A security vulnerability analysis model for dangerous goods transportation by rail – Case study: Chlorine transportation in Texas-Illinois
暂无分享,去创建一个
Navid Khademi | Seyed Farid Ghannadpour | Morteza Bagheri | S. F. Ghannadpour | M. Bagheri | Navid Khademi | Masoud Khanmohamadi | Masoud Khanmohamadi
[1] Yang Lu,et al. A game theory approach for the measurement of transport network vulnerability from the system prospective , 2014 .
[2] Michel Gendreau,et al. An exact epsilon-constraint method for bi-objective combinatorial optimization problems: Application to the Traveling Salesman Problem with Profits , 2009, Eur. J. Oper. Res..
[3] Mohammad Mahdi Nasiri,et al. Vulnerability evaluation of freight railway networks using a heuristic routing and scheduling optimization model , 2019 .
[4] Michael G.H. Bell,et al. Risk-averse user equilibrium traffic assignment: an application of game theory , 2002 .
[5] Michael G.H. Bell. Games, Heuristics, and Risk Averseness in Vehicle Routing Problems , 2004 .
[6] Bin Chen,et al. Playing Chemical Plant Environmental Protection Games with Historical Monitoring Data , 2017, International journal of environmental research and public health.
[7] Aura Reggiani,et al. Network resilience for transport security: Some methodological considerations , 2013 .
[8] Joseph N. Prashker,et al. The applicability of non-cooperative game theory in transport analysis , 2006 .
[9] Vedat Verter,et al. Transport Mode Selection for Toxic Gases: Rail or Road? , 2014, Risk analysis : an official publication of the Society for Risk Analysis.
[10] David A Moore,et al. Development of a security vulnerability assessment process for the RAMCAP chemical sector. , 2007, Journal of hazardous materials.
[11] Linda K. Nozick,et al. Game theory-based identification of facility use restrictions for the movement of hazardous materials under terrorist threat , 2012 .
[12] Manish Verma,et al. A defender-attacker-defender approach to the optimal fortification of a rail intermodal terminal network , 2015 .
[13] Wai Yuen Szeto,et al. Link-based multi-class hazmat routing-scheduling problem: A multiple demon approach , 2017, Eur. J. Oper. Res..
[14] Katja Berdica,et al. AN INTRODUCTION TO ROAD VULNERABILITY: WHAT HAS BEEN DONE, IS DONE AND SHOULD BE DONE , 2002 .
[15] Genserik Reniers,et al. A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks. , 2016, Risk analysis : an official publication of the Society for Risk Analysis.
[16] Elise Miller-Hooks,et al. Measuring the performance of transportation infrastructure systems in disasters: a comprehensive review , 2015 .
[17] Panos M. Pardalos,et al. Handbook of Multicriteria Analysis , 2010 .
[18] Genserik Reniers,et al. Playing chemical plant protection game with distribution-free uncertainties , 2019, Reliab. Eng. Syst. Saf..
[19] Kenneth Sörensen,et al. MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries , 2015, Reliab. Eng. Syst. Saf..
[20] George Mavrotas,et al. Effective implementation of the epsilon-constraint method in Multi-Objective Mathematical Programming problems , 2009, Appl. Math. Comput..
[21] Mohammad Mahdi Nasiri,et al. Vulnerability analysis of railway networks in case of multi-link blockage , 2017 .
[22] Gabriele Landucci,et al. Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network , 2018, Reliab. Eng. Syst. Saf..
[23] Edieal J. Pinker. A Mathematical Analysis of Short-term Responses to Threats of Terrorism , 2009 .
[24] Angélica Lozano,et al. Analysis of hazmat transportation accidents in congested urban areas, based on actual accidents in Mexico , 2010 .
[25] Navid Khademi,et al. Transportation network vulnerability analysis for the case of a catastrophic earthquake , 2015 .
[26] Zhilong Chen,et al. Using game theory to optimize allocation of defensive resources to protect multiple chemical facilities in a city against terrorist attacks , 2016 .
[27] Navid Khademi,et al. Interurban rail network robustness analysis: Case study of Iran , 2015 .
[28] Genserik Reniers,et al. A method to assess multi-modal Hazmat transport security vulnerabilities: Hazmat transport SVA , 2013 .
[29] J. Neumann. Zur Theorie der Gesellschaftsspiele , 1928 .
[30] Philip E. Auerswald,et al. Rail Transportation of Toxic Inhalation Hazards: Policy Responses to the Safety and Security Externality , 2010 .
[31] E. Garbolino,et al. Dangerous Goods Transportation and Biophysical Vulnerability: The Contribution of GIS and Simulation Softwares , 2012 .
[32] Robert L. Burdett,et al. A railway capacity determination model and rail access charging methodologies , 2005 .
[33] Wai Yuen Szeto. Routing and scheduling hazardous material shipments: Nash game approach , 2013 .
[34] V. Latora,et al. Vulnerability and Protection of Critical Infrastructures , 2004, cond-mat/0407491.
[35] Vedat Verter,et al. Railroad transportation of dangerous goods: Population exposure to airborne toxins , 2007, Comput. Oper. Res..
[36] Ruey Long Cheu,et al. GIS and genetic algorithms for HAZMAT route planning with security considerations , 2004, Int. J. Geogr. Inf. Sci..
[37] Shuliang Wang,et al. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks , 2017 .
[38] Chiara Vianello,et al. Risk management of terrorist attacks in the transport of hazardous materials using dynamic geoevents , 2009 .
[39] Nima Khakzad,et al. A multi-criteria decision making approach to security assessment of hazardous facilities , 2017 .
[40] Michael G.H. Bell,et al. A game theory approach to measuring the performance reliability of transport networks , 2000 .
[41] Linda K. Nozick,et al. Optimizing Facility Use Restrictions for the Movement of Hazardous Materials. , 2008 .
[42] Chase Rainwater,et al. Vulnerability assessment and re-routing of freight trains under disruptions: A coal supply chain network application , 2014 .
[43] Faisal I. Khan,et al. Functional quantitative security risk analysis (QSRA) to assist in protecting critical process infrastructure , 2017, Reliab. Eng. Syst. Saf..
[44] Nima Khakzad,et al. Optimal patrol scheduling of hazardous pipelines using game theory , 2017 .
[45] M G H Bell,et al. Attacker–defender models and road network vulnerability , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[46] M. Sciutto,et al. A Quantitative Approach to Risk Management in Critical Infrastructures , 2014 .
[47] Satish V. Ukkusuri,et al. A methodology to assess the criticality of highway transportation networks , 2009 .