A critical review of container security operations
暂无分享,去创建一个
[1] Catherine L. Mann,et al. Trade Facilitation and Economic Development : New Approach to Quantifying the Impact , 2003 .
[2] Chin-Shan Lu,et al. Safety leadership and safety behavior in container terminal operations , 2010 .
[3] Jun Zhuang,et al. Balancing congestion and security in the presence of strategic applicants with private information , 2011, Eur. J. Oper. Res..
[4] Dong-Ling Xu,et al. Security Based Operation in Container Line Supply Chain: a Literature Review , 2013 .
[5] Khalid Bichou,et al. Overview of contemporary supply chain security initiatives , 2014 .
[6] Qingcheng Zeng,et al. Optimization Model for Truck Appointment in Container Terminals , 2013 .
[7] Mohd Rizaimy Shaharudin,et al. The impact of supply chain security practices on security operational performance among logistics service providers in an emerging economy: Security culture as moderator , 2015 .
[8] Paul Davidsson,et al. A Market-Based Approach to Container Port Terminal Management , 2002 .
[9] Hau L. Lee,et al. Higher supply chain security with lower cost: Lessons from total quality management , 2005 .
[10] Constantinos,et al. An Analysis of Formal Risk Assessments for Safety and Security in Ports: Empirical Evidence from Container Terminals in Greece , 2012 .
[11] Niyazi Onur Bakir,et al. Is Better Nuclear Weapon Detection Capability Justified? , 2011 .
[12] EORG S CHAUR,et al. Time as a Trade Barrier , 2013 .
[13] Stuart Shapiro,et al. The Benefit-Cost Analysis of Security Focused Regulations , 2009 .
[14] Ning Wang,et al. An Intelligent Spatial Collision Risk Based on the Quaternion Ship Domain , 2010, Journal of Navigation.
[15] Lawrence B. Holder,et al. Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment , 2008, ICEC.
[16] George F. List,et al. Using time-varying tolls to optimize truck arrivals at ports , 2011 .
[17] Adolf K.Y. Ng,et al. The impacts of maritime piracy on global economic development: the case of Somalia , 2010 .
[18] Tae-Hun Kim,et al. Ubiquitous Containerized Cargo Monitoring System Development based on Wireless Sensor Network Technology , 2011, Int. J. Comput. Commun. Control.
[19] Alan C. McKinnon,et al. Efficient Hinterland Transport Infrastructure and Services for Large Container Ports , 2013 .
[20] Yi-Chih Yang. Risk management of Taiwan’s maritime supply chain security , 2011 .
[21] Yu Ding,et al. Decision Fusion from Heterogeneous Sensors in Surveillance Sensor Systems , 2011, IEEE Transactions on Automation Science and Engineering.
[22] Yu Ding,et al. Detecting Nuclear Materials Smuggling: Performance Evaluation of Container Inspection Policies , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[23] Saurabh Chandra. Container Security Management; A State-of-the-Art Literature Review and Research Agenda , 2015 .
[24] Lee Cordner. Maritime security: a new outlook , 2015 .
[25] Chung-Yee Lee,et al. The Critical Role of Ocean Container Transport in Global Supply Chain Performance , 2013 .
[26] Franck Guarnieri,et al. A Bayesian network to manage risks of maritime piracy against offshore oil fields , 2014 .
[27] Kap Hwan Kim,et al. Negotiating truck arrival times among trucking companies and a container terminal , 2015 .
[28] Mieczyslaw Szustakowski,et al. Passive automatic anti-piracy defense system of ships , 2013, Optics/Photonics in Security and Defence.
[29] Guanghui Lan,et al. Algorithms for optimizing the placement of stationary monitors , 2015 .
[30] Xinping Yan,et al. Effectiveness of maritime safety control in different navigation zones using a spatial sequential DEA model: Yangtze River case. , 2015, Accident; analysis and prevention.
[31] Jose Emmanuel Ramirez-Marquez,et al. An evolutionary algorithm for port-of-entry security optimization considering sensor thresholds , 2010, Reliab. Eng. Syst. Saf..
[32] Niyazi Onur Bakir. A Brief Analysis Of Threats And Vulnerabilities In The Maritime Domain , 2007 .
[33] Francesco Longo,et al. Design and integration of the containers inspection activities in the container terminal operations , 2010 .
[34] S Bonsall,et al. Use of Fuzzy Evidential Reasoning in Maritime Security Assessment , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[35] Benoît Demil,et al. The box : how the shipping container made the world smaller and the world economy bigger , 2006 .
[36] Qiang Meng,et al. Quantitative Risk Assessment Model for Ship Collisions in the Singapore Strait , 2014 .
[37] Susan E. Martonosi,et al. Applying Risk Assessment To Secure The Containerized Supply Chain , 2007 .
[38] Jose Emmanuel Ramirez-Marquez,et al. Optimization of container inspection strategy via a genetic algorithm , 2011, Ann. Oper. Res..
