[1] 王震. 后“伊斯兰国”时代的全球反恐态势略论[J]. 和平与发展, 2018, 32(1):1-25.Wang Zhen. The trends of global war on terror in the post-Islamic State Era[J]. Peace and Development, 2018, 32(1):1-25. [2] 付举磊,肖进,孙多勇, 等. 基于社会网络的恐怖活动时空特征分析[J]. 系统工程理论与实践, 2015, 35 (9):2324-2332.Fu Julei, Xiao Jin, Sun Duoyong, et al. Spatial-temporal characteristics analysis of terrorist activities based on social network analysis[J]. Systems Engineering-Theory & Practice, 2015, 35(9):2324-2332. [3] 柴瑞瑞, 刘德海,陈静锋. 恐怖袭击事件的时空差异特征分析及内生性VAR模型[J]. 中国管理科学, 2016, 24(11): 281-288.Chai Ruirui, Liu Dehai, Chen Jingfen. Spatial-temporal difference analysis of terrorist attacks and endogeneity based on VAR model[J]. Chinese Journal of Management Science, 2016, 24(11): 281-288. [4] 项寅. 基于改进神经网络的恐怖袭击风险预警系统[J]. 灾害学, 2018(1):183-189.Xiang Yin. Warning system of terrorist attacks based on improved neural network[J]. Journal of Catastrophology, 2018(1):183-189. [5] Qi X, Duval R D, Christensen K. Terrorist networks, network energy and node removal: A new measure of centrality based on laplacian energy[J]. Social Networking, 2013, 2 (1):19-31. [6] 项寅. 考虑信息隐藏策略的反恐应急设施选址模型[J]. 系统工程理论与实践, 2019, 39(5):1164-1177.Xiang Yin. Optimization model and application of terror response facility location with hidden information[J]. Systems Engineering-Theory & Practice, 2019, 39(5):1164-1177. [7] Sarhadi H, Tulett D M, Verma M. An analytical approach to the protection planning of a rail intermodal terminal network[J]. European Journal of Operational Research, 2017, 257 (2):511-525. [8] Li Shuying, Zhuang Jun, Shen Shifei. A three-stage evacuation decision-making and behavior model for the onset of an attack[J]. Transportation Research Part C, 2017, 79:119-135. [9] Zhuang J,Bier V M. Balancing terrorism and natural disasters: defensive strategy with endogenous attacker effort[J]. Operations Research, 2007, 55(5):976-991. [10] Shan Xiaojun,Zhuang Jun. Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game[J]. European Journal of Operational Research, 2013, 228(1):262-272. [11] 柴瑞瑞,刘德海,陈静锋. 恐怖分子跨国潜入的反恐安检资源配置研究[J]. 系统工程学报, 2017, 32(3):335-345.Chai Ruirui, Liu Dehai, Chen Jinfen. Study of anti-terrorism security resource allocation in transnational terrorism[J]. Journal of Systems Engineering, 2017, 32(3):335-345. [12] 刘忠轶,翟昕,高岩, 等. 考虑空间因素的反恐防御竞争分析[J]. 系统工程理论与实践, 2016, 36 (1):136-144.Liu Tiezhong, Zhai Xin, Gao Yan, et al. Counter terrorism analysis based on hotelling model[J]. Systems Engineering-Theory & Practice, 2016, 36 (1):136-144. [13] 刘德海,周婷婷. 基于认知差异的恐怖主义袭击误对策分析[J]. 系统工程理论与实践, 2015, 35(10):2646-2656.Liu Dehai, Zhou Tingting. Hypergame analysis of terrorism attack based cognitive difference[J]. Systems Engineering-Theory & Practice, 2015, 35(10): 2646-2656. [14] 刘德海,鲍雪言,王谢宁. 恐怖袭击事件中悲观/乐观情绪如何影响博弈均衡结果[J]. 中国管理科学, 2017, 25(10):80-88.Liu Dehai, Bao Xueyan, Wang Xiening. How does the pessimistic or optimistic emotion influence the game equilibrium outcome in incidents of violence and terrorism[J]. Chinese Journal of Management Science, 2017, 25(10):80-88. [15] 刘德海,柴瑞瑞,韩呈军. 基于心智模型的恐怖主义袭击扩展式演化博弈分析[J]. 中国管理科学, 2018,26(2): 71-78.Liu Dehai, Chai Ruirui, Han Chenjun. Extensive-form evolutionary game analysis on terrorism based mental model[J]. Chinese Journal of Management Science, 2018, 26(2):71-78. [16] Wood R K. Deterministic network interdiction[J]. Mathematical & Computer Modelling, 1993, 17(17): 1-18. [17] Israeli E, Wood R K. Shortest-path network interdiction[J]. Networks, 2002, 40(2):97-111. [18] Lunday B J, Sherali H D. Network interdiction to minimize the maximum probability of evasion with synergy between applied resources[J]. Annals of Operations Research, 2012, 196(1):411-442. [19] Morton D Y, Pan F, Saeger K J. Models for nuclear smuggling interdiction[J]. IIE Transactions, 2007, 39(1):3-14. [20] Pan F, Morton D P. Minimizing a stochastic maximum-reliability path[J]. Networks, 2010, 52:111-119. [21] 李进.基于可信性的低碳物流网络设计多目标模糊规划问题[J].系统工程理论与实践, 2015,35(6):1482-1492.Li Jin. Credibility-based multi-objective fuzzy programming problem for low-carbon logistics network design[J]. Systems Engineering-Theory & Practice, 2015,35(6): 1482-1492. [22] 刘宝碇, 赵瑞清, 王纲. 不确定规划及应用[M].北京:清华大学出版社, 2003: 138-197.Liu Baoding, Zhao Ruiqing, Wang Gang. Uncertain programming and its application[M]. Beijing: Tsinghua university press, 2003: 138-197. [23] 郭子雪, 齐美然. 模糊需求下的应急物资动态库存控制模型[J]. 中国管理科学, 2016, 24(11): 276-280.Guo Zixue, Qi Meiran. Dynamic inventory control model of emergency supplies under fuzzy demand[J]. Chinese Journal of Management Science, 2016, 24(11): 276-280.
|