Decomposition principle for linear programs, Oper. Res, vol.8, issue.1, pp.101-111, 1960. ,
DOI : 10.1287/opre.8.1.101
, Border security, p.2, 2017.
Interdiction models and applications. Hermmann J, ed., Handbook of Operations Research for Homeland Security, 2012. ,
DOI : 10.1007/978-1-4614-5278-2_4
URL : https://calhoun.nps.edu/bitstream/10945/37918/1/Dimitrov-InterdictionModelsChapter.pdf
An integrated screening model for screening cargo containers for nuclear weapons, European Journal of Operational Research, vol.230, pp.181-189, 2013. ,
DOI : 10.1016/j.ejor.2013.04.001
Maximum matching and a polyhedron with 0, l-vertices, J. Res. Nat. Bur. Standards B, vol.69, pp.125-130, 1965. ,
DOI : 10.6028/jres.069b.013
URL : https://doi.org/10.6028/jres.069b.013
Very simple methods for all pairs network flow analysis, SIAM Journal on Computing, vol.19, issue.1, pp.143-155, 1990. ,
DOI : 10.1137/0219009
Security routing games with multivehicle chinese postman problem, Networks, vol.64, issue.3, pp.181-191, 2014. ,
DOI : 10.1002/net.21563
, Security games with arbitrary schedules: A branch and price approach. AAAI Conference on Artificial Intelligence, 2010.
Software assistants for randomized patrol planning for the lax airport police and the federal air marshal service, Interfaces, vol.40, issue.4, pp.267-290, 2010. ,
Computing optimal randomized resource allocations for massive security games, AAMAS, vol.1, pp.689-696, 2009. ,
, Article submitted to Operations Research
On generalized stackelberg strategies, J. Optim. Theory Appl, vol.26, issue.4, pp.637-643, 1978. ,
Risk-based policies for airport security checkpoint screening, Transportation Science, vol.44, pp.333-349, 2010. ,
Passenger grouping with risk levels in an airport security system, European Journal of Operational Research, vol.194, issue.2, pp.574-584, 2009. ,
Odd minimum cut-sets and b-matchings, Mathematics of Operations Research, vol.7, issue.1, pp.67-80, 1982. ,
Patrolling a border, Operations Research, 2016. ,
Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games, AAMAS, vol.2, pp.895-902, 2008. ,
Protect: A deployed game theoretic system to protect the ports of the united states, AAMAS, vol.1, pp.13-20, 2012. ,
, Market Structure and Equilibrium, 2011.
A survey of operations research models and applications in homeland security, Interfaces, vol.36, pp.514-529, 2006. ,
Optimal placement of multiple types of detectors under a small vessel attack threat to port security, Transportation Research Part E: Logistics and Transportation Review, vol.93, 2016. ,
Adaptive resource allocation for wildlife protection against illegal poachers, AAMAS, 2014. ,
Scaling-up security games with boundedly rational adversaries: A cutting-plane approach, IJCAI, 2013. ,
Trusts: Scheduling randomized patrols for fare inspection in transit systems using game theory, AI Magazine, vol.33, issue.4, pp.59-72, 2012. ,
A unified method for handling discrete and continuous uncertainty in bayesian Stackelberg games, AAMAS, 2012. ,