Timely exposure of a secret project: Which activities to monitor?
暂无分享,去创建一个
Herbert Hamers | Roel Leus | Ben Hermans | Roy H. A. Lindelauf | R. Leus | H. Hamers | R. Lindelauf | Ben Hermans
[1] Edward H. Kaplan,et al. Terror Queues , 2010, Oper. Res..
[2] Lawrence M. Wein,et al. An Overlapping Networks Approach to Resource Allocation for Domestic Counterterrorism , 2010 .
[3] Kevin D. Glazebrook,et al. Optimal patrol to uncover threats in time when detection is imperfect , 2014 .
[4] Edward H. Kaplan,et al. Estimating the Duration of Jihadi Terror Plots in the United States , 2012 .
[5] Moshe Kress,et al. Finding the needles in the haystack: efficient intelligence processing , 2016, J. Oper. Res. Soc..
[6] Gregory A. Godfrey,et al. Likelihood-based optimization of threat operation timeline estimation , 2009, 2009 12th International Conference on Information Fusion.
[7] Edieal J. Pinker,et al. Public Warnings in Counterterrorism Operations: Managing the "Cry-Wolf" Effect When Facing a Strategic Adversary , 2018, Oper. Res..
[8] Edieal J. Pinker,et al. Technical Note - Managing a Secret Project , 2013, Oper. Res..
[9] Edieal J. Pinker,et al. On the complexity of project scheduling to minimize exposed time , 2014, Eur. J. Oper. Res..
[10] John Cunningham,et al. A Bayesian, Nonlinear Particle Filtering Approach for Tracking the State of Terrorist Operations , 2007, 2007 IEEE Intelligence and Security Informatics.
[11] Gerald G. Brown,et al. Anatomy of a Project to Produce a First Nuclear Weapon , 2006 .
[12] Kenneth L. Lasoen. War of Nerves: The Domestic Terror Threat and the Belgian Army , 2018 .
[13] Bernhard von Stengel,et al. Recursive Inspection Games , 2014, Math. Oper. Res..
[14] Johannes O. Royset,et al. On the Complexity of Delaying an Adversary’s Project , 2005 .
[15] L. S. Shapley,et al. 17. A Value for n-Person Games , 1953 .
[16] Roberto Szechtman,et al. Scheduling policies for an antiterrorist surveillance system , 2009 .
[17] Pradeep Dubey,et al. Value Theory Without Efficiency , 1981, Math. Oper. Res..
[18] Daniel Kuhn,et al. Interdiction Games on Markovian PERT Networks , 2015, Manag. Sci..
[19] John N. Tsitsiklis,et al. Delay-Predictability Trade-offs in Reaching a Secret Goal , 2018, Oper. Res..
[20] M. Townsley,et al. Crime Script Analysis of Drug Manufacturing In Clandestine Laboratories Implications for Prevention , 2011 .
[21] Moshe Kress,et al. When Is Information Sufficient for Action? Search with Unreliable yet Informative Intelligence , 2016, Oper. Res..
[22] James E. Kelley,et al. Critical-Path Planning and Scheduling: Mathematical Basis , 1961 .
[23] Gerald G. Brown,et al. Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..
[24] Rudolf Avenhaus,et al. Playing for time: A sequential inspection game , 2005, Eur. J. Oper. Res..
[25] Moshe Kress,et al. Models of sensor operations for border surveillance , 2008 .
[26] Jerry S. Kelly,et al. NP-completeness of some problems concerning voting games , 1990 .
[27] R. Kemp. Environmental Detection of Clandestine Nuclear Weapon Programs , 2016 .
[28] Steve Alpern,et al. Mining Coal or Finding Terrorists: The Expanding Search Paradigm , 2013, Oper. Res..
[29] D. Leech. An Empirical Comparison of the Performance of Classical Power Indices , 2002 .
[30] Edward H. Kaplan,et al. OR Forum - Intelligence Operations Research: The 2010 Philip McCord Morse Lecture , 2012, Oper. Res..
[31] Edieal J. Pinker. An Analysis of Short-Term Responses to Threats of Terrorism , 2007, Manag. Sci..
[32] Steve Alpern,et al. Patrolling a Border , 2016, Oper. Res..