Wiley Handbook of Science and Technology for Homeland Security 2008
DOI: 10.1002/9780470087923.hhs036
|View full text |Cite
|
Sign up to set email alerts
|

Terrorist Threat Analysis

Abstract: This article will summarize methods that can be used for threat analysis with applications for modeling threats generated by non‐state adversaries. Traditionally, threat models focused on an adversary's capability to mount a specific attack and that adversary's intent to carry out such an attack. However, as explicated in this article, threat is best understood as the product of an adversary's capability, intent, and authority to engage a specific target by a particular attack mode. Furthermore, threat does no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 22 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?