Half Title Page.
1: Introduction and Overview.
2: Policy Development for Homeland Security.
3: Threats and Challenges to Homeland Security.
4: Terrorist Organizations and Modeling Trends.
5: Risk Communication—An Overlooked Tool in Combating Terrorism.
6: Cross-Cutting Themes and Technologies.
7: Risk Modeling and Vulnerability Assessment.
8: Terrorism Risk: Characteristics and Features.
9: Risk Analysis Frameworks for Counterterrorism.
10: Risk Analysis and Management for Critical Asset Protection.
11: Logic Trees: Fault, Success, Attack, Event, Probability, and Decision Trees.
12: Bayesian Networks.
13: Using Risk Analysis to Inform Intelligence Analysis.
14: Vulnerability Assessment.
15: Risk Communication.
16: Probabilistic Risk Assessment (PRA).
17: Scenario Analysis, Cognitive Maps, and Concept Maps.
18: Time-Domain Probabilistic Risk Assessment Method for Interdependent Infrastructure Failure and Recovery Modeling.
19: Risk Transfer and Insurance: Insurability Concepts and Programs for Covering Extreme Events.
20: Quantitative Representation of Risk.
21: Qualitative Representation of Risk.
22: Terrorism Risk.
23: Terrorist Threat Analysis.
24: Risk Analysis Methods for Cyber Security.
25: Defeating Surprise Through Threat Anticipation and Possibility Management.
26: Memetics for Threat Reduction in Risk Management.
27: High Consequence Threats: Electromagnetic Pulse.
28: High Consequence Threats: Nuclear.
29: Modeling Population Dynamics for Homeland Security Applications.
30: Sensing and Detection.
31: Protecting Security Sensors and Systems.
32: Threat Signatures of Explosive Materials.
33: Radioactive Materials Sensors.
34: Knowledge Extraction from Surveillance Sensors.
35: RADAR and LiDAR Perimeter Protection Sensors.
36: Design Considerations in Development and Application of Chemical and Biological Agent Detectors.
37: Sensing Dispersal of Chemical and Biological Agents in Urban Environments.
38: Sensing Releases of Highly Toxic and Extremely Toxic Compounds.
39: 2D-to-3D Face Recognition Systems.
40: Eye and Iris Sensors.
41: A Tandem Mobility Spectrometer for Chemical Agent and Toxic Industrial Chemical Monitoring.
42: Dynamic Load Balancing for Robust Distributed Computing in the Presence of Topological Impairments.
43: Passive Radio Frequency Identification (RFID) Chemical Sensors for Homeland Security Applications.
44: Protection, Prevention, Response and Recovery.
45: Protection and Prevention: An Overview.
46: Protection and Prevention: Threats and Challenges from a Homeland Defense Perspective.
47: Consequence Mitigation.
48: Security Assessment Methodologies for U.S. Ports and Waterways.
49: Defending Against Malevolent Insiders Using Access Control.
50: Less-Lethal Payloads for Robotic and Automated Response Systems.
51: Defending Against Directed Energy Weapons: RF Weapons and Lasers.
52: The Sensor Web: Advanced Technology for Situational Awareness.
53: Critical Information Infrastructure Protection.
54: Critical Information Infrastructure Protection, Overview.