-
3
-
-
45849083859
-
Network search games with immobile hider, without a designated searcher starting point
-
S. Alpern, V. Baston, and S. Gal Network search games with immobile hider, without a designated searcher starting point International Journal of Game Theory 37 2008 281 302
-
(2008)
International Journal of Game Theory
, vol.37
, pp. 281-302
-
-
Alpern, S.1
Baston, V.2
Gal, S.3
-
6
-
-
41549107359
-
Optimal stopping analysis of a radiation detection system to protect cities from a nuclear terrorist attack
-
M. Atkinson, Z. Cao, and L. Wein Optimal stopping analysis of a radiation detection system to protect cities from a nuclear terrorist attack Risk Analysis 28 2 2008 353 371
-
(2008)
Risk Analysis
, vol.28
, Issue.2
, pp. 353-371
-
-
Atkinson, M.1
Cao, Z.2
Wein, L.3
-
7
-
-
41549126283
-
Spatial queueing analysis of an interdiction system to protect cities from a nuclear terrorist attack
-
M. Atkinson, and L. Wein Spatial queueing analysis of an interdiction system to protect cities from a nuclear terrorist attack Operations Research 56 2008 247 254
-
(2008)
Operations Research
, vol.56
, pp. 247-254
-
-
Atkinson, M.1
Wein, L.2
-
9
-
-
0036605266
-
Inventory control under substitutable demand: A stochastic game application
-
M.Z. Avsar, and M. Baykal-Gürsoy Inventory control under substitutable demand: A stochastic game application Naval Research Logistics 49 2002 359 375
-
(2002)
Naval Research Logistics
, vol.49
, pp. 359-375
-
-
Avsar, M.Z.1
Baykal-Gürsoy, M.2
-
10
-
-
33646090607
-
A note on two-person zero-sum communicating games
-
M.Z. Avsar, and M. Baykal-Gürsoy A note on two-person zero-sum communicating games Operations Research Letters 34 4 2006 412 420
-
(2006)
Operations Research Letters
, vol.34
, Issue.4
, pp. 412-420
-
-
Avsar, M.Z.1
Baykal-Gürsoy, M.2
-
12
-
-
84859701666
-
Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder
-
N. Basilico, N. Gatti, and F. Amigoni Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder Artificial Intelligence 184-185 2012 78 123
-
(2012)
Artificial Intelligence
, vol.184-185
, pp. 78-123
-
-
Basilico, N.1
Gatti, N.2
Amigoni, F.3
-
13
-
-
60749113174
-
Macroscopic pedestrian flow simulation for designing crowd control measures in public transport after special events
-
Bauer, D., Seer, S., & Brandle, N. (2007). Macroscopic pedestrian flow simulation for designing crowd control measures in public transport after special events. In Proceedings of the summer computer simulation conference (pp. 1035-1042).
-
(2007)
Proceedings of the Summer Computer Simulation Conference
, pp. 1035-1042
-
-
Bauer, D.1
Seer, S.2
Brandle, N.3
-
17
-
-
33750031049
-
Terrorism and critical infrastructures: Implications for public-private crisis management
-
A. Boin, and D. Smith Terrorism and critical infrastructures: Implications for public-private crisis management Public Money and Management 26 5 2006 295 304
-
(2006)
Public Money and Management
, vol.26
, Issue.5
, pp. 295-304
-
-
Boin, A.1
Smith, D.2
-
19
-
-
10444228109
-
Executive order 13010 - Critical infrastructure protection
-
W.J. Clinton Executive order 13010 - Critical infrastructure protection Federal Register 61 138 1996 37347 37350
-
(1996)
Federal Register
, vol.61
, Issue.138
, pp. 37347-37350
-
-
Clinton, W.J.1
-
20
-
-
12344300052
-
Homeland security act of 2002
-
U.S. Congress Homeland security act of 2002 Public Law 2002 107 296
-
(2002)
Public Law
, pp. 107-296
-
-
Congress, U.S.1
-
22
-
-
62949122554
-
Resource pooling for optimal evacuation of a large building
-
Deng, K., Chen, W., Mehta, P. G., & Meyn, S. (2008). Resource pooling for optimal evacuation of a large building. In Proceedings of the 47th IEEE conference on decision and control (pp. 5565-5570).
