Skip to main content
Erschienen in:
Buchtitelbild

2013 | OriginalPaper | Buchkapitel

1. Using Operations Research Methods for Homeland Security Problems

verfasst von : Jeffrey W. Herrmann

Erschienen in: Handbook of Operations Research for Homeland Security

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter describes operations research (OR) techniques and highlights their use to solve homeland security problems. This is intended to give policy makers and decision makers insight into what OR can do and how it is relevant to their particular concerns and problems. After discussing how to use OR, the chapter reviews four areas: (1) understanding what has happened; (2) considering what could happen; (3) deciding what to do; and (4) finding the best solution. The techniques available for understanding what has happened include data mining and monitoring time series data. Considering what could happen requires risk analysis and using queueing models and simulation models. Decision analysis and game theory can be used to make decisions, but finding the best solution requires formulating and solving an optimization problem. Because the examples illustrate how specific techniques have been applied, homeland security professionals can use this chapter to understand what operations research can offer and identify the techniques that are relevant to their problems. The chapter also includes references to essential books and articles that can provide more information.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Aaby K, Herrmann JW, Jordan C, Treadwell M, Wood K (2006a) Montgomery County’s Public Health Service uses operations research to plan emergency mass-dispensing and vaccination clinics. Interfaces 36(6):569–579CrossRef Aaby K, Herrmann JW, Jordan C, Treadwell M, Wood K (2006a) Montgomery County’s Public Health Service uses operations research to plan emergency mass-dispensing and vaccination clinics. Interfaces 36(6):569–579CrossRef
Zurück zum Zitat Aaby K, Abbey R, Herrmann JW, Treadwell M, Jordan C, Wood K (2006b) Embracing computer modeling to address pandemic influenza in the 21st century. J Public Health Manag Pract 12(4):365–372 Aaby K, Abbey R, Herrmann JW, Treadwell M, Jordan C, Wood K (2006b) Embracing computer modeling to address pandemic influenza in the 21st century. J Public Health Manag Pract 12(4):365–372
Zurück zum Zitat Aleman DM, Wibisono TG, Schwartz B (2011) A nonhomogeneous agent-based simulation approach to modeling the spread of disease in a pandemic outbreak. Interfaces 41(3):301–315CrossRef Aleman DM, Wibisono TG, Schwartz B (2011) A nonhomogeneous agent-based simulation approach to modeling the spread of disease in a pandemic outbreak. Interfaces 41(3):301–315CrossRef
Zurück zum Zitat Altay N, Green WG (2006) OR/MS research in disaster operations management. Eur J Oper Res 175:475–493CrossRef Altay N, Green WG (2006) OR/MS research in disaster operations management. Eur J Oper Res 175:475–493CrossRef
Zurück zum Zitat Bakuli DL, Smith JM (1996) Resource allocation in state-dependent emergency evacuation networks. Eur J Oper Res 89(3):543–555CrossRef Bakuli DL, Smith JM (1996) Resource allocation in state-dependent emergency evacuation networks. Eur J Oper Res 89(3):543–555CrossRef
Zurück zum Zitat Bansal M, Kianfar K (2010) An exact algorithm for coverage problem with a single rectangle. In: Johnson A, Miller J (eds) Proceedings of the 2010 Industrial Engineering Research Conference, Cancun, 5–9 June 2010 Bansal M, Kianfar K (2010) An exact algorithm for coverage problem with a single rectangle. In: Johnson A, Miller J (eds) Proceedings of the 2010 Industrial Engineering Research Conference, Cancun, 5–9 June 2010
