Adversarial Risk Analysis for Counterterrorism Modeling
Robust Allocation of a Defensive Budget Considering an Attacker's Private Information