A Multi-Tree Committee to assist port-of-entry inspection decisions
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ejor.2015.12.054
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Concho, Ana Lisbeth & Ramirez-Marquez, Jose Emmanuel, 2010. "An evolutionary algorithm for port-of-entry security optimization considering sensor thresholds," Reliability Engineering and System Safety, Elsevier, vol. 95(3), pages 255-266.
- Dreiding, Rebecca A. & McLay, Laura A., 2013. "An integrated model for screening cargo containers," European Journal of Operational Research, Elsevier, vol. 230(1), pages 181-189.
- McLay, Laura A. & Dreiding, Rebecca, 2012. "Multilevel, threshold-based policies for cargo container security screening systems," European Journal of Operational Research, Elsevier, vol. 220(2), pages 522-529.
- Ramirez-Marquez, Jose Emmanuel, 2008. "Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1698-1709.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Yan, Xihong & Nie, Xiaofeng, 2016. "Optimal placement of multiple types of detectors under a small vessel attack threat to port security," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 93(C), pages 71-94.
- Dreiding, Rebecca A. & McLay, Laura A., 2013. "An integrated model for screening cargo containers," European Journal of Operational Research, Elsevier, vol. 230(1), pages 181-189.
- Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
- Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
- Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
- Stuart Van Weele & Jose Emmanuel Ramirez-Marquez, 2012. "Optimization of inspection for dual contraband using a genetic algorithm," Journal of Risk and Reliability, , vol. 226(5), pages 508-525, October.
- Ana Concho & José Ramirez-Marquez, 2012. "Optimal design of container inspection strategies considering multiple objectives via an evolutionary approach," Annals of Operations Research, Springer, vol. 196(1), pages 167-187, July.
- McLay, Laura A. & Dreiding, Rebecca, 2012. "Multilevel, threshold-based policies for cargo container security screening systems," European Journal of Operational Research, Elsevier, vol. 220(2), pages 522-529.
- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
- Stuart Weele & Jose Ramirez-Marquez, 2011. "Optimization of container inspection strategy via a genetic algorithm," Annals of Operations Research, Springer, vol. 187(1), pages 229-247, July.
- Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
- Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
- Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.
- Richard R. Young & Gary A. Gordon, 2020. "Intermodal maritime supply chains: assessing factors for resiliency and security," Journal of Transportation Security, Springer, vol. 13(3), pages 231-244, December.
- Rocco S., Claudio M. & Emmanuel Ramirez-Marquez, José & Salazar A., Daniel E., 2010. "Bi and tri-objective optimization in the deterministic network interdiction problem," Reliability Engineering and System Safety, Elsevier, vol. 95(8), pages 887-896.
- Jae Hun Kim & Juyeon Kim & Gunwoo Lee & Juneyoung Park, 2021. "Machine Learning-Based Models for Accident Prediction at a Korean Container Port," Sustainability, MDPI, vol. 13(16), pages 1-14, August.
- A Carrigy & J E Ramirez-Marquez & C M Rocco, 2010. "Multistate stochastic network interdiction via reliability modelling and evolutionary optimization," Journal of Risk and Reliability, , vol. 224(1), pages 27-42, March.
- Laura McLay & Jamie Lloyd & Emily Niman, 2011. "Interdicting nuclear material on cargo containers using knapsack problem models," Annals of Operations Research, Springer, vol. 187(1), pages 185-205, July.
- Li, Yulong & Lin, Jie & Zhang, Chi & Zhu, Huaxing & Zeng, Saixing & Sun, Chengshaung, 2022. "Joint optimization of structure and protection of interdependent infrastructure networks," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
- Kretschmann, Lutz & Münsterberg, Torsten, 2017. "Simulation-framework for illicit-goods detection in large volume freight," Chapters from the Proceedings of the Hamburg International Conference of Logistics (HICL), in: Kersten, Wolfgang & Blecker, Thorsten & Ringle, Christian M. (ed.), Digitalization in Supply Chain Management and Logistics: Smart and Digital Solutions for an Industry 4.0 Environment. Proceedings of the Hamburg Inter, volume 23, pages 427-448, Hamburg University of Technology (TUHH), Institute of Business Logistics and General Management.
More about this item
Keywords
Risk analysis; Port-of-entry; Inspection policy; Binary decision tree; Multi-Tree Committee;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:253:y:2016:i:1:p:170-177. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.