Target-oriented utility for interdiction of transportation networks
暂无分享,去创建一个
[1] Guanghui Lan,et al. Algorithms for optimizing the placement of stationary monitors , 2015 .
[2] Vicki M. Bier,et al. Target-oriented utility theory for modeling the deterrent effects of counterterrorism , 2015, Reliab. Eng. Syst. Saf..
[3] R. Johnstone. Protecting Transportation: Implementing Security Policies and Programs , 2015 .
[4] Tao Yao,et al. A Heuristic Method for Identifying Near-Optimal Defending Strategies for a Road Network Subject to Traffic Congestion , 2015 .
[5] Kelly M. Sullivan,et al. Securing a border under asymmetric information , 2014 .
[6] Kjell Hausken,et al. Defending and attacking a network of two arcs subject to traffic congestion , 2013, Reliab. Eng. Syst. Saf..
[7] Kjell Hausken. On the Impossibility of Deterrence in Sequential Colonel Blotto Games , 2012, IGTR.
[8] Thomas A. Loughran,et al. Re-Examining the Functional Form of the Certainty Effect in Deterrence Theory , 2012 .
[9] Kjell Hausken,et al. The timing and deterrence of terrorist attacks due to exogenous dynamics , 2012, J. Oper. Res. Soc..
[10] Irene Casas,et al. Role of Spatial Data in the Protection of Critical Infrastructure and Homeland Defense , 2010, Applied Spatial Analysis and Policy.
[11] Sujeevraja Sanjeevi,et al. Assessing the impact of vulnerability modeling in the protection of critical infrastructure , 2012, J. Geogr. Syst..
[12] S. Lubore,et al. Finding the N most vital links in flow networks , 2011 .
[13] Vicki M. Bier,et al. Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks , 2011, Ann. Oper. Res..
[14] Feng Pan,et al. Network deployment of radiation detectors with physics-based detection probability calculations , 2011, Ann. Oper. Res..
[15] Vicki M. Bier,et al. Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation , 2011, Decis. Anal..
[16] Mark H. Karwan,et al. Optimal placement of sensors and interception resource assessment for the protection of regional infrastructure from covert attack , 2011 .
[17] Paul K. Davis,et al. Measuring the Effectiveness of Border Security Between Ports-of-Entry , 2010 .
[18] Brian A. Jackson,et al. Understanding the Role of Deterrence in Counterterrorism Security , 2009 .
[19] Robert Powell,et al. Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..
[20] William L. McGill. Defensive dissuasion in security risk management , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.
[21] M. C. Jones. Kumaraswamy’s distribution: A beta-type distribution with some tractability advantages , 2009 .
[22] Halil Bayrak,et al. Shortest path network interdiction with asymmetric information , 2008, Networks.
[23] Rae Zimmerman,et al. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[24] Frank Southworth,et al. Multi-Criteria Sensor Placement for Emergency Response , 2008 .
[25] Lawrence M. Wein,et al. Technical Note - Spatial Queueing Analysis of an Interdiction System to Protect Cities from a Nuclear Terrorist Attack , 2008, Oper. Res..
[26] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[27] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[28] Michael P. Atkinson,et al. The Last Line of Defense: Designing Radiation Detection-Interdiction Systems to Protect Cities From a Nuclear Terrorist Attack , 2007, IEEE Transactions on Nuclear Science.
[29] Howard Kunreuther,et al. Modeling Interdependent Risks , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[30] David P. Morton,et al. Models for nuclear smuggling interdiction , 2007 .
[31] Roger M. Cooke,et al. Techniques for generic probabilistic inversion , 2006, Comput. Stat. Data Anal..
[32] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[33] Tim Bedford,et al. Probabilistic Inversion of Expert Judgments in the Quantification of Model Uncertainty , 2005, Manag. Sci..
[34] Vicki M. Bier,et al. Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..
[35] Robert F. Bordley,et al. Multiattribute Preference Analysis with Performance Targets , 2004, Oper. Res..
[36] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[37] R. Zeckhauser,et al. The Ecology of Terror Defense , 2003 .
[38] David L. Woodruff,et al. Interdicting Stochastic Networks with Binary Interdiction Effort , 2003 .
[39] Camille N.Y. Fink,et al. Antiterrorism Security and Surface Transportation Systems: Review of Case Studies and Current Tactics , 2003 .
[40] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[41] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[42] Hanif D. Sherali,et al. On mixed-integer zero-one representations for separable lower-semicontinuous piecewise-linear functions , 2001, Oper. Res. Lett..
[43] David P. Morton,et al. Stochastic Network Interdiction , 1998, Oper. Res..
[44] R. Kevin Wood,et al. Deterministic network interdiction , 1993 .
[45] R. Cooke. Experts in Uncertainty: Opinion and Subjective Probability in Science , 1991 .
[46] A. K. Mittal,et al. The k most vital arcs in the shortest path problem , 1990 .
[47] Gary J. Russell,et al. A Probabilistic Choice Model for Market Segmentation and Elasticity Structure , 1989 .
[48] R. Vohra,et al. Finding the most vital arcs in a network , 1989 .
[49] H. W. Corley,et al. Most vital links and nodes in weighted networks , 1982, Oper. Res. Lett..
[50] R. Duncan Luce,et al. Individual Choice Behavior: A Theoretical Analysis , 1979 .
[51] B. Golden. A problem in network interdiction , 1978 .
[52] Delbert Ray Fulkerson,et al. Maximizing the minimum source-sink path subject to a budget constraint , 1977, Math. Program..
[53] W. C. Turner,et al. Optimal interdiction policy for a flow network , 1971 .
[54] Alan W. McMasters,et al. Optimal interdiction of a supply network , 1970 .