Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks
From MaRDI portal
Publication:646688
DOI10.1007/s10479-009-0665-6zbMath1225.90031OpenAlexW1965775355MaRDI QIDQ646688
Vicki M. Bier, Naraphorn Haphuriwat
Publication date: 17 November 2011
Published in: Annals of Operations Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10479-009-0665-6
Applications of game theory (91A80) Reliability, availability, maintenance, inspection in operations research (90B25)
Related Items
Multiple agents finitely repeated inspection game with dismissals ⋮ Individual versus overarching protection and attack of assets ⋮ Information weighted sampling for detecting rare items in finite populations with a focus on security ⋮ Modeling and mitigating the effects of supply chain disruption in a defender-attacker game ⋮ Modeling costly learning and counter-learning in a defender-attacker game with private defender information ⋮ Network Inspection for Detecting Strategic Attacks ⋮ Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers ⋮ Balancing congestion and security in the presence of strategic applicants with private information ⋮ Optimal sequential inspection policies ⋮ Stackelberg production-protection games: defending crop production against intentional attacks ⋮ Espionage and the optimal standard of the customs-trade partnership against terrorism (C-TPAT) program in maritime security ⋮ Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation ⋮ Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection—A Three-Stage Game ⋮ COMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACK ⋮ Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners ⋮ Interplay of rumor propagation and clarification on social media during crisis events -- a game-theoretic approach ⋮ Optimal Allocation of Resources in Airport Security: Profiling vs. Screening
Cites Work