The Nested Event Tree Model with Application to Combating Terrorism
暂无分享,去创建一个
[2] Rae Zimmerman,et al. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[3] George L. Nemhauser,et al. Mixed-Integer Models for Nonseparable Piecewise-Linear Optimization: Unifying Framework and Extensions , 2010, Oper. Res..
[4] Benjamin F. Hobbs,et al. EVENT TREE ANALYSIS OF LOCK CLOSURE RISKS , 1997 .
[5] Hanif D. Sherali,et al. Selecting Optimal Alternatives and Risk Reduction Strategies in Decision Trees , 2011, Oper. Res..
[6] Pavel Albores,et al. Government preparedness: Using simulation to prepare for a terrorist attack , 2008, Comput. Oper. Res..
[7] Martin J. Alperen. National Strategy for Combating Terrorism, September, 2006 , 2011 .
[8] Todd Masse,et al. The Department of Homeland Security's Risk Assessment Methodology: Evolution, Issues, and Options for Congress , 2007 .
[9] Uriel G. Rothblum,et al. Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..
[10] George W. Bush,et al. National Strategy for Combating Terrorism , 2009 .
[11] Nikolaos V. Sahinidis,et al. A branch-and-reduce approach to global optimization , 1996, J. Glob. Optim..
[12] Irem Y. Tumer,et al. Risk-Based Decision-Making for Managing Resources During the Design of Complex Space Exploration Systems , 2006 .
[13] Hanif D. Sherali,et al. On mixed-integer zero-one representations for separable lower-semicontinuous piecewise-linear functions , 2001, Oper. Res. Lett..
[14] Alexander Martin,et al. Mixed Integer Models for the Stationary Case of Gas Network Optimization , 2006, Math. Program..
[15] Hanif D. Sherali,et al. Comparison of Two Reformulation-Linearization Technique Based Linear Programming Relaxations for Polynomial Programming Problems , 1997, J. Glob. Optim..
[16] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[17] Hanif D. Sherali,et al. Global optimization of nonconvex factorable programming problems , 2001, Math. Program..
[18] Richard L. Church,et al. A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..
[19] Robin L. Dillon,et al. Including technical and security risks in the management of information systems: A programmatic risk management model , 2005 .
[20] Martin J. Alperen. National Strategy for Homeland Security, October 2007 , 2011 .
[21] Henry H. Willis,et al. Estimating Terrorism Risk , 2002 .
[22] Hanif D. Sherali,et al. Optimal Allocation of Risk-Reduction Resources in Event Trees , 2008, Manag. Sci..