William P. Fox
In this paper we will examine a threat risk assessment process and modelling methodology that could be used by local law enforcement, homeland security, or military units to examine possible terrorist threats. We provide examples from a risk assessment process and a dark network. We apply different multi-attribute schemes to the threats. We also apply sensitivity analysis to the methods.