[1]
|
H. A. Bennett and M. T. Olascoaga, “Evaluation Methodology for Fixed-Site Physical Protection Systems,” Nuclear Materials Management, Vol. 9, 1980, pp. 403-410.
|
[2]
|
J. L. Darby, B. E. Simpkins and B. R. Key, “A Microcomputer Code for Evaluating Physical Security Effectiveness Using Adversary Sequence Diagrams,” Nuclear Materials Management, Vol. 15, 1986, pp. 242-245.
|
[3]
|
L. R. Doyon, “Stochastic Modeling of Facility Security-Systems for Analytical Solutions,” Computers & Industrial Engineering, Vol. 5, No. 2, 1981, pp. 127-138.
http://dx.doi.org/10.1016/0360-8352(81)90020-6
|
[4]
|
J. E. Kobza and S. H. Jacobson, “Probability Models for Access Security System Architectures,” Journal of the Operational Research Society, Vol. 48, 1997, pp. 255-263.
|
[5]
|
M. J. Hicks, M. S. Snell, J. S. Sandoval and C. S. Potter, “Physical Protection Systems Cost and Performance Analysis: A Case Study,” IEEE Aerospace and Electronic Systems Magazine, Vol. 14, No. 4, 1999, pp. 9-13.
http://dx.doi.org/10.1109/62.756078
|
[6]
|
E. H. Robert Fischer and D. Walters, “Introduction to Security,” 9th Edition, Elsevier, 2012, p. 544.
|
[7]
|
Z. Chen, “The Research and Practice on the Evalation of Effectiveness on Security System. China Security, 2007.
|
[8]
|
M. L. Garcia, “The Design and Evaluation of Physical Protection Systems,” Butterworth-Heinemann, Boston, 2001.
|
[9]
|
J. Pollet and J. Cummins, “All Hazards Approach for Assessing Readiness of Critical Infrastructure,” IEEE Conference on Technologies for Homeland Security, Boston, 11- 12 May 2009, pp. 366-372.
|
[10]
|
P. Xu, X. Su, J. Wu, X. Sun, Y. Zhang, Y. Deng, “Risk Analysis of Physical Protection System Based on Evidence Theory,” Journal of Information and Computational Science, Vol. 7, 2010, pp. 2871-2878.
|
[11]
|
M. E. Nikoofal and J. Zhuang, “Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information,” Risk Analysis, Vol. 32, 2012, pp. 930-943.
http://dx.doi.org/10.1111/j.1539-6924.2011.01702.x
|
[12]
|
K. Hausken and J. Zhuang, “The Timing and Deterrence of Terrorist Attacks Due to Exogenous Dynamics,” Journal of the Operational Research Society, Vol. 63, 2012, pp. 726-735. http://dx.doi.org/10.1057/jors.2011.79
|
[13]
|
M. Golalikhani and J. Zhuang, “Modeling Arbitrary Layers of Continuous-Level Defenses in Facing with Strategic Attackers,” Risk Analysis, Vol. 31, 2011, pp. 533- 547. http://dx.doi.org/10.1111/j.1539-6924.2010.01531.x
|
[14]
|
J. Zhuang, V. M. Bier and O. Alagoz, “Modeling Secrecy and Deception in a Multiple-Period Attacker-Defender Signaling Game,” European Journal of Operational Re- search, Vol. 203, 2010, pp. 409-418.
http://dx.doi.org/10.1016/j.ejor.2009.07.028
|
[15]
|
J. Zhuang and V. M. Bier, “Balancing Terrorism and Natural Disasters-Defensive Strategy with Endogenous Attacker Effort,” Operations Research, Vol. 55, 2007, pp. 976-991. http://dx.doi.org/10.1287/opre.1070.0434
|