Target-oriented utility for interdiction of transportation networks

[1]  Guanghui Lan,et al.  Algorithms for optimizing the placement of stationary monitors , 2015 .

[2]  Vicki M. Bier,et al.  Target-oriented utility theory for modeling the deterrent effects of counterterrorism , 2015, Reliab. Eng. Syst. Saf..

[3]  R. Johnstone Protecting Transportation: Implementing Security Policies and Programs , 2015 .

[4]  Tao Yao,et al.  A Heuristic Method for Identifying Near-Optimal Defending Strategies for a Road Network Subject to Traffic Congestion , 2015 .

[5]  Kelly M. Sullivan,et al.  Securing a border under asymmetric information , 2014 .

[6]  Kjell Hausken,et al.  Defending and attacking a network of two arcs subject to traffic congestion , 2013, Reliab. Eng. Syst. Saf..

[7]  Kjell Hausken On the Impossibility of Deterrence in Sequential Colonel Blotto Games , 2012, IGTR.

[8]  Thomas A. Loughran,et al.  Re-Examining the Functional Form of the Certainty Effect in Deterrence Theory , 2012 .

[9]  Kjell Hausken,et al.  The timing and deterrence of terrorist attacks due to exogenous dynamics , 2012, J. Oper. Res. Soc..

[10]  Irene Casas,et al.  Role of Spatial Data in the Protection of Critical Infrastructure and Homeland Defense , 2010, Applied Spatial Analysis and Policy.

[11]  Sujeevraja Sanjeevi,et al.  Assessing the impact of vulnerability modeling in the protection of critical infrastructure , 2012, J. Geogr. Syst..

[12]  S. Lubore,et al.  Finding the N most vital links in flow networks , 2011 .

[13]  Vicki M. Bier,et al.  Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks , 2011, Ann. Oper. Res..

[14]  Feng Pan,et al.  Network deployment of radiation detectors with physics-based detection probability calculations , 2011, Ann. Oper. Res..

[15]  Vicki M. Bier,et al.  Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation , 2011, Decis. Anal..

[16]  Mark H. Karwan,et al.  Optimal placement of sensors and interception resource assessment for the protection of regional infrastructure from covert attack , 2011 .

[17]  Paul K. Davis,et al.  Measuring the Effectiveness of Border Security Between Ports-of-Entry , 2010 .

[18]  Brian A. Jackson,et al.  Understanding the Role of Deterrence in Counterterrorism Security , 2009 .

[19]  Robert Powell,et al.  Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..

[20]  William L. McGill Defensive dissuasion in security risk management , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[21]  M. C. Jones Kumaraswamy’s distribution: A beta-type distribution with some tractability advantages , 2009 .

[22]  Halil Bayrak,et al.  Shortest path network interdiction with asymmetric information , 2008, Networks.

[23]  Rae Zimmerman,et al.  Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[24]  Frank Southworth,et al.  Multi-Criteria Sensor Placement for Emergency Response , 2008 .

[25]  Lawrence M. Wein,et al.  Technical Note - Spatial Queueing Analysis of an Interdiction System to Protect Cities from a Nuclear Terrorist Attack , 2008, Oper. Res..

[26]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[27]  M. Naceur Azaiez,et al.  Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..

[28]  Michael P. Atkinson,et al.  The Last Line of Defense: Designing Radiation Detection-Interdiction Systems to Protect Cities From a Nuclear Terrorist Attack , 2007, IEEE Transactions on Nuclear Science.

[29]  Howard Kunreuther,et al.  Modeling Interdependent Risks , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[30]  David P. Morton,et al.  Models for nuclear smuggling interdiction , 2007 .

[31]  Roger M. Cooke,et al.  Techniques for generic probabilistic inversion , 2006, Comput. Stat. Data Anal..

[32]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[33]  Tim Bedford,et al.  Probabilistic Inversion of Expert Judgments in the Quantification of Model Uncertainty , 2005, Manag. Sci..

[34]  Vicki M. Bier,et al.  Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..

[35]  Robert F. Bordley,et al.  Multiattribute Preference Analysis with Performance Targets , 2004, Oper. Res..

[36]  T. Sandler,et al.  Terrorism & Game Theory , 2003 .

[37]  R. Zeckhauser,et al.  The Ecology of Terror Defense , 2003 .

[38]  David L. Woodruff,et al.  Interdicting Stochastic Networks with Binary Interdiction Effort , 2003 .

[39]  Camille N.Y. Fink,et al.  Antiterrorism Security and Surface Transportation Systems: Review of Case Studies and Current Tactics , 2003 .

[40]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[41]  John A. Major Advanced Techniques for Modeling Terrorism Risk , 2002 .

[42]  Hanif D. Sherali,et al.  On mixed-integer zero-one representations for separable lower-semicontinuous piecewise-linear functions , 2001, Oper. Res. Lett..

[43]  David P. Morton,et al.  Stochastic Network Interdiction , 1998, Oper. Res..

[44]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[45]  R. Cooke Experts in Uncertainty: Opinion and Subjective Probability in Science , 1991 .

[46]  A. K. Mittal,et al.  The k most vital arcs in the shortest path problem , 1990 .

[47]  Gary J. Russell,et al.  A Probabilistic Choice Model for Market Segmentation and Elasticity Structure , 1989 .

[48]  R. Vohra,et al.  Finding the most vital arcs in a network , 1989 .

[49]  H. W. Corley,et al.  Most vital links and nodes in weighted networks , 1982, Oper. Res. Lett..

[50]  R. Duncan Luce,et al.  Individual Choice Behavior: A Theoretical Analysis , 1979 .

[51]  B. Golden A problem in network interdiction , 1978 .

[52]  Delbert Ray Fulkerson,et al.  Maximizing the minimum source-sink path subject to a budget constraint , 1977, Math. Program..

[53]  W. C. Turner,et al.  Optimal interdiction policy for a flow network , 1971 .

[54]  Alan W. McMasters,et al.  Optimal interdiction of a supply network , 1970 .