Zurück zum Zitat Bier V (2006) Game-theoretic and reliability methods in counterterrorism and security. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York Bier V (2006) Game-theoretic and reliability methods in counterterrorism and security. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York
Zurück zum Zitat Bier VM, Azaiez MN (eds) (2009) Game theoretic risk analysis of security threats. Springer, New York Bier VM, Azaiez MN (eds) (2009) Game theoretic risk analysis of security threats. Springer, New York
Zurück zum Zitat Bonabeau E (2003) Don’t trust your gut. Harv Bus Rev 81(5):116–123 Bonabeau E (2003) Don’t trust your gut. Harv Bus Rev 81(5):116–123
Zurück zum Zitat Box GEP, Jenkins GM, Reinsel GC (1994) Time series analysis, 3rd edn. Prentice Hall, Englewood Cliffs, NJ Box GEP, Jenkins GM, Reinsel GC (1994) Time series analysis, 3rd edn. Prentice Hall, Englewood Cliffs, NJ
Zurück zum Zitat Bradley SP, Hax AC, Magnanti TL (1977) Applied mathematical programming. Addison-Wesley, Reading, MA Bradley SP, Hax AC, Magnanti TL (1977) Applied mathematical programming. Addison-Wesley, Reading, MA
Zurück zum Zitat Brown GG, Cox LA Jr (2011) How probabilistic risk assessment can mislead terrorism risk analysts. Risk Anal 31(2):196–204CrossRef Brown GG, Cox LA Jr (2011) How probabilistic risk assessment can mislead terrorism risk analysts. Risk Anal 31(2):196–204CrossRef
Zurück zum Zitat Butler JC, Chebeskov AN, Dyer JS, Edmunds TA, Jia J, Oussanov VI (2005) The United States and Russia evaluate plutonium disposition options with multiattribute utility theory. Interfaces 35(1):88–101CrossRef Butler JC, Chebeskov AN, Dyer JS, Edmunds TA, Jia J, Oussanov VI (2005) The United States and Russia evaluate plutonium disposition options with multiattribute utility theory. Interfaces 35(1):88–101CrossRef
Zurück zum Zitat Candalino TJ, Jacobson SH, Kobza JE (2004) Designing optimal aviation baggage screening strategies using simulated annealing. Comput Oper Res 31(10):1753–1767CrossRef Candalino TJ, Jacobson SH, Kobza JE (2004) Designing optimal aviation baggage screening strategies using simulated annealing. Comput Oper Res 31(10):1753–1767CrossRef
Zurück zum Zitat Chen W, Hsu S, Shen H (2005) Application of SVM and ANN for intrusion detection. Comput Oper Res 32(10):2617–2634CrossRef Chen W, Hsu S, Shen H (2005) Application of SVM and ANN for intrusion detection. Comput Oper Res 32(10):2617–2634CrossRef
Zurück zum Zitat Clemen RT, Reilly T (2001) Making hard decisions with decision tools. Duxbury, Pacific Grove, CA Clemen RT, Reilly T (2001) Making hard decisions with decision tools. Duxbury, Pacific Grove, CA
Zurück zum Zitat Cormican KJ, Morton DP, Wood RK (1998) Stochastic network interdiction. Oper Res 46:184–197CrossRef Cormican KJ, Morton DP, Wood RK (1998) Stochastic network interdiction. Oper Res 46:184–197CrossRef
Zurück zum Zitat Cox LA Jr (2009) Game theory and risk analysis. Risk Anal 29(8):1062–1068CrossRef Cox LA Jr (2009) Game theory and risk analysis. Risk Anal 29(8):1062–1068CrossRef
Zurück zum Zitat Current J, O’Kelly M (1992) Locating emergency warning sirens. Decis Sci 23(1):221–234CrossRef Current J, O’Kelly M (1992) Locating emergency warning sirens. Decis Sci 23(1):221–234CrossRef
Zurück zum Zitat Das TK, Savachkin AA, Zhu Y (2008) A large-scale simulation model of pandemic influenza outbreaks for development of dynamic mitigation strategies. IIE Trans 40:893–905CrossRef Das TK, Savachkin AA, Zhu Y (2008) A large-scale simulation model of pandemic influenza outbreaks for development of dynamic mitigation strategies. IIE Trans 40:893–905CrossRef