[39] Jeffery Karafa. SIMULATING GATE STRATEGIES AT INTERMODAL MARINE CONTAINER TERMINALS by , 2012 .
[40] Niyazi Onur Bakir. A Stackelberg game model for resource allocation in cargo container security , 2011, Ann. Oper. Res..
[41] Salam Abdulqadir Abdulrahman,et al. Energy, governance and security in Thailand and Myanmar (Burma): a critical approach to environmental politics in the South , 2018, International Journal of Environmental Studies.
[42] Youfang Huang,et al. Simulation-based heuristic method for container supply chain network optimization , 2015, Adv. Eng. Informatics.
[43] Jose Emmanuel Ramirez-Marquez,et al. Optimization of inspection for dual contraband using a genetic algorithm , 2012 .
[44] Gregory Levitin,et al. Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks , 2015, Eur. J. Oper. Res..
[45] Rommert Dekker,et al. A chassis exchange terminal to reduce truck congestion at container terminals , 2013 .
[46] Khalid Bichou,et al. Assessing the impact of procedural security on container port efficiency , 2011 .
[47] John J. Barthelmes,et al. Homeland Security and Emergency Management , 2013 .
[48] Peter Bernard Marlow,et al. Maritime security: an update of key issues , 2010 .
[49] Paola Papa,et al. US and EU strategies for maritime transport security: A comparative perspective , 2013 .
[50] Wilbert E. Wilhelm,et al. Branch-and-Price Decomposition to Design a Surveillance System for Port and Waterway Security , 2010, IEEE Transactions on Automation Science and Engineering.
[51] Vicki M. Bier,et al. Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation , 2011, Decis. Anal..
[52] Jakub Montewka,et al. A framework for risk assessment for maritime transportation systems - A case study for open sea collisions involving RoPax vessels , 2014, Reliab. Eng. Syst. Saf..
[53] Yi Ding,et al. Identification of efficiency factors for inspection and quarantine clearance using an improved structural equation model , 2014 .
[54] Jaeyoung Cho,et al. Under-water sonar placement , 2014 .
[55] Vicki M. Bier,et al. Target-oriented utility theory for modeling the deterrent effects of counterterrorism , 2015, Reliab. Eng. Syst. Saf..
[56] Yonghong Liu,et al. Application of Bayesian Networks in Quantitative Risk Assessment of Subsea Blowout Preventer Operations , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[57] R. Banomyong. The impact of port and trade security initiatives on maritime supply-chain management , 2005 .
[58] Shailesh Nayak,et al. Coastal Vulnerability Assessment for Orissa State, East Coast of India , 2010 .
[59] Jaouad Boukachour,et al. Building an Expert-System for Maritime Container Security Risk Management , 2011, Int. J. Appl. Logist..
[60] Noah Gans,et al. Estimating the Operational Impact of Container Inspections at International Ports , 2010, Manag. Sci..
[61] Darren Prokop,et al. Smart Containers and the Public Goods Approach to Supply Chain Security , 2012 .
[62] Vicki M. Bier,et al. Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks , 2011, Ann. Oper. Res..
[63] Yi Hu,et al. Throughput estimation based port development and management policies analysis , 2016 .
[64] V. Tummala,et al. Assessing and Managing Risks Using the Supply Chain Risk Management Process (SCRMP) , 2011 .
[65] Feng Pan,et al. Network deployment of radiation detectors with physics-based detection probability calculations , 2011, Ann. Oper. Res..
[66] Carsten Maple,et al. A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem , 2012, Decis. Support Syst..
[67] Yada Zhu,et al. Multiobjective Optimization of a Port-of-Entry Inspection Policy , 2010, IEEE Transactions on Automation Science and Engineering.
[68] Henrik Sternberg,et al. Exploring security effects on transport performance , 2013 .
[69] Yu Ding,et al. Detecting nuclear materials smuggling: using radiography to improve container inspection policies , 2011, Ann. Oper. Res..
[70] Jose Emmanuel Ramirez-Marquez,et al. Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information , 2013 .
[71] Rebecca A. Dreiding,et al. Multilevel, threshold-based policies for cargo container security screening systems , 2012, Eur. J. Oper. Res..
[72] Paul B. Kantor,et al. Optimal sequential inspection policies , 2011, Ann. Oper. Res..
[73] Margherita Pero,et al. Increasing security and efficiency in supply chains: a five-step approach , 2014 .
[74] Ching-Chiao Yang,et al. The effect of supply chain security management on security performance in container shipping operations , 2013 .
[75] Dong-Ping Song,et al. Flow balancing-based empty container repositioning in typical shipping service routes , 2011 .
[76] Z. Yang,et al. Maritime safety analysis in retrospect , 2013 .
[77] Joanne Ellis,et al. Analysis of accidents and incidents occurring during transport of packaged dangerous goods by sea , 2011 .
[78] Xiaojun Shan,et al. Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection - A Three-Stage Game , 2014, Decis. Anal..