-
(2008)
Proceedings of the 47th IEEE Conference on Decision and Control
, pp. 5565-5570
-
-
Deng, K.1
Chen, W.2
Mehta, P.G.3
Meyn, S.4
-
23
-
-
64549092443
-
Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
-
N.S. Dighe, J. Zhuang, and V.M. Bier Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence International Journal of Performability Engineering 5 2009 31 43
-
(2009)
International Journal of Performability Engineering
, vol.5
, pp. 31-43
-
-
Dighe, N.S.1
Zhuang, J.2
Bier, V.M.3
-
24
-
-
1542767168
-
A survey of search theory
-
J.M. Dobbie A survey of search theory Operations Research 16 1968 525 537
-
(1968)
Operations Research
, vol.16
, pp. 525-537
-
-
Dobbie, J.M.1
-
31
-
-
1642477862
-
Online simulation of pedestrian flow in public buildings
-
Hanisch, A., Tolujew, J., Richter, K., & Schulze, T. (2003). Online simulation of pedestrian flow in public buildings. In Proceedings of the 2003 winter simulation conference.
-
(2003)
Proceedings of the 2003 Winter Simulation Conference
-
-
Hanisch, A.1
Tolujew, J.2
Richter, K.3
Schulze, T.4
-
32
-
-
0000725056
-
Games with incomplete information played by Bayesian players. Part I: The basic model
-
J. Harsanyi Games with incomplete information played by Bayesian players. Part I: The basic model Management Science 14 3 1967 159 182
-
(1967)
Management Science
, vol.14
, Issue.3
, pp. 159-182
-
-
Harsanyi, J.1
-
33
-
-
0000725055
-
Games with incomplete information played by Bayesian players. Part II: Bayesian equilibrium points
-
J. Harsanyi Games with incomplete information played by Bayesian players. Part II: Bayesian equilibrium points Management Science 14 5 1968 320 334
-
(1968)
Management Science
, vol.14
, Issue.5
, pp. 320-334
-
-
Harsanyi, J.1
-
34
-
-
0000725056
-
Games with incomplete information played by Bayesian players. Part III: The basic probability distribution of the game
-
J. Harsanyi Games with incomplete information played by Bayesian players. Part III: The basic probability distribution of the game Management Science 14 7 1968 486 502
-
(1968)
Management Science
, vol.14
, Issue.7
, pp. 486-502
-
-
Harsanyi, J.1
-
37
-
-
79960284481
-
Nuclear threat detection with mobile distributed sensor networks
-
D.S. Hochbaum, and B. Fishbain Nuclear threat detection with mobile distributed sensor networks Annals of Operations Research 187 1 2011 45 63
-
(2011)
Annals of Operations Research
, vol.187
, Issue.1
, pp. 45-63
-
-
Hochbaum, D.S.1
Fishbain, B.2
-
38
-
-
38849147659
-
A search game taking account of attributes of searching resources
-
R. Hohzaki A search game taking account of attributes of searching resources Naval Research Logistics Quarterly 55 2007 76 90
-
(2007)
Naval Research Logistics Quarterly
, vol.55
, pp. 76-90
-
-
Hohzaki, R.1
-
40
-
-
4344705406
-
Confronting the risks of terrorism: Making the right decisions
-
B. John Garrick, J. Hall, M. Kilger, J. McDonald, T. O'Toole, and P. Probst et al. Confronting the risks of terrorism: Making the right decisions Reliability Engineering & System Safety 86 2 2004 129 176
-
(2004)
Reliability Engineering & System Safety
, vol.86
, Issue.2
, pp. 129-176
-
-
John Garrick, B.1
Hall, J.2
Kilger, M.3
McDonald, J.4
O'Toole, T.5
Probst, P.6
-
41
-
-
84863407310
-
Evader interdiction and collateral damage
-
T. Erlebach, S. Nikoletseas, P. Orponen (Eds.) LNCS Springer
-
Johnson, M., & Gutfraind, A. (2011). Evader interdiction and collateral damage. In T. Erlebach, S. Nikoletseas, P. Orponen (Eds.), Proceedings of ALGOSENSORS 2011, LNCS. (Vol. 7111, pp. 86-100), Springer.