Zurück zum Zitat Defense Science Board Advisory Group on Defense Intelligence (2009) Operations research applications for intelligence, surveillance, and reconnaissance (ISR). Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, Washington, DC Defense Science Board Advisory Group on Defense Intelligence (2009) Operations research applications for intelligence, surveillance, and reconnaissance (ISR). Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, Washington, DC
Zurück zum Zitat Dekle J, Lavieri MS, Martin E, Emir-Farinas H, Francis RL (2005) A Florida county locates disaster recovery centers. Interfaces 35(2):133–139CrossRef Dekle J, Lavieri MS, Martin E, Emir-Farinas H, Francis RL (2005) A Florida county locates disaster recovery centers. Interfaces 35(2):133–139CrossRef
Zurück zum Zitat Denizel M, Usdiken B, Tuncalp D (2003) Drift or shift? Continuity, change, and international variation in knowledge production in OR/MS. Oper Res 51(5):711–720CrossRef Denizel M, Usdiken B, Tuncalp D (2003) Drift or shift? Continuity, change, and international variation in knowledge production in OR/MS. Oper Res 51(5):711–720CrossRef
Zurück zum Zitat Dyer JS, Edmunds T, Butler JC, Jia J (1998) A multiattribute utility analysis of alternatives for the disposition of surplus weapons-grade plutonium. Oper Res 46(6):749–762CrossRef Dyer JS, Edmunds T, Butler JC, Jia J (1998) A multiattribute utility analysis of alternatives for the disposition of surplus weapons-grade plutonium. Oper Res 46(6):749–762CrossRef
Zurück zum Zitat Ezell BC, Bennett SP, Von Winterfeldt D, Sokolowski J, Collins AJ (2010) Probabilistic risk analysis and terrorism risk. Risk Anal 30(4):575–589CrossRef Ezell BC, Bennett SP, Von Winterfeldt D, Sokolowski J, Collins AJ (2010) Probabilistic risk analysis and terrorism risk. Risk Anal 30(4):575–589CrossRef
Zurück zum Zitat Fienberg SE (2008) Homeland insecurity: data mining, privacy, disclosure limitation, and the hunt for terrorists. In: Chen H, Reid E, Sinai J, Silke A, Ganor B (eds) Terrorism informatics. Springer, New York Fienberg SE (2008) Homeland insecurity: data mining, privacy, disclosure limitation, and the hunt for terrorists. In: Chen H, Reid E, Sinai J, Silke A, Ganor B (eds) Terrorism informatics. Springer, New York
Zurück zum Zitat Gaver DP, Glazebrook KD, Jacobs PA (2009) Search for a malevolent needle in a benign haystack. In: Bier VM, Azaiez MN (eds) Game theoretic risk analysis of security threats. Springer, New York Gaver DP, Glazebrook KD, Jacobs PA (2009) Search for a malevolent needle in a benign haystack. In: Bier VM, Azaiez MN (eds) Game theoretic risk analysis of security threats. Springer, New York
Zurück zum Zitat Gilliam RR (1979) An application of queueing theory to airport passenger security screening. Interfaces 9(4):117–122CrossRef Gilliam RR (1979) An application of queueing theory to airport passenger security screening. Interfaces 9(4):117–122CrossRef
Zurück zum Zitat Hall RW (1991) Queuing methods for services and manufacturing. Prentice Hall, Englewood Cliffs, NJ Hall RW (1991) Queuing methods for services and manufacturing. Prentice Hall, Englewood Cliffs, NJ
Zurück zum Zitat Hastie T, Tibshirani R, Friedman J (2009) The elements of statistical learning: data mining, inference, and prediction, 2nd edn. Springer, New York Hastie T, Tibshirani R, Friedman J (2009) The elements of statistical learning: data mining, inference, and prediction, 2nd edn. Springer, New York
Zurück zum Zitat Hausken K (2011) Strategic defense and attack of series systems when agents move sequentially. IIE Trans 43(7):483–504CrossRef Hausken K (2011) Strategic defense and attack of series systems when agents move sequentially. IIE Trans 43(7):483–504CrossRef
Zurück zum Zitat Herrmann JW (2008) Disseminating emergency preparedness planning models as automatically generated custom spreadsheets. Interfaces 38(4):263–270CrossRef Herrmann JW (2008) Disseminating emergency preparedness planning models as automatically generated custom spreadsheets. Interfaces 38(4):263–270CrossRef
Zurück zum Zitat Herrmann JW, Lu S, Schalliol K (2009) A routing and scheduling approach for planning medication distribution. In: Proceedings of the 2009 Industrial Engineering Research Conference, Miami, FL, 30 May–June 3 June 2009 Herrmann JW, Lu S, Schalliol K (2009) A routing and scheduling approach for planning medication distribution. In: Proceedings of the 2009 Industrial Engineering Research Conference, Miami, FL, 30 May–June 3 June 2009
Zurück zum Zitat Jacobson SH, Kobza JE, Nakayama MK (2000) Sampling procedure to estimate risk probabilities in access-control security systems. Eur J Oper Res 122(1):123–132CrossRef Jacobson SH, Kobza JE, Nakayama MK (2000) Sampling procedure to estimate risk probabilities in access-control security systems. Eur J Oper Res 122(1):123–132CrossRef
Zurück zum Zitat Jacobson SH, Virta JL, Bowman JM, Kobza JE, Nestor JJ (2003) Modeling aviation baggage screening security systems: a case study. IIE Trans 35(3):259–269CrossRef Jacobson SH, Virta JL, Bowman JM, Kobza JE, Nestor JJ (2003) Modeling aviation baggage screening security systems: a case study. IIE Trans 35(3):259–269CrossRef
Zurück zum Zitat Jacobson SH, McLay LA, Kobza JE, Bowman JM (2005) Modeling and analyzing multiple station baggage screening security system performance. Naval Res Logist 52(1):30–45CrossRef Jacobson SH, McLay LA, Kobza JE, Bowman JM (2005) Modeling and analyzing multiple station baggage screening security system performance. Naval Res Logist 52(1):30–45CrossRef
Zurück zum Zitat Jain S, McLean CR, Lee YT (2007) Towards standards for integrated gaming and simulation for incident management. In: Proceedings of the 2007 summer computer simulation conference (SCSC). Society for Computer Simulation International, San Diego, CA, pp 1213–1222 Jain S, McLean CR, Lee YT (2007) Towards standards for integrated gaming and simulation for incident management. In: Proceedings of the 2007 summer computer simulation conference (SCSC). Society for Computer Simulation International, San Diego, CA, pp 1213–1222
Zurück zum Zitat Jia H, Fernando O, Maged D (2007) A modeling framework for facility location of medical services for large-scale emergencies. IIE Trans 39(1):41–55CrossRef Jia H, Fernando O, Maged D (2007) A modeling framework for facility location of medical services for large-scale emergencies. IIE Trans 39(1):41–55CrossRef
Zurück zum Zitat Kobza JE, Jacobson SH (1996) Addressing the dependency problem in access security system architecture design. Risk Anal 16(6):801–812CrossRef Kobza JE, Jacobson SH (1996) Addressing the dependency problem in access security system architecture design. Risk Anal 16(6):801–812CrossRef
Zurück zum Zitat Kobza JE, Jacobson SH (1997) Probability models for access security system architectures. J Oper Res Soc 48(3):255–263 Kobza JE, Jacobson SH (1997) Probability models for access security system architectures. J Oper Res Soc 48(3):255–263
Zurück zum Zitat Krings A, Azadmanesh WA (2005) A graph based model for survivability applications. Eur J Oper Res 164(3):680–689CrossRef Krings A, Azadmanesh WA (2005) A graph based model for survivability applications. Eur J Oper Res 164(3):680–689CrossRef
Zurück zum Zitat Law AM (2007) Simulation modeling & analysis, 4th edn. McGraw-Hill, Boston Law AM (2007) Simulation modeling & analysis, 4th edn. McGraw-Hill, Boston
Zurück zum Zitat Li H, Apostolakis GE, Gifun J, VanSchalkwyk W, Leite S, Barber D (2009) Ranking the risks from multiple hazards in a small community. Risk Anal 29(3):438–456CrossRef Li H, Apostolakis GE, Gifun J, VanSchalkwyk W, Leite S, Barber D (2009) Ranking the risks from multiple hazards in a small community. Risk Anal 29(3):438–456CrossRef
Zurück zum Zitat Lim C, Smith JC (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39(1):15–26CrossRef Lim C, Smith JC (2007) Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans 39(1):15–26CrossRef
Zurück zum Zitat Lim GJ, Zangeneh S, Baharnemati MR, Assavapokee T (2009) A sequential solution approach for short notice evacuation scheduling and routing. In: Proceedings of the 2009 industrial engineering research conference, Miami, FL, 30 May–3 June 2009 Lim GJ, Zangeneh S, Baharnemati MR, Assavapokee T (2009) A sequential solution approach for short notice evacuation scheduling and routing. In: Proceedings of the 2009 industrial engineering research conference, Miami, FL, 30 May–3 June 2009
Zurück zum Zitat Luce RD, Raiffa H (1957) Games and decisions. Wiley, New York Luce RD, Raiffa H (1957) Games and decisions. Wiley, New York
Zurück zum Zitat Martonosi S (2011) Dynamic server allocation at parallel queues. IIE Trans 43(12):863–877 Martonosi S (2011) Dynamic server allocation at parallel queues. IIE Trans 43(12):863–877
Zurück zum Zitat Martonosi SE, Barnett A (2006) How effective is security screening of airline passengers. Interfaces 36(6):545–552CrossRef Martonosi SE, Barnett A (2006) How effective is security screening of airline passengers. Interfaces 36(6):545–552CrossRef
Zurück zum Zitat McCormick PM, McNeill G, Hendrix D, McCormick T (2010) Complexity, terror and Murphy’s law. OR/MS Today 37(6):26–33 McCormick PM, McNeill G, Hendrix D, McCormick T (2010) Complexity, terror and Murphy’s law. OR/MS Today 37(6):26–33
Zurück zum Zitat Meredith JR (2001) Reconsidering the philosophical basis of OR/MS. Oper Res 49(3):325–333CrossRef Meredith JR (2001) Reconsidering the philosophical basis of OR/MS. Oper Res 49(3):325–333CrossRef
Zurück zum Zitat Michalak S, Wilson G (2006) Modeling and parameterization for a smallpox simulation study. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York Michalak S, Wilson G (2006) Modeling and parameterization for a smallpox simulation study. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York
Zurück zum Zitat Miller G, Randolph S, Patterson JE (2006) Responding to bioterrorist smallpox in San Antonio. Interfaces 36(6):580–590CrossRef Miller G, Randolph S, Patterson JE (2006) Responding to bioterrorist smallpox in San Antonio. Interfaces 36(6):580–590CrossRef
Zurück zum Zitat Modarres M (2006) Risk analysis in engineering. CRC, Boca Raton, FL Modarres M (2006) Risk analysis in engineering. CRC, Boca Raton, FL
Zurück zum Zitat Montjoy A, Herrmann JW (2010) Adaptive large neighborhood search for the inventory slack routing problem. In: Proceedings of the 2010 Industrial Engineering Research Conference, Cancun, 5–9 June 2010 Montjoy A, Herrmann JW (2010) Adaptive large neighborhood search for the inventory slack routing problem. In: Proceedings of the 2010 Industrial Engineering Research Conference, Cancun, 5–9 June 2010
Zurück zum Zitat Moore M, Wermuth MA, Castaneda LW, Chandra A, Noricks D, Resnick AC, Chu C, Burks JJ (2010) Bridging the gap: developing a tool to support local civilian and military disaster preparedness. Rand Corporation, Center for Military Health Policy Research, Santa Monica, CA Moore M, Wermuth MA, Castaneda LW, Chandra A, Noricks D, Resnick AC, Chu C, Burks JJ (2010) Bridging the gap: developing a tool to support local civilian and military disaster preparedness. Rand Corporation, Center for Military Health Policy Research, Santa Monica, CA
Zurück zum Zitat Nehme MV, Morton DP (2009) Tightening a network interdiction model. In: Proceedings of the 2009 Industrial Engineering Research Conference, Miami, FL, 30 May–3 June 2009 Nehme MV, Morton DP (2009) Tightening a network interdiction model. In: Proceedings of the 2009 Industrial Engineering Research Conference, Miami, FL, 30 May–3 June 2009
Zurück zum Zitat Newell GF (1982) Applications of queueing theory, 2nd edn. Chapman and Hall, LondonCrossRef Newell GF (1982) Applications of queueing theory, 2nd edn. Chapman and Hall, LondonCrossRef
Zurück zum Zitat O’Hara S, McLean CR, Lee YT (2010) Modeling and simulation for emergency management and health care systems: workshop summary (NISTIR 7684). National Institute of Standards and Technology, Gaithersburg, MD O’Hara S, McLean CR, Lee YT (2010) Modeling and simulation for emergency management and health care systems: workshop summary (NISTIR 7684). National Institute of Standards and Technology, Gaithersburg, MD
Zurück zum Zitat Paté-Cornell ME (2009) Games and risk analysis. In: Bier VM, Azaiez MN (eds) Game theoretic risk analysis of security threats. Springer, New York Paté-Cornell ME (2009) Games and risk analysis. In: Bier VM, Azaiez MN (eds) Game theoretic risk analysis of security threats. Springer, New York
Zurück zum Zitat Paté-Cornell ME, Guikema SD (2002) Probabilistic modeling of terrorist threats: a systems analysis approach to setting priorities among countermeasures. Military Oper Res 7(4):5–23CrossRef Paté-Cornell ME, Guikema SD (2002) Probabilistic modeling of terrorist threats: a systems analysis approach to setting priorities among countermeasures. Military Oper Res 7(4):5–23CrossRef
Zurück zum Zitat Qin J, Zhou Y, Reid E, Chen H (2008) Studying global extremist organizations’ internet presence using the dark web attribute system: a three region comparison study. In: Chen H, Reid E, Sinai J, Silke A, Ganor B (eds) Terrorism informatics. Springer, New York Qin J, Zhou Y, Reid E, Chen H (2008) Studying global extremist organizations’ internet presence using the dark web attribute system: a three region comparison study. In: Chen H, Reid E, Sinai J, Silke A, Ganor B (eds) Terrorism informatics. Springer, New York
Zurück zum Zitat Raiffa H, John R, David M (2007) Negotiation analysis: the science and art of collaborative decision making. Belknap Press of Harvard University Press, Cambridge, MA Raiffa H, John R, David M (2007) Negotiation analysis: the science and art of collaborative decision making. Belknap Press of Harvard University Press, Cambridge, MA
Zurück zum Zitat Shahar Y (2008) Toward a target-specific method of threat assessment. In: Chen H, Reid E, Sinai J, Silke A, Ganor B (eds) Terrorism informatics. Springer, New York Shahar Y (2008) Toward a target-specific method of threat assessment. In: Chen H, Reid E, Sinai J, Silke A, Ganor B (eds) Terrorism informatics. Springer, New York
Zurück zum Zitat Shen Z, Dessouky MM, Ordonez F (2009a) A two-stage vehicle routing model for large-scale bioterrrorism emergencies. Networks 54:255–269CrossRef Shen Z, Dessouky MM, Ordonez F (2009a) A two-stage vehicle routing model for large-scale bioterrrorism emergencies. Networks 54:255–269CrossRef
Zurück zum Zitat Shen Z, Ordóñez F, Dessouky MM (2009b) The stochastic vehicle routing problem for minimum unmet demand, Optimization and logistics challenges in the enterprise. Springer series on optimization and its applications. Springer, Heidelberg Shen Z, Ordóñez F, Dessouky MM (2009b) The stochastic vehicle routing problem for minimum unmet demand, Optimization and logistics challenges in the enterprise. Springer series on optimization and its applications. Springer, Heidelberg
Zurück zum Zitat Shmueli G, Fienberg SE (2006) Current and potential statistical methods for monitoring multiple data streams for biosurveillance. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York Shmueli G, Fienberg SE (2006) Current and potential statistical methods for monitoring multiple data streams for biosurveillance. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York
Zurück zum Zitat Sparks R, Carter C, Graham P, Muscatello D, Churches T, Kaldor J, Turner R, Zheng W, Ryan L (2010) Understanding sources of variation in syndromic surveillance for early warning of natural or intentional disease outbreaks. IIE Trans 42(9):613–631CrossRef Sparks R, Carter C, Graham P, Muscatello D, Churches T, Kaldor J, Turner R, Zheng W, Ryan L (2010) Understanding sources of variation in syndromic surveillance for early warning of natural or intentional disease outbreaks. IIE Trans 42(9):613–631CrossRef
Zurück zum Zitat Stoto MA, Fricker RD Jr, Jain A, Diamond A, Davies-Cole JO, Glymph C, Kidane G, Lum G, Jones LV, Dehan K, Yuan C (2006) Evaluating statistical methods for syndromic surveillance. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York Stoto MA, Fricker RD Jr, Jain A, Diamond A, Davies-Cole JO, Glymph C, Kidane G, Lum G, Jones LV, Dehan K, Yuan C (2006) Evaluating statistical methods for syndromic surveillance. In: Wilson AG, Wilson GD, Olwell DH (eds) Statistical methods in counterterrorism. Springer, New York
Zurück zum Zitat Stroud P, Del Valle S, Sydoriak S, Riese J, Mniszewski S (2007) Spatial dynamics of pandemic influenza in a massive artificial society. Journal of Artificial Societies and Social Simulation 10(4)9 Stroud P, Del Valle S, Sydoriak S, Riese J, Mniszewski S (2007) Spatial dynamics of pandemic influenza in a massive artificial society. Journal of Artificial Societies and Social Simulation 10(4)9
Zurück zum Zitat Toth P, Vigo D (eds) (2002) The vehicle routing problem, SIAM monographs on discrete mathematics and applications. SIAM Publishing, Philadelphia Toth P, Vigo D (eds) (2002) The vehicle routing problem, SIAM monographs on discrete mathematics and applications. SIAM Publishing, Philadelphia
Zurück zum Zitat von Neumann J, Morgenstern O (2007) Theory of games and economic behavior, Commemorative edn. Princeton University Press, Princeton, NJ von Neumann J, Morgenstern O (2007) Theory of games and economic behavior, Commemorative edn. Princeton University Press, Princeton, NJ
Zurück zum Zitat Wright PD, Matthew JL, Robert LN (2006) A survey of operations research models and applications in homeland security. Interfaces 36(6):514–529CrossRef Wright PD, Matthew JL, Robert LN (2006) A survey of operations research models and applications in homeland security. Interfaces 36(6):514–529CrossRef
Metadaten
Titel
Using Operations Research Methods for Homeland Security Problems
verfasst von
Jeffrey W. Herrmann
Copyright-Jahr
2013
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-5278-2_1