Skip to main content
Top
Published in:
Cover of the book

2013 | OriginalPaper | Chapter

1. Using Operations Research Methods for Homeland Security Problems

Author : Jeffrey W. Herrmann

Published in: Handbook of Operations Research for Homeland Security

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter describes operations research (OR) techniques and highlights their use to solve homeland security problems. This is intended to give policy makers and decision makers insight into what OR can do and how it is relevant to their particular concerns and problems. After discussing how to use OR, the chapter reviews four areas: (1) understanding what has happened; (2) considering what could happen; (3) deciding what to do; and (4) finding the best solution. The techniques available for understanding what has happened include data mining and monitoring time series data. Considering what could happen requires risk analysis and using queueing models and simulation models. Decision analysis and game theory can be used to make decisions, but finding the best solution requires formulating and solving an optimization problem. Because the examples illustrate how specific techniques have been applied, homeland security professionals can use this chapter to understand what operations research can offer and identify the techniques that are relevant to their problems. The chapter also includes references to essential books and articles that can provide more information.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Aaby K, Herrmann JW, Jordan C, Treadwell M, Wood K (2006a) Montgomery County’s Public Health Service uses operations research to plan emergency mass-dispensing and vaccination clinics. Interfaces 36(6):569–579CrossRef Aaby K, Herrmann JW, Jordan C, Treadwell M, Wood K (2006a) Montgomery County’s Public Health Service uses operations research to plan emergency mass-dispensing and vaccination clinics. Interfaces 36(6):569–579CrossRef
go back to reference Aaby K, Abbey R, Herrmann JW, Treadwell M, Jordan C, Wood K (2006b) Embracing computer modeling to address pandemic influenza in the 21st century. J Public Health Manag Pract 12(4):365–372 Aaby K, Abbey R, Herrmann JW, Treadwell M, Jordan C, Wood K (2006b) Embracing computer modeling to address pandemic influenza in the 21st century. J Public Health Manag Pract 12(4):365–372
go back to reference Aleman DM, Wibisono TG, Schwartz B (2011) A nonhomogeneous agent-based simulation approach to modeling the spread of disease in a pandemic outbreak. Interfaces 41(3):301–315CrossRef Aleman DM, Wibisono TG, Schwartz B (2011) A nonhomogeneous agent-based simulation approach to modeling the spread of disease in a pandemic outbreak. Interfaces 41(3):301–315CrossRef
go back to reference Altay N, Green WG (2006) OR/MS research in disaster operations management. Eur J Oper Res 175:475–493CrossRef Altay N, Green WG (2006) OR/MS research in disaster operations management. Eur J Oper Res 175:475–493CrossRef
go back to reference Bakuli DL, Smith JM (1996) Resource allocation in state-dependent emergency evacuation networks. Eur J Oper Res 89(3):543–555CrossRef Bakuli DL, Smith JM (1996) Resource allocation in state-dependent emergency evacuation networks. Eur J Oper Res 89(3):543–555CrossRef
go back to reference Bansal M, Kianfar K (2010) An exact algorithm for coverage problem with a single rectangle. In: Johnson A, Miller J (eds) Proceedings of the 2010 Industrial Engineering Research Conference, Cancun, 5–9 June 2010 Bansal M, Kianfar K (2010) An exact algorithm for coverage problem with a single rectangle. In: Johnson A, Miller J (eds) Proceedings of the 2010 Industrial Engineering Research Conference, Cancun, 5–9 June 2010
go back to reference Bier V (2006) Game-theoretic and reliability methods in counterterrorism and security. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York Bier V (2006) Game-theoretic and reliability methods in counterterrorism and security. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York
go back to reference Bier VM, Azaiez MN (eds) (2009) Game theoretic risk analysis of security threats. Springer, New York Bier VM, Azaiez MN (eds) (2009) Game theoretic risk analysis of security threats. Springer, New York