-
(2011)
Proceedings of ALGOSENSORS 2011
, vol.7111
, pp. 86-100
-
-
Johnson, M.1
Gutfraind, A.2
-
43
-
-
85024429815
-
A new approach to linear filtering and prediction problems
-
R. Kalman A new approach to linear filtering and prediction problems Journal of Basic Engineering 82 1960 35 45
-
(1960)
Journal of Basic Engineering
, vol.82
, pp. 35-45
-
-
Kalman, R.1
-
45
-
-
85024423711
-
New results in linear filtering and prediction theory
-
R. Kalman, and R. Bucy New results in linear filtering and prediction theory J. Basic Eng. 1961 95 108
-
(1961)
J. Basic Eng.
, pp. 95-108
-
-
Kalman, R.1
Bucy, R.2
-
46
-
-
0019540987
-
On the quantitative definition of risk
-
S. Kaplan, and B. Garrick On the quantitative definition of risk Risk Analysis 1 1 1981 11 27
-
(1981)
Risk Analysis
, vol.1
, Issue.1
, pp. 11-27
-
-
Kaplan, S.1
Garrick, B.2
-
47
-
-
33947407751
-
Models for crowd movement and egress simulation
-
S.P. Hoogendoorn, Springer Berlin
-
H. Klüpfel, and T. Meyer-König Models for crowd movement and egress simulation S.P. Hoogendoorn, Traffic and granular flow '03 2004 Springer Berlin 357 372
-
(2004)
Traffic and Granular Flow '03
, pp. 357-372
-
-
Klüpfel, H.1
Meyer-König, T.2
-
48
-
-
84864253043
-
Simulation of the evacuation of a football stadium
-
S.P. Hoogendoorn, Springer Berlin
-
H. Klüpfel, and T. Meyer-König Simulation of the evacuation of a football stadium S.P. Hoogendoorn, Traffic and granular flow '03 2004 Springer Berlin 423 430
-
(2004)
Traffic and Granular Flow '03
, pp. 423-430
-
-
Klüpfel, H.1
Meyer-König, T.2
-
50
-
-
33750618042
-
Algorithms for discrete and continuous multicommodity flow network interdiction problems
-
C. Lim, and J.C. Smith Algorithms for discrete and continuous multicommodity flow network interdiction problems IIE Transactions 39 1 2007 15 26
-
(2007)
IIE Transactions
, vol.39
, Issue.1
, pp. 15-26
-
-
Lim, C.1
Smith, J.C.2
-
52
-
-
35448938538
-
Risk analysis for critical asset protection
-
W. McGill, B. Ayyub, and M. Kaminskiy Risk analysis for critical asset protection Risk Analysis 27 5 2007 1265 1281
-
(2007)
Risk Analysis
, vol.27
, Issue.5
, pp. 1265-1281
-
-
McGill, W.1
Ayyub, B.2
Kaminskiy, M.3
-
53
-
-
77950797715
-
Anomaly detection using projective Markov models in a distributed sensor network
-
Meyn, S., Surana, A., Lin, Y., & Narayanan, S. (2009). Anomaly detection using projective Markov models in a distributed sensor network. In Proceedings of the 48th IEEE conference on decision and control, held jointly with the 28th Chinese control conference (pp. 4662-4669).
-
(2009)
Proceedings of the 48th IEEE Conference on Decision and Control, Held Jointly with the 28th Chinese Control Conference
, pp. 4662-4669
-
-
Meyn, S.1
Surana, A.2
Lin, Y.3
Narayanan, S.4
-
54
-
-
77950822310
-
A sensor-utility-network method for estimation of occupancy in buildings
-
Meyn, S., Surana, A., Lin, Y., Oggianu, S., Narayanan, S., & Frewen, T. (2009). A sensor-utility-network method for estimation of occupancy in buildings. In Proceedings of the 48th IEEE conference on decision and control, held jointly with the 28th Chinese control conference (pp. 1494-1500).
-
(2009)
Proceedings of the 48th IEEE Conference on Decision and Control, Held Jointly with the 28th Chinese Control Conference
, pp. 1494-1500
-
-
Meyn, S.1
Surana, A.2
Lin, Y.3
Oggianu, S.4
Narayanan, S.5
Frewen, T.6
-
55
-
-
33750629476
-
Models for nuclear smuggling interdiction
-
D.P. Morton, F. Pan, and K.J. Saeger Models for nuclear smuggling interdiction IIE Transactions 39 1 2007 3 14
-
(2007)
IIE Transactions
, vol.39
, Issue.1
, pp. 3-14
-
-
Morton, D.P.1
Pan, F.2
Saeger, K.J.3
-
56
-
-
84898278501
-
Risk management and critical infrastructure protection: Assessing, integrating, and managing threats, vulnerabilities and consequences
-
Moteff, J. (2005). Risk management and critical infrastructure protection: Assessing, integrating, and managing threats, vulnerabilities and consequences. Library of Congress Washington DC Congressional Research Service.
-
(2005)
Library of Congress Washington DC Congressional Research Service
-
-
Moteff, J.1
-
57
-
-
0001730497
-
Non-cooperative games
-
J. Nash Non-cooperative games Annals of Mathematics 54 1951 286 295
-
(1951)
Annals of Mathematics
, vol.54
, pp. 286-295
-
-
Nash, J.1
-
60
-
-
58849120173
-
The impact of joint responses of devices in an airport security system
-
X. Nie, R. Batta, C.G. Drury, and L. Lin The impact of joint responses of devices in an airport security system Risk Analysis 29 2 2009 298 311
-
(2009)
Risk Analysis
, vol.29
, Issue.2
, pp. 298-311
-
-
Nie, X.1
Batta, R.2
Drury, C.G.3
Lin, L.4
-
63
-
-
52449124875
-
Model reduction for reduced order estimation in traffic models
-
Niedbalski, J., Deng, K., Mehta, P., & Meyn, S. (2008). Model reduction for reduced order estimation in traffic models. In Proceedings of the American control conference (pp. 914-919).
-
(2008)
Proceedings of the American Control Conference
, pp. 914-919
-
-
Niedbalski, J.1
Deng, K.2
Mehta, P.3
Meyn, S.4
-
65
-
-
84876121942
-
Safety in multiagent systems by policy randomization
-
Paruchuri, P., Tambe, M., Ordez, F., & Kraus, S. (2005). Safety in multiagent systems by policy randomization. In Proceedings of the 2nd international workshop on safety and security in multi agent systems.
-
(2005)
Proceedings of the 2nd International Workshop on Safety and Security in Multi Agent Systems
-
-
Paruchuri, P.1
Tambe, M.2
Ordez, F.3
Kraus, S.4
-
66
-
-
34247243309
-
Security in multiagent systems by policy randomization
-
Paruchuri, P., Tambe, M., Ordez, F., & Kraus, S. (2006). Security in multiagent systems by policy randomization. In Proceedings of the 5th international joint conference on autonomous agents and multi agent systems.
-
(2006)
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multi Agent Systems
-
-
Paruchuri, P.1
Tambe, M.2
Ordez, F.3
Kraus, S.4
-
67
-
-
60349092268
-
An efficient heuristic approach for security against multiple adversaries
-
Paruchuri, P., Pearce, J. P., Marecki, J., Tambe, M., Ordez, F., & Kraus, S. (2007). An efficient heuristic approach for security against multiple adversaries. In Proceedings of the 6th international conference on autonomous agents and multi agent systems.
-
(2007)
Proceedings of the 6th International Conference on Autonomous Agents and Multi Agent Systems
-
-
Paruchuri, P.1
Pearce, J.P.2
Marecki, J.3
Tambe, M.4
Ordez, F.5
Kraus, S.6
-
68
-
-
84899919065
-
Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games
-
Paruchuri, P., Pearce, J. P., Marecki, J., Tambe, M., Ordez, F., & Kraus, S. (2008). Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games. In Proceedings of the 7th international conference on autonomous agents and multi agent systems.
-
(2008)
Proceedings of the 7th International Conference on Autonomous Agents and Multi Agent Systems
-
-
Paruchuri, P.1
Pearce, J.P.2
Marecki, J.3
Tambe, M.4
Ordez, F.5
Kraus, S.6
-
69
-
-
0036089039
-
Fusion of intelligence information: A Bayesian approach
-
E. Paté-Cornell Fusion of intelligence information: A Bayesian approach Risk Analysis 22 2002 445 454
-
(2002)
Risk Analysis
, vol.22
, pp. 445-454
-
-
Paté-Cornell, E.1
-
70
-
-
0005001185
-
Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures
-
E. Paté-Cornell Probabilistic modeling of terrorist threats: A systems analysis approach to setting priorities among countermeasures Military Operations Research 7 2002 5 20
-
(2002)
Military Operations Research
, vol.7
, pp. 5-20
-
-
Paté-Cornell, E.1
-
71
-
-
84899939869
-
Deployed ARMOR protection: The application of a game theoretic model for security at the Los Angeles International Airport
-
Pita, J., Jain, M., Marecki, J., Ordez, F., Portway, C., Tambe, M., & et al. (2008). Deployed ARMOR protection: The application of a game theoretic model for security at the Los Angeles International Airport. In Proceedings of the 7th international joint conference on autonomous agents and multi agent systems: industrial track.
-
(2008)
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multi Agent Systems: Industrial Track
-
-
Pita, J.1
Jain, M.2
Marecki, J.3
Ordez, F.4
Portway, C.5
Tambe, M.6
-
72
-
-
84862122087
-
Extracting topological information from grid maps for robot navigation
-
Portugal, D., & Rocha, R. P. (2012). Extracting topological information from grid maps for robot navigation. In ICAART (1) (pp. 137-143).
-
(2012)
ICAART
, Issue.1
, pp. 137-143
-
-
Portugal, D.1
Rocha, R.P.2
-
74
-
-
33645835986
-
Critical infrastructure protection and the role of emergency services
-
M. Rothery, and C. Branch Critical infrastructure protection and the role of emergency services The Australian Journal of Emergency Management 20 2 2005 45 50
-
(2005)
The Australian Journal of Emergency Management
, vol.20
, Issue.2
, pp. 45-50
-
-
Rothery, M.1
Branch, C.2
-
75
-
-
0004843147
-
Ambushing random walks II: Continuous models
-
W.H. Ruckle Ambushing random walks II: Continuous models Operations Research 29 1 1981 108 120
-
(1981)
Operations Research
, vol.29
, Issue.1
, pp. 108-120
-
-
Ruckle, W.H.1
-
79
-
-
0026930270
-
Searching for a mobile intruder in a polygonal region
-
I. Suzuki, and M. Yamashita Searching for a mobile intruder in a polygonal region SIAM Journal on Computing 21 5 1992 863 888
-
(1992)
SIAM Journal on Computing
, vol.21
, Issue.5
, pp. 863-888
-
-
Suzuki, I.1
Yamashita, M.2
-
84
-
-
0001590955
-
Two-person zero-sum games for network interdiction
-
A. Washburn, and K. Wood Two-person zero-sum games for network interdiction Operations Research 43 2 1995 243 251
-
(1995)
Operations Research
, vol.43
, Issue.2
, pp. 243-251
-
-
Washburn, A.1
Wood, K.2
-
85
-
-
69949090557
-
OR Forum - Homeland security: From mathematical models to policy implementation: The 2008 Philip McCord Morse Lecture
-
L. Wein OR Forum - Homeland security: From mathematical models to policy implementation: The 2008 Philip McCord Morse Lecture Operations Research 57 4 2009 801 811
-
(2009)
Operations Research
, vol.57
, Issue.4
, pp. 801-811
-
-
Wein, L.1
-
86
-
-
34250773839
-
The last line of defense: Designing radiation detection-interdiction systems to protect cities from a nuclear terrorist attack
-
L. Wein, and M. Atkinson The last line of defense: Designing radiation detection-interdiction systems to protect cities from a nuclear terrorist attack IEEE Transactions on Nuclear Science 54 3 2007 654 669
-
(2007)
IEEE Transactions on Nuclear Science
, vol.54
, Issue.3
, pp. 654-669
-
-
Wein, L.1
Atkinson, M.2
-
87
-
-
38249007197
-
Deterministic network interdiction
-
R.K. Wood Deterministic network interdiction Mathematical and Computer Modeling 17:2 1993 1 18
-
(1993)
Mathematical and Computer Modeling
, vol.17
, Issue.2
, pp. 1-18
-
-
Wood, R.K.1
-
88
-
-
34548017657
-
Simulation of pedestrian flow on square lattice based on cellular automata model
-
H. Yue, H. Hao, X. Chen, and C. Shao Simulation of pedestrian flow on square lattice based on cellular automata model Physica A 384 2007 567 588
-
(2007)
Physica A
, vol.384
, pp. 567-588
-
-
Yue, H.1
Hao, H.2
Chen, X.3
Shao, C.4
-
89
-
-
38549098290
-
Balancing terrorism and natural disasters: Defensive strategy with endogenous attacker effort
-
J. Zhuang, and V.M. Bier Balancing terrorism and natural disasters: Defensive strategy with endogenous attacker effort Operations Research 55 2007 976 991
-
(2007)
Operations Research
, vol.55
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
90
-
-
77953205441
-
Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation
-
J. Zhuang, and V.M. Bier Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation Defence and Peace Economics 2009
-
(2009)
Defence and Peace Economics
-
-
Zhuang, J.1
Bier, V.M.2
-
91
-
-
70350704685
-
Modeling secrecy and deception in a multiple-period attacker-defender signaling game
-
J. Zhuang, V.M. Bier, and O. Alagoz Modeling secrecy and deception in a multiple-period attacker-defender signaling game European Journal of Operational Research 203 2010 409 418
-
(2010)
European Journal of Operational Research
, vol.203
, pp. 409-418
-
-
Zhuang, J.1
Bier, V.M.2
Alagoz, O.3
|