Multilevel, threshold-based policies for cargo container security screening systems
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ejor.2012.01.060
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Endre Boros & Noam Goldberg & Paul Kantor & Jonathan Word, 2011. "Optimal sequential inspection policies," Annals of Operations Research, Springer, vol. 187(1), pages 89-119, July.
- Gary Gaukler & Chenhua Li & Rory Cannaday & Sunil Chirayath & Yu Ding, 2011. "Detecting nuclear materials smuggling: using radiography to improve container inspection policies," Annals of Operations Research, Springer, vol. 187(1), pages 65-87, July.
- Ramirez-Marquez, Jose Emmanuel, 2008. "Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1698-1709.
- Laura McLay & Jamie Lloyd & Emily Niman, 2011. "Interdicting nuclear material on cargo containers using knapsack problem models," Annals of Operations Research, Springer, vol. 187(1), pages 185-205, July.
- Concho, Ana Lisbeth & Ramirez-Marquez, Jose Emmanuel, 2010. "An evolutionary algorithm for port-of-entry security optimization considering sensor thresholds," Reliability Engineering and System Safety, Elsevier, vol. 95(3), pages 255-266.
- Nedialko Dimitrov & Dennis Michalopoulos & David Morton & Michael Nehme & Feng Pan & Elmira Popova & Erich Schneider & Gregory Thoreson, 2011. "Network deployment of radiation detectors with physics-based detection probability calculations," Annals of Operations Research, Springer, vol. 187(1), pages 207-228, July.
- Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Kretschmann, Lutz & Münsterberg, Torsten, 2017. "Simulation-framework for illicit-goods detection in large volume freight," Chapters from the Proceedings of the Hamburg International Conference of Logistics (HICL), in: Kersten, Wolfgang & Blecker, Thorsten & Ringle, Christian M. (ed.), Digitalization in Supply Chain Management and Logistics: Smart and Digital Solutions for an Industry 4.0 Environment. Proceedings of the Hamburg Inter, volume 23, pages 427-448, Hamburg University of Technology (TUHH), Institute of Business Logistics and General Management.
- Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
- Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.
- Dreiding, Rebecca A. & McLay, Laura A., 2013. "An integrated model for screening cargo containers," European Journal of Operational Research, Elsevier, vol. 230(1), pages 181-189.
- Romero, Pablo & Graneri, Jorge & Viera, Omar & Moscatelli, Sandro & Tansini, Libertad, 2016. "A Multi-Tree Committee to assist port-of-entry inspection decisions," European Journal of Operational Research, Elsevier, vol. 253(1), pages 170-177.
- Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
- Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
- Richard R. Young & Gary A. Gordon, 2020. "Intermodal maritime supply chains: assessing factors for resiliency and security," Journal of Transportation Security, Springer, vol. 13(3), pages 231-244, December.
- Pala, Ali & Zhuang, Jun, 2018. "Security screening queues with impatient applicants: A new model with a case study," European Journal of Operational Research, Elsevier, vol. 265(3), pages 919-930.
- Yan, Xihong & Nie, Xiaofeng, 2016. "Optimal placement of multiple types of detectors under a small vessel attack threat to port security," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 93(C), pages 71-94.
- Gino J. Lim & Jaeyoung Cho & Selim Bora & Taofeek Biobaku & Hamid Parsaei, 2018. "Models and computational algorithms for maritime risk analysis: a review," Annals of Operations Research, Springer, vol. 271(2), pages 765-786, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Dreiding, Rebecca A. & McLay, Laura A., 2013. "An integrated model for screening cargo containers," European Journal of Operational Research, Elsevier, vol. 230(1), pages 181-189.
- Yan, Xihong & Nie, Xiaofeng, 2016. "Optimal placement of multiple types of detectors under a small vessel attack threat to port security," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 93(C), pages 71-94.
- Chenhua Li & Gary M. Gaukler & Yu Ding, 2013. "Using container inspection history to improve interdiction logistics for illicit nuclear materials," Naval Research Logistics (NRL), John Wiley & Sons, vol. 60(6), pages 433-448, September.
- Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
- Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
- Romero, Pablo & Graneri, Jorge & Viera, Omar & Moscatelli, Sandro & Tansini, Libertad, 2016. "A Multi-Tree Committee to assist port-of-entry inspection decisions," European Journal of Operational Research, Elsevier, vol. 253(1), pages 170-177.
- Samrat Chatterjee & Daniel E. Salazar & Isaac Maya, 2014. "A Systems Approach for Evaluating the Effectiveness of Radiological and Nuclear Detection Architectures in Urban Areas," Systems Engineering, John Wiley & Sons, vol. 17(2), pages 157-165, June.
- Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
- Stuart Van Weele & Jose Emmanuel Ramirez-Marquez, 2012. "Optimization of inspection for dual contraband using a genetic algorithm," Journal of Risk and Reliability, , vol. 226(5), pages 508-525, October.
- Ana Concho & José Ramirez-Marquez, 2012. "Optimal design of container inspection strategies considering multiple objectives via an evolutionary approach," Annals of Operations Research, Springer, vol. 196(1), pages 167-187, July.
- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Stuart Weele & Jose Ramirez-Marquez, 2011. "Optimization of container inspection strategy via a genetic algorithm," Annals of Operations Research, Springer, vol. 187(1), pages 229-247, July.
- Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
- Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
- Gary M. Gaukler & Chenhua Li & Yu Ding & Sunil S. Chirayath, 2012. "Detecting Nuclear Materials Smuggling: Performance Evaluation of Container Inspection Policies," Risk Analysis, John Wiley & Sons, vol. 32(3), pages 531-554, March.
- L. Robin Keller & Ali Abbas & Manel Baucells & Vicki M. Bier & David Budescu & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Ahti Salo & George Wu, 2010.
"From the Editors..,"
Decision Analysis, INFORMS, vol. 7(4), pages 327-330, December.
- L. Robin Keller & Manel Baucells & Kevin F. McCardle & Gregory S. Parnell & Ahti Salo, 2007. "From the Editors..," Decision Analysis, INFORMS, vol. 4(4), pages 173-175, December.
- L. Robin Keller & Manel Baucells & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Gregory S. Parnell & Ahti Salo, 2008. "From the Editors..," Decision Analysis, INFORMS, vol. 5(4), pages 173-176, December.
- L. Robin Keller & Manel Baucells & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Gregory S. Parnell & Ahti Salo, 2009. "From the Editors ..," Decision Analysis, INFORMS, vol. 6(4), pages 199-201, December.
- L. Robin Keller & Kelly M. Kophazi, 2010. "From the Editors..," Decision Analysis, INFORMS, vol. 7(2), pages 151-154, June.
- Chaya Losada & M. Scaparra & Richard Church & Mark Daskin, 2012. "The stochastic interdiction median problem with disruption intensity levels," Annals of Operations Research, Springer, vol. 201(1), pages 345-365, December.
- Wei, Ningji & Walteros, Jose L., 2022. "Integer programming methods for solving binary interdiction games," European Journal of Operational Research, Elsevier, vol. 302(2), pages 456-469.
More about this item
Keywords
Knapsack problem models; Container screening; Homeland Security; Threshold constraints;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:220:y:2012:i:2:p:522-529. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.