go back to reference Bonabeau E (2003) Don’t trust your gut. Harv Bus Rev 81(5):116–123 Bonabeau E (2003) Don’t trust your gut. Harv Bus Rev 81(5):116–123
go back to reference Box GEP, Jenkins GM, Reinsel GC (1994) Time series analysis, 3rd edn. Prentice Hall, Englewood Cliffs, NJ Box GEP, Jenkins GM, Reinsel GC (1994) Time series analysis, 3rd edn. Prentice Hall, Englewood Cliffs, NJ
go back to reference Bradley SP, Hax AC, Magnanti TL (1977) Applied mathematical programming. Addison-Wesley, Reading, MA Bradley SP, Hax AC, Magnanti TL (1977) Applied mathematical programming. Addison-Wesley, Reading, MA
go back to reference Brown GG, Cox LA Jr (2011) How probabilistic risk assessment can mislead terrorism risk analysts. Risk Anal 31(2):196–204CrossRef Brown GG, Cox LA Jr (2011) How probabilistic risk assessment can mislead terrorism risk analysts. Risk Anal 31(2):196–204CrossRef
go back to reference Butler JC, Chebeskov AN, Dyer JS, Edmunds TA, Jia J, Oussanov VI (2005) The United States and Russia evaluate plutonium disposition options with multiattribute utility theory. Interfaces 35(1):88–101CrossRef Butler JC, Chebeskov AN, Dyer JS, Edmunds TA, Jia J, Oussanov VI (2005) The United States and Russia evaluate plutonium disposition options with multiattribute utility theory. Interfaces 35(1):88–101CrossRef
go back to reference Candalino TJ, Jacobson SH, Kobza JE (2004) Designing optimal aviation baggage screening strategies using simulated annealing. Comput Oper Res 31(10):1753–1767CrossRef Candalino TJ, Jacobson SH, Kobza JE (2004) Designing optimal aviation baggage screening strategies using simulated annealing. Comput Oper Res 31(10):1753–1767CrossRef
go back to reference Chen W, Hsu S, Shen H (2005) Application of SVM and ANN for intrusion detection. Comput Oper Res 32(10):2617–2634CrossRef Chen W, Hsu S, Shen H (2005) Application of SVM and ANN for intrusion detection. Comput Oper Res 32(10):2617–2634CrossRef
go back to reference Clemen RT, Reilly T (2001) Making hard decisions with decision tools. Duxbury, Pacific Grove, CA Clemen RT, Reilly T (2001) Making hard decisions with decision tools. Duxbury, Pacific Grove, CA
go back to reference Cormican KJ, Morton DP, Wood RK (1998) Stochastic network interdiction. Oper Res 46:184–197CrossRef Cormican KJ, Morton DP, Wood RK (1998) Stochastic network interdiction. Oper Res 46:184–197CrossRef
go back to reference Cox LA Jr (2009) Game theory and risk analysis. Risk Anal 29(8):1062–1068CrossRef Cox LA Jr (2009) Game theory and risk analysis. Risk Anal 29(8):1062–1068CrossRef
go back to reference Current J, O’Kelly M (1992) Locating emergency warning sirens. Decis Sci 23(1):221–234CrossRef Current J, O’Kelly M (1992) Locating emergency warning sirens. Decis Sci 23(1):221–234CrossRef
go back to reference Das TK, Savachkin AA, Zhu Y (2008) A large-scale simulation model of pandemic influenza outbreaks for development of dynamic mitigation strategies. IIE Trans 40:893–905CrossRef Das TK, Savachkin AA, Zhu Y (2008) A large-scale simulation model of pandemic influenza outbreaks for development of dynamic mitigation strategies. IIE Trans 40:893–905CrossRef
go back to reference Defense Science Board Advisory Group on Defense Intelligence (2009) Operations research applications for intelligence, surveillance, and reconnaissance (ISR). Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, Washington, DC Defense Science Board Advisory Group on Defense Intelligence (2009) Operations research applications for intelligence, surveillance, and reconnaissance (ISR). Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, Washington, DC
go back to reference Dekle J, Lavieri MS, Martin E, Emir-Farinas H, Francis RL (2005) A Florida county locates disaster recovery centers. Interfaces 35(2):133–139CrossRef Dekle J, Lavieri MS, Martin E, Emir-Farinas H, Francis RL (2005) A Florida county locates disaster recovery centers. Interfaces 35(2):133–139CrossRef
go back to reference Denizel M, Usdiken B, Tuncalp D (2003) Drift or shift? Continuity, change, and international variation in knowledge production in OR/MS. Oper Res 51(5):711–720CrossRef Denizel M, Usdiken B, Tuncalp D (2003) Drift or shift? Continuity, change, and international variation in knowledge production in OR/MS. Oper Res 51(5):711–720CrossRef
go back to reference Dyer JS, Edmunds T, Butler JC, Jia J (1998) A multiattribute utility analysis of alternatives for the disposition of surplus weapons-grade plutonium. Oper Res 46(6):749–762CrossRef Dyer JS, Edmunds T, Butler JC, Jia J (1998) A multiattribute utility analysis of alternatives for the disposition of surplus weapons-grade plutonium. Oper Res 46(6):749–762CrossRef
go back to reference Ezell BC, Bennett SP, Von Winterfeldt D, Sokolowski J, Collins AJ (2010) Probabilistic risk analysis and terrorism risk. Risk Anal 30(4):575–589CrossRef Ezell BC, Bennett SP, Von Winterfeldt D, Sokolowski J, Collins AJ (2010) Probabilistic risk analysis and terrorism risk. Risk Anal 30(4):575–589CrossRef
go back to reference Fienberg SE (2008) Homeland insecurity: data mining, privacy, disclosure limitation, and the hunt for terrorists. In: Chen H, Reid E, Sinai J, Silke A, Ganor B (eds) Terrorism informatics. Springer, New York Fienberg SE (2008) Homeland insecurity: data mining, privacy, disclosure limitation, and the hunt for terrorists. In: Chen H, Reid E, Sinai J, Silke A, Ganor B (eds) Terrorism informatics. Springer, New York
go back to reference Gaver DP, Glazebrook KD, Jacobs PA (2009) Search for a malevolent needle in a benign haystack. In: Bier VM, Azaiez MN (eds) Game theoretic risk analysis of security threats. Springer, New York Gaver DP, Glazebrook KD, Jacobs PA (2009) Search for a malevolent needle in a benign haystack. In: Bier VM, Azaiez MN (eds) Game theoretic risk analysis of security threats. Springer, New York
go back to reference Gilliam RR (1979) An application of queueing theory to airport passenger security screening. Interfaces 9(4):117–122CrossRef Gilliam RR (1979) An application of queueing theory to airport passenger security screening. Interfaces 9(4):117–122CrossRef
go back to reference Hall RW (1991) Queuing methods for services and manufacturing. Prentice Hall, Englewood Cliffs, NJ Hall RW (1991) Queuing methods for services and manufacturing. Prentice Hall, Englewood Cliffs, NJ
go back to reference Hastie T, Tibshirani R, Friedman J (2009) The elements of statistical learning: data mining, inference, and prediction, 2nd edn. Springer, New York Hastie T, Tibshirani R, Friedman J (2009) The elements of statistical learning: data mining, inference, and prediction, 2nd edn. Springer, New York
go back to reference Hausken K (2011) Strategic defense and attack of series systems when agents move sequentially. IIE Trans 43(7):483–504CrossRef Hausken K (2011) Strategic defense and attack of series systems when agents move sequentially. IIE Trans 43(7):483–504CrossRef
go back to reference Herrmann JW (2008) Disseminating emergency preparedness planning models as automatically generated custom spreadsheets. Interfaces 38(4):263–270CrossRef Herrmann JW (2008) Disseminating emergency preparedness planning models as automatically generated custom spreadsheets. Interfaces 38(4):263–270CrossRef
go back to reference Herrmann JW, Lu S, Schalliol K (2009) A routing and scheduling approach for planning medication distribution. In: Proceedings of the 2009 Industrial Engineering Research Conference, Miami, FL, 30 May–June 3 June 2009 Herrmann JW, Lu S, Schalliol K (2009) A routing and scheduling approach for planning medication distribution. In: Proceedings of the 2009 Industrial Engineering Research Conference, Miami, FL, 30 May–June 3 June 2009
go back to reference Jacobson SH, Kobza JE, Nakayama MK (2000) Sampling procedure to estimate risk probabilities in access-control security systems. Eur J Oper Res 122(1):123–132CrossRef Jacobson SH, Kobza JE, Nakayama MK (2000) Sampling procedure to estimate risk probabilities in access-control security systems. Eur J Oper Res 122(1):123–132CrossRef
go back to reference Jacobson SH, Virta JL, Bowman JM, Kobza JE, Nestor JJ (2003) Modeling aviation baggage screening security systems: a case study. IIE Trans 35(3):259–269CrossRef Jacobson SH, Virta JL, Bowman JM, Kobza JE, Nestor JJ (2003) Modeling aviation baggage screening security systems: a case study. IIE Trans 35(3):259–269CrossRef
go back to reference Jacobson SH, McLay LA, Kobza JE, Bowman JM (2005) Modeling and analyzing multiple station baggage screening security system performance. Naval Res Logist 52(1):30–45CrossRef Jacobson SH, McLay LA, Kobza JE, Bowman JM (2005) Modeling and analyzing multiple station baggage screening security system performance. Naval Res Logist 52(1):30–45CrossRef
go back to reference Jain S, McLean CR, Lee YT (2007) Towards standards for integrated gaming and simulation for incident management. In: Proceedings of the 2007 summer computer simulation conference (SCSC). Society for Computer Simulation International, San Diego, CA, pp 1213–1222 Jain S, McLean CR, Lee YT (2007) Towards standards for integrated gaming and simulation for incident management. In: Proceedings of the 2007 summer computer simulation conference (SCSC). Society for Computer Simulation International, San Diego, CA, pp 1213–1222
go back to reference Jia H, Fernando O, Maged D (2007) A modeling framework for facility location of medical services for large-scale emergencies. IIE Trans 39(1):41–55CrossRef Jia H, Fernando O, Maged D (2007) A modeling framework for facility location of medical services for large-scale emergencies. IIE Trans 39(1):41–55CrossRef
go back to reference Kobza JE, Jacobson SH (1996) Addressing the dependency problem in access security system architecture design. Risk Anal 16(6):801–812CrossRef Kobza JE, Jacobson SH (1996) Addressing the dependency problem in access security system architecture design. Risk Anal 16(6):801–812CrossRef
go back to reference Kobza JE, Jacobson SH (1997) Probability models for access security system architectures. J Oper Res Soc 48(3):255–263 Kobza JE, Jacobson SH (1997) Probability models for access security system architectures. J Oper Res Soc 48(3):255–263
go back to reference Krings A, Azadmanesh WA (2005) A graph based model for survivability applications. Eur J Oper Res 164(3):680–689CrossRef Krings A, Azadmanesh WA (2005) A graph based model for survivability applications. Eur J Oper Res 164(3):680–689CrossRef
go back to reference Law AM (2007) Simulation modeling & analysis, 4th edn. McGraw-Hill, Boston Law AM (2007) Simulation modeling & analysis, 4th edn. McGraw-Hill, Boston
go back to reference Li H, Apostolakis GE, Gifun J, VanSchalkwyk W, Leite S, Barber D (2009) Ranking the risks from multiple hazards in a small community. Risk Anal 29(3):438–456CrossRef Li H, Apostolakis GE, Gifun J, VanSchalkwyk W, Leite S, Barber D (2009) Ranking the risks from multiple hazards in a small community. Risk Anal 29(3):438–456CrossRef
go back to reference Lim C, Smith JC (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39(1):15–26CrossRef Lim C, Smith JC (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39(1):15–26CrossRef
go back to reference Lim GJ, Zangeneh S, Baharnemati MR, Assavapokee T (2009) A sequential solution approach for short notice evacuation scheduling and routing. In: Proceedings of the 2009 industrial engineering research conference, Miami, FL, 30 May–3 June 2009 Lim GJ, Zangeneh S, Baharnemati MR, Assavapokee T (2009) A sequential solution approach for short notice evacuation scheduling and routing. In: Proceedings of the 2009 industrial engineering research conference, Miami, FL, 30 May–3 June 2009
go back to reference Luce RD, Raiffa H (1957) Games and decisions. Wiley, New York Luce RD, Raiffa H (1957) Games and decisions. Wiley, New York
go back to reference Martonosi S (2011) Dynamic server allocation at parallel queues. IIE Trans 43(12):863–877 Martonosi S (2011) Dynamic server allocation at parallel queues. IIE Trans 43(12):863–877
go back to reference Martonosi SE, Barnett A (2006) How effective is security screening of airline passengers. Interfaces 36(6):545–552CrossRef Martonosi SE, Barnett A (2006) How effective is security screening of airline passengers. Interfaces 36(6):545–552CrossRef
go back to reference McCormick PM, McNeill G, Hendrix D, McCormick T (2010) Complexity, terror and Murphy’s law. OR/MS Today 37(6):26–33 McCormick PM, McNeill G, Hendrix D, McCormick T (2010) Complexity, terror and Murphy’s law. OR/MS Today 37(6):26–33
go back to reference Meredith JR (2001) Reconsidering the philosophical basis of OR/MS. Oper Res 49(3):325–333CrossRef Meredith JR (2001) Reconsidering the philosophical basis of OR/MS. Oper Res 49(3):325–333CrossRef
go back to reference Michalak S, Wilson G (2006) Modeling and parameterization for a smallpox simulation study. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York Michalak S, Wilson G (2006) Modeling and parameterization for a smallpox simulation study. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York
go back to reference Miller G, Randolph S, Patterson JE (2006) Responding to bioterrorist smallpox in San Antonio. Interfaces 36(6):580–590CrossRef Miller G, Randolph S, Patterson JE (2006) Responding to bioterrorist smallpox in San Antonio. Interfaces 36(6):580–590CrossRef
go back to reference Modarres M (2006) Risk analysis in engineering. CRC, Boca Raton, FL Modarres M (2006) Risk analysis in engineering. CRC, Boca Raton, FL
go back to reference Montjoy A, Herrmann JW (2010) Adaptive large neighborhood search for the inventory slack routing problem. In: Proceedings of the 2010 Industrial Engineering Research Conference, Cancun, 5–9 June 2010 Montjoy A, Herrmann JW (2010) Adaptive large neighborhood search for the inventory slack routing problem. In: Proceedings of the 2010 Industrial Engineering Research Conference, Cancun, 5–9 June 2010
go back to reference Moore M, Wermuth MA, Castaneda LW, Chandra A, Noricks D, Resnick AC, Chu C, Burks JJ (2010) Bridging the gap: developing a tool to support local civilian and military disaster preparedness. Rand Corporation, Center for Military Health Policy Research, Santa Monica, CA Moore M, Wermuth MA, Castaneda LW, Chandra A, Noricks D, Resnick AC, Chu C, Burks JJ (2010) Bridging the gap: developing a tool to support local civilian and military disaster preparedness. Rand Corporation, Center for Military Health Policy Research, Santa Monica, CA
go back to reference Nehme MV, Morton DP (2009) Tightening a network interdiction model. In: Proceedings of the 2009 Industrial Engineering Research Conference, Miami, FL, 30 May–3 June 2009 Nehme MV, Morton DP (2009) Tightening a network interdiction model. In: Proceedings of the 2009 Industrial Engineering Research Conference, Miami, FL, 30 May–3 June 2009
go back to reference Newell GF (1982) Applications of queueing theory, 2nd edn. Chapman and Hall, LondonCrossRef Newell GF (1982) Applications of queueing theory, 2nd edn. Chapman and Hall, LondonCrossRef
go back to reference O’Hara S, McLean CR, Lee YT (2010) Modeling and simulation for emergency management and health care systems: workshop summary (NISTIR 7684). National Institute of Standards and Technology, Gaithersburg, MD O’Hara S, McLean CR, Lee YT (2010) Modeling and simulation for emergency management and health care systems: workshop summary (NISTIR 7684). National Institute of Standards and Technology, Gaithersburg, MD
go back to reference Paté-Cornell ME (2009) Games and risk analysis. In: Bier VM, Azaiez MN (eds) Game theoretic risk analysis of security threats. Springer, New York Paté-Cornell ME (2009) Games and risk analysis. In: Bier VM, Azaiez MN (eds) Game theoretic risk analysis of security threats. Springer, New York
go back to reference Paté-Cornell ME, Guikema SD (2002) Probabilistic modeling of terrorist threats: a systems analysis approach to setting priorities among countermeasures. Military Oper Res 7(4):5–23CrossRef Paté-Cornell ME, Guikema SD (2002) Probabilistic modeling of terrorist threats: a systems analysis approach to setting priorities among countermeasures. Military Oper Res 7(4):5–23CrossRef
go back to reference Qin J, Zhou Y, Reid E, Chen H (2008) Studying global extremist organizations’ internet presence using the dark web attribute system: a three region comparison study. In: Chen H, Reid E, Sinai J, Silke A, Ganor B (eds) Terrorism informatics. Springer, New York Qin J, Zhou Y, Reid E, Chen H (2008) Studying global extremist organizations’ internet presence using the dark web attribute system: a three region comparison study. In: Chen H, Reid E, Sinai J, Silke A, Ganor B (eds) Terrorism informatics. Springer, New York
go back to reference Raiffa H, John R, David M (2007) Negotiation analysis: the science and art of collaborative decision making. Belknap Press of Harvard University Press, Cambridge, MA Raiffa H, John R, David M (2007) Negotiation analysis: the science and art of collaborative decision making. Belknap Press of Harvard University Press, Cambridge, MA
go back to reference Shahar Y (2008) Toward a target-specific method of threat assessment. In: Chen H, Reid E, Sinai J, Silke A, Ganor B (eds) Terrorism informatics. Springer, New York Shahar Y (2008) Toward a target-specific method of threat assessment. In: Chen H, Reid E, Sinai J, Silke A, Ganor B (eds) Terrorism informatics. Springer, New York
go back to reference Shen Z, Dessouky MM, Ordonez F (2009a) A two-stage vehicle routing model for large-scale bioterrrorism emergencies. Networks 54:255–269CrossRef Shen Z, Dessouky MM, Ordonez F (2009a) A two-stage vehicle routing model for large-scale bioterrrorism emergencies. Networks 54:255–269CrossRef
go back to reference Shen Z, Ordóñez F, Dessouky MM (2009b) The stochastic vehicle routing problem for minimum unmet demand, Optimization and logistics challenges in the enterprise. Springer series on optimization and its applications. Springer, Heidelberg Shen Z, Ordóñez F, Dessouky MM (2009b) The stochastic vehicle routing problem for minimum unmet demand, Optimization and logistics challenges in the enterprise. Springer series on optimization and its applications. Springer, Heidelberg
go back to reference Shmueli G, Fienberg SE (2006) Current and potential statistical methods for monitoring multiple data streams for biosurveillance. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York Shmueli G, Fienberg SE (2006) Current and potential statistical methods for monitoring multiple data streams for biosurveillance. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York
go back to reference Sparks R, Carter C, Graham P, Muscatello D, Churches T, Kaldor J, Turner R, Zheng W, Ryan L (2010) Understanding sources of variation in syndromic surveillance for early warning of natural or intentional disease outbreaks. IIE Trans 42(9):613–631CrossRef Sparks R, Carter C, Graham P, Muscatello D, Churches T, Kaldor J, Turner R, Zheng W, Ryan L (2010) Understanding sources of variation in syndromic surveillance for early warning of natural or intentional disease outbreaks. IIE Trans 42(9):613–631CrossRef
go back to reference Stoto MA, Fricker RD Jr, Jain A, Diamond A, Davies-Cole JO, Glymph C, Kidane G, Lum G, Jones LV, Dehan K, Yuan C (2006) Evaluating statistical methods for syndromic surveillance. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York Stoto MA, Fricker RD Jr, Jain A, Diamond A, Davies-Cole JO, Glymph C, Kidane G, Lum G, Jones LV, Dehan K, Yuan C (2006) Evaluating statistical methods for syndromic surveillance. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York
go back to reference Stroud P, Del Valle S, Sydoriak S, Riese J, Mniszewski S (2007) Spatial dynamics of pandemic influenza in a massive artificial society. Journal of Artificial Societies and Social Simulation 10(4)9 Stroud P, Del Valle S, Sydoriak S, Riese J, Mniszewski S (2007) Spatial dynamics of pandemic influenza in a massive artificial society. Journal of Artificial Societies and Social Simulation 10(4)9
go back to reference Toth P, Vigo D (eds) (2002) The vehicle routing problem, SIAM monographs on discrete mathematics and applications. SIAM Publishing, Philadelphia Toth P, Vigo D (eds) (2002) The vehicle routing problem, SIAM monographs on discrete mathematics and applications. SIAM Publishing, Philadelphia
go back to reference von Neumann J, Morgenstern O (2007) Theory of games and economic behavior, Commemorative edn. Princeton University Press, Princeton, NJ von Neumann J, Morgenstern O (2007) Theory of games and economic behavior, Commemorative edn. Princeton University Press, Princeton, NJ
go back to reference Wright PD, Matthew JL, Robert LN (2006) A survey of operations research models and applications in homeland security. Interfaces 36(6):514–529CrossRef Wright PD, Matthew JL, Robert LN (2006) A survey of operations research models and applications in homeland security. Interfaces 36(6):514–529CrossRef
Metadata
Title
Using Operations Research Methods for Homeland Security Problems
Author
Jeffrey W. Herrmann
Copyright Year
2013
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-5278-2_1