Open Access
Issue
E3S Web Conf.
Volume 253, 2021
2021 International Conference on Environmental and Engineering Management (EEM 2021)
Article Number 02020
Number of page(s) 7
Section Big Data Environment Management Application and Industry Research
DOI https://doi.org/10.1051/e3sconf/202125302020
Published online 06 May 2021
  1. Marja Lehto. Indirect responsibility for terrorist acts: redefinition of the concept of terrorism beyond violent acts. Martinus Nijhoff Publishers. 2009: 83. [Google Scholar]
  2. Xiewei, Zhang Lujing. How the public join anti-terrorism campaign. China Economic Weekly, 2014, (22): 32–35. [Google Scholar]
  3. Xiaofang Wanga, Jun Zhuang. Balancing congestion and security in the presence of strategic applicants with private information. European Journal of Operational Research, 2011, 212: 100–111. [Google Scholar]
  4. Bakshi N., Gans N., Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment. Management Science, 2010, 56(2): 219–233. [Google Scholar]
  5. Perea F., Puerto J., Revisiting a game theoretic framework for the robust railway network design against intentional attacks. European Journal of Operational Research, 2013, 226: 286–292. [Google Scholar]
  6. Han Juntao Research on the development and coordination mechanism of China express industry under the background of e-commerce. Beijing University of Posts and Telecommunications 2014 [Google Scholar]
  7. Liu Dehai, Zhou Tingting. Hypergame analysis of terrorism attack based on cognitive difference. Systems Engineering-Theory and Practice, 2015, 10(35): 2646–2655. [Google Scholar]
  8. Haphuriwat N., V. M. Bier. Trade-offs between target hardening and overarching protection. European Journal of Operational Research, 2011, 213: 320–328. [Google Scholar]
  9. Sandler T., W. Enders. An economic perspective on transnational terrorism. European Journal of Political Economy, 2004. 302(20): 301–316. [Google Scholar]
  10. Jain S., S. W. Mukand. The economics of high-visibility terrorism. European Journal of Political Economy, 2004, 480(20): 479–494. [Google Scholar]
  11. Ressler S. Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs, 2006, 2(2): 1–10. [Google Scholar]
  12. Pinker E. J. An analysis of short-term responses to threats of terrorism. Management Science, 2007, 53(6): 865–880. [Google Scholar]
  13. Chai Ruirui, Sunkang, Chen Jingfeng, Liu Hailian Optimization model and application f anti-terrorist facilities locations and resource scheduling under continuous terrorist attacks. Systems Engineering-Theory and Practice. 2015, 33(1): 1–8. [Google Scholar]
  14. Han Chuanfeng, Meng Lingpeng, Kong Jingjing. Location of terror response facilities based on dynamic game of complete information. Systems Engineering-Theory and Practice. 2012, 2: 366–372. [Google Scholar]
  15. Zhuang J., V. M. Bier. Balancing terrorism and natural disasters - defensive strategy with endogenous attack effort. Operations Research, 2007, 55(5): 976–991. [Google Scholar]
  16. Zhuang J., V. M. Bier, O. Alagoz. Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 2010, 203(2): 409–418. [Google Scholar]
  17. Zhong Yunpeng, Shuai Bing. Models of cascading failure in hazardous materials transportation network under series of terrorist attacks. Systems Engineering-Theory and Practice. [Google Scholar]
  18. Niyazi Onur Bakir. A Stackelberg game model for resource allocation in cargo container security. Annals of Operations Research, 2011(187): 5–22. [Google Scholar]
  19. Xinhua News Agency Sight Check, Sealing and Security Check by X-ray machine, Real-name Registration for Express Parcels. 2015 Chongqing Economic Times. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.