[79] David A. Menachof,et al. Using portfolio optimisation to calculate the efficient relationship between maritime port security residual risk and security investment , 2014 .
[80] Catherine A. Cardno. Preparing for the Big One , 2015 .
[81] Khalid Bichou,et al. Risk-Based Cost Assessment of Maritime and Port Security , 2010 .
[82] Jason R. W. Merrick,et al. A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[83] Laura A. McLay,et al. Interdicting nuclear material on cargo containers using knapsack problem models , 2011, Ann. Oper. Res..
[84] David P. Morton,et al. Prioritized interdiction of nuclear smuggling via tabu search , 2015, Optim. Lett..
[85] Francesco Rizzo,et al. Improved security for commercial container transports using an innovative active RFID system , 2011, J. Netw. Comput. Appl..
[86] Xxyyzz. Civil Engineering Magazine , 1900 .
[87] Tayfur Altiok,et al. A mixed integer programming framework for sonar placement to mitigate maritime security risk , 2012 .
[88] Min Xie,et al. Subjective operational reliability assessment of maritime transportation system , 2011, Expert Syst. Appl..
[89] Yu Ding,et al. Using container inspection history to improve interdiction logistics for illicit nuclear materials , 2013 .
[90] Gi-Tae Yeo,et al. Analysis of dynamic effects on seaports adopting port security policy , 2013 .
[91] Jingjing Xu,et al. An analysis of safety and security risks in container shipping operations: A case study of Taiwan , 2014 .
[92] Justin M. Beaver,et al. Decision-level information fusion to assess threat likelihood in shipped containers , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[93] Yada Zhu,et al. Port-of-Entry Inspection: Sensor Deployment Policy Optimization , 2009, IEEE Transactions on Automation Science and Engineering.
[94] Timothy J. Leonard,et al. Security challenges in United States sea ports: an overview , 2015 .
[95] Jose Emmanuel Ramirez-Marquez,et al. Optimal design of container inspection strategies considering multiple objectives via an evolutionary approach , 2012, Ann. Oper. Res..
[96] Parker. Laite,et al. Maritime trade security : promoter of terrorism? , 2010 .
[97] Jannette Huberts,et al. Library of Congress. Congressional Research Service , 2016 .
[98] Xiangtong Qi,et al. Minimizing fuel emissions by optimizing vessel schedules in liner shipping with uncertain port times , 2012 .
[99] Mitra Fouladirad,et al. Condition-based inspection/replacement policies for non-monotone deteriorating systems with environmental covariates , 2010, Reliab. Eng. Syst. Saf..
[100] Dong-Ping Song,et al. Risk analysis for container shipping: from a logistics perspective , 2015 .
[101] David Hummels,et al. Time as a Trade Barrier , 2002, GTAP Working Paper.
[102] Rebecca A. Dreiding. Allocating Homeland Security Screening Resources Using Knapsack Problem Models , 2010 .
[103] Joseph Geunes,et al. Modern network interdiction problems and algorithms , 2013 .
[104] Jin Wang,et al. An advanced risk analysis approach for container port safety evaluation , 2014 .
[105] Rebecca A. Dreiding,et al. An integrated model for screening cargo containers , 2013, Eur. J. Oper. Res..
[106] J. Rene Villalobos,et al. A multi-objective optimization primary planning model for a POE (Port-of-Entry) inspection , 2012 .
[107] Ingrid Bouwer Utne,et al. Human Fatigue’s Effect on the Risk of Maritime Groundings - A Bayesian Network Modeling Approach , 2014 .
[108] Johan Pieter de Villiers,et al. Maritime piracy situation modelling with dynamic Bayesian networks , 2015, Inf. Fusion.
[109] Michael D. Greenberg,et al. Maritime Terrorism: Risk and Liability , 2006 .
[110] Shehu Usman Gidado. Cargo Risk Management in International Transport and Logistics , 2016 .
[111] Yi-Chih Yang,et al. Impact of the container security initiative on Taiwan's shipping industry , 2010 .
[112] Qiang Meng,et al. An Overview of Maritime Waterway Quantitative Risk Assessment Models , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[113] Francesco Longo,et al. Performance Analysis of a Southern Mediterranean Seaport via Discrete-Event Simulation , 2013 .
[114] Jason R. W. Merrick,et al. Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile? , 2010, Decis. Anal..
[115] T. Notteboom,et al. The effect of high fuel costs on liner service configuration in container shipping , 2009 .
[116] Zaili Yang,et al. A new risk quantification approach in port facility security assessment , 2014 .
[117] Jorma Rytkönen,et al. Maritime safety and security : Literature review , 2012 .
[118] C. Mann,et al. Trade Facilitation and Economic Development : New Approach to Quantifying the Impact , 2003 .
[119] Vinh V. Thai,et al. Do port security quality and service quality influence customer satisfaction and loyalty? , 2016 .
[120] Supply Chain Security in Container Transport Recommendations towards an Improved Information System Architecture PROTECT work package 5 , 2007 .