메뉴 건너뛰기




Volumn 5, Issue 1, 2005, Pages 1-15

Assessing the impact of deterrence on aviation checked baggage screening strategies

Author keywords

aviation security; checked baggage screening; cost models; deterrence

Indexed keywords


EID: 33645324247     PISSN: 14668297     EISSN: 17415241     Source Type: Journal    
DOI: 10.1504/IJRAM.2005.006608     Document Type: Article
Times cited : (17)

References (13)
  • 1
    • 33645321768 scopus 로고    scopus 로고
    • Rethinking checked baggage screening
    • Policy Study 278, Los Angeles, CA, July 2002
    • Butler, V. and Poole Jr., R.W. (2002) ‘Rethinking checked baggage screening’, Reason Foundation, Policy Study 278, Los Angeles, CA, July 2002.
    • (2002) Reason Foundation
    • Butler, V.1    Poole, R.W.2
  • 2
    • 0011074380 scopus 로고
    • Properties of expected costs and performance measures in stochastic models of scheduled transport
    • Carey, M. and Kwiecinski, A. (1995) ‘Properties of expected costs and performance measures in stochastic models of scheduled transport’, European Journal of Operational Research, Vol. 83, No. 1, pp.182–199.
    • (1995) European Journal of Operational Research , vol.83 , Issue.1 , pp. 182-199
    • Carey, M.1    Kwiecinski, A.2
  • 3
    • 0029494896 scopus 로고
    • An approximation to the continuous review inventory model with perishable items and lead times
    • Chiu, H. (1995) ‘An approximation to the continuous review inventory model with perishable items and lead times’, European Journal of Operational Research, Vol. 87, No. 1, pp.93–108.
    • (1995) European Journal of Operational Research , vol.87 , Issue.1 , pp. 93-108
    • Chiu, H.1
  • 4
    • 0039477741 scopus 로고    scopus 로고
    • A cost model for managing information security hazards
    • Ekenberg, L., Oberoi, S. and Ocri, I. (2002) ‘A cost model for managing information security hazards’, Computers & Security, Vol. 14, No. 8, pp.707–717.
    • (2002) Computers & Security , vol.14 , Issue.8 , pp. 707-717
    • Ekenberg, L.1    Oberoi, S.2    Ocri, I.3
  • 5
    • 0030165671 scopus 로고    scopus 로고
    • Optimal maintenance policies for several imperfect repair models
    • Hongzhou, W. and Pham, H. (1996) ‘Optimal maintenance policies for several imperfect repair models’, International Journal of Systems Science, Vol. 27, No. 6, pp.543–549.
    • (1996) International Journal of Systems Science , vol.27 , Issue.6 , pp. 543-549
    • Hongzhou, W.1    Pham, H.2
  • 8
    • 84952968641 scopus 로고
    • Toward a model of security for a network of computers
    • Murray, W.H. and Farrell, P. (1993) ‘Toward a model of security for a network of computers’, Computer Security Journal, Vol. 9, No. 1, pp.1–13.
    • (1993) Computer Security Journal , vol.9 , Issue.1 , pp. 1-13
    • Murray, W.H.1    Farrell, P.2
  • 9
    • 0030148657 scopus 로고    scopus 로고
    • A software cost model with imperfect Debugging, Random life cycle and penalty cost
    • Pham, H. (1996) ‘A software cost model with imperfect Debugging, Random life cycle and penalty cost’, International Journal of Systems Science, Vol. 27, No. 5, pp.455–463.
    • (1996) International Journal of Systems Science , vol.27 , Issue.5 , pp. 455-463
    • Pham, H.1
  • 10
    • 0030283314 scopus 로고    scopus 로고
    • Fatigue reliability of wind turbine fleets: the effect of uncertainty on projected costs
    • Veers, P.S. (1996) ‘Fatigue reliability of wind turbine fleets: the effect of uncertainty on projected costs’, Transactions of the ASME-Journal of Solar Energy Engineering, Vol. 118, No. 4, pp.222–227.
    • (1996) Transactions of the ASME-Journal of Solar Energy Engineering , vol.118 , Issue.4 , pp. 222-227
    • Veers, P.S.1
  • 11
    • 0141816735 scopus 로고    scopus 로고
    • Analyzing the cost of screening selectee and non-selectee baggage
    • Virta, J.L., Jacobson, S.H. and Kobza, J.E. (2003) ‘Analyzing the cost of screening selectee and non-selectee baggage’, Risk Analysis, Vol. 23, No. 5, pp.897–908.
    • (2003) Risk Analysis , vol.23 , Issue.5 , pp. 897-908
    • Virta, J.L.1    Jacobson, S.H.2    Kobza, J.E.3
  • 12
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • Wenke, L., Wei, F., Miller, M., Stolfo, S. and Zadok, E. (2002) ‘Toward cost-sensitive modeling for intrusion detection and response’, Journal of Computer Security, Vol. 10, No. 1/2, pp.5–22.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 5-22
    • Wenke, L.1    Wei, F.2    Miller, M.3    Stolfo, S.4    Zadok, E.5
  • 13
    • 0032136624 scopus 로고    scopus 로고
    • Including a DC network approximation in a multiarea probabilistic costing model
    • Yuandong, J. and Hobbs, B.F. (1998) ‘Including a DC network approximation in a multiarea probabilistic costing model’, IEEE Transactions on Power Systems, Vol. 13, No. 3, pp.1121–1127.
    • (1998) IEEE Transactions on Power Systems , vol.13 , Issue.3 , pp. 1121-1127
    • Yuandong, J.1    Hobbs, B.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.