisabeth, and Seth D. Guikema. 2002. “Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures,” submitted for publication in Military Operations Research; working paper of the Department of Management and Science and Engineering, Stanford University, Stanford, Calif.

Renaldi, Steven M., James P. Peerenboom, and Terry K. Kelly. 2001. “Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies,” IEEE Control Systems Magazine, Vol. 21, No. 6, December, pp. 11-25.

The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement