Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers
暂无分享,去创建一个
Huseyin Cavusoglu | Bin Mai | Srinivasan Raghunathan | Young Kwark | Huseyin Cavusoglu | Srinivasan Raghunathan | Young Kwark | Bin Mai
[1] Qianmei Feng,et al. A mathematical framework for sequential passenger and baggage screening to enhance aviation security , 2009, Comput. Ind. Eng..
[2] Julie L Virta,et al. Analyzing the cost of screening selectee and non-selectee baggage. , 2003, Risk analysis : an official publication of the Society for Risk Analysis.
[3] Sheldon Howard Jacobson,et al. Probability models for access security system architectures , 1997 .
[4] Sheldon H. Jacobson,et al. A Sequential Stochastic Security System Design Problem for Aviation Security , 2007, Transp. Sci..
[5] Sheldon Howard Jacobson,et al. Modeling aviation baggage screening security systems: a case study , 2003 .
[6] Sheldon Howard Jacobson,et al. A Detection Theoretic approach to Modeling Aviation Security Problems using the Knapsack Problem , 2001 .
[7] Robert W Poole,et al. A Risk-based Airport Security Policy , 2003 .
[8] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[9] Jason R. W. Merrick,et al. Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile? , 2010, Decis. Anal..
[10] CavusogluHuseyin,et al. Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers , 2013 .
[11] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .
[12] Marlin U. Thomas,et al. An infiltration game with time dependent payoff , 1976 .
[13] Vicki M. Bier,et al. Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks , 2011, Ann. Oper. Res..
[14] Charles F. Manski. Profiling: Introduction to the Feature , 2006 .
[15] Aaron Strauss,et al. Carnival Booth: An Algorithm for Defeating the Computer-Assisted Passenger Screening System , 2002, First Monday.
[16] Derral Cheatwood,et al. Capital Punishment and the Deterrence of Violent Crime in Comparable Counties , 1993 .
[17] Sheldon Howard Jacobson,et al. A multilevel passenger screening problem for aviation security , 2006 .
[18] Huseyin Cavusoglu,et al. The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..
[19] Butler,et al. RE-THINKING CHECKED-BAGGAGE SCREENING , 2002 .
[20] Huseyin Cavusoglu,et al. Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches , 2004, Decis. Anal..
[21] Sheldon Howard Jacobson,et al. Assessing the impact of deterrence on aviation checked baggage screening strategies , 2005 .
[22] Arnold Barnett,et al. Airline Safety: The Last Decade , 1989 .
[23] Steven Shavell,et al. The Optimal Tradeoff between the Probability and Magnitude of Fines , 1981 .
[24] Timothy M. Ravich. Airline Passenger Profiling Systems After 9/11: Personal Privacy versus National Security , 2010 .
[25] Huseyin Cavusoglu,et al. Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems , 2009, Inf. Syst. Res..
[26] Eric Miller,et al. Testing and evaluating computer intrusion detection systems , 1999, CACM.
[27] Sheldon Howard Jacobson,et al. Integer programming models and analysis for a multilevel passenger screening problem , 2007 .
[28] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[29] Dilip Mookherjee,et al. Monitoring vis-a-vis Investigation in Enforcement of Law , 1992 .
[30] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[31] D. Marc Kilgour,et al. Site selection for on‐site inspection in arms control , 1992 .
[32] G. Feichtinger. A Differential Games Solution to a Model of Competition Between a Thief and the Police , 1983 .
[33] Sheldon H. Jacobson,et al. Risk-Based Policies for Airport Security Checkpoint Screening , 2010, Transp. Sci..
[34] Steven Shavell,et al. Specific versus General Enforcement of Law , 1989, Journal of Political Economy.
[35] John E. Gaffney,et al. A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems , 2004, Decis. Anal..
[36] L. Kornhauser,et al. Monitoring vis-a-vis Investigation in Enforcement of Law , 2008 .
[37] George J. Stigler,et al. The Optimum Enforcement of Laws , 1970, Journal of Political Economy.
[38] Huseyin Cavusoglu,et al. An Analysis of the Impact of Passenger Profiling for Transportation Security , 2010, Oper. Res..