A Resource Allocation Model for Improving the Resilience of Critical Transportation Systems July 1 , 2014
暂无分享,去创建一个
[1] David Banks,et al. Adversarial Risk Analysis , 2015, IWSPA@CODASPY.
[2] Ahti Salo,et al. Expert judgments in the cost-effectiveness analysis of resource allocations: a case study in military planning , 2014, OR Spectr..
[3] Ahti Salo,et al. A Computational Framework for Prioritization of Events in Fault Tree Analysis Under Interval-Valued Probabilities , 2013, IEEE Transactions on Reliability.
[4] Ahti Salo,et al. Cost-efficiency analysis of weapon system portfolios , 2012, Eur. J. Oper. Res..
[5] Paul Slovic,et al. Risk Perception and Behaviors: Anticipating and Responding to Crises , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[6] Maria Paola Scaparra,et al. Optimal Allocation of Protective Resources in Shortest-Path Networks , 2011, Transp. Sci..
[7] Gregory S Parnell,et al. Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[8] Claudio M. Rocco Sanseverino,et al. Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery , 2009, Reliab. Eng. Syst. Saf..
[9] Ahti Salo,et al. Robust portfolio modeling with incomplete cost information and project interdependencies , 2008, Eur. J. Oper. Res..
[10] M G H Bell,et al. Attacker–defender models and road network vulnerability , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[11] Henry H. Willis,et al. Risk-Based Allocation of Resources to Counter Terrorism , 2008 .
[12] Sergey Sarykalin,et al. Value-at-Risk vs. Conditional Value-at-Risk in Risk Management and Optimization , 2008 .
[13] Helge Langseth,et al. Bayesian Networks in Reliability: Some Recent Developments , 2004 .
[14] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[15] Hamdy A. Taha,et al. Operations research: an introduction / Hamdy A. Taha , 1982 .
[16] Ake J Holmgren,et al. Using Graph Models to Analyze the Vulnerability of Electric Power Networks , 2006, Risk analysis : an official publication of the Society for Risk Analysis.
[17] Massimo Marchiori,et al. Vulnerability and protection of infrastructure networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[18] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[19] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[20] T. Bedford,et al. Probabilistic Risk Analysis: Foundations and Methods , 2001 .
[21] V. Latora,et al. Efficient behavior of small-world networks. , 2001, Physical review letters.
[22] R. Rockafellar,et al. Optimization of conditional value-at risk , 2000 .
[23] David P. Morton,et al. Stochastic Network Interdiction , 1998, Oper. Res..
[24] David B. Dunson,et al. Bayesian Data Analysis , 2010 .
[25] Raimo P. Hämäläinen,et al. Preference Assessment by Imprecise Ratio Statements , 1992, Oper. Res..
[26] Rakesh K. Sarin,et al. Measurable Multiattribute Value Functions , 1979, Oper. Res..