[1] Perl R F. Trends in terrorism: 2006[C]//Congressional Research Service Reports. Congressional Research Service, Library of Congress, 2006. [2] 付举磊,孙多勇,肖进,等.基于社会网络分析理论的恐怖组织网络研究综述[J].系统工程理论与实践,2013,33(9):2177-2186. [3] 付举磊,肖进,孙多勇,等.基于社会网络的恐怖活动时空特征分析[J].系统工程理论与实践,2015,35(9):2324-2332. [4] Rosendorff B P, Sandler T. The political economy of transnational terrorism[J]. Journal of Conflict Resolution, 2005, 49(2): 171-182. [5] Arce D G, Sandler T. A Game-Theoretic Analysis[J]. Journal of Conflict Resolution, 2005, 49(3): 183-200. [6] Liu D. Terrorism root cause analysis based on subjective game model[C]//International Workshop on Knowledge Discovery and Data Mining. IEEE, 2008. 612-617. [7] Siqueira K. Political and militant wings within dissident movements and organizations[J]. Journal of Conflict Resolution, 2005, 49(2): 218-236. [8] Jaina S. The economics of high-visibility terrorism[J]. European Journal of Political Economy, 2004, 20(2): 479-494. [9] 张昊宇,陈安.应急救灾三方博弈模型研究[J].电子科技大学学报(社会科学版),2011,13(3):24-28. [10] 陈安,陈宁,倪慧荟.现代应急管理应用与实践[M].科学出版社,2010. [11] Patterson S A, Apostolakis G E. Identification of critical locations across multiple infrastructures for terrorist actions[J]. Reliability Engineering & System Safety, 2007, 92(9): 1183-1203. [12] Zhuang J, Bier V M. Balancing terrorism and natural disasters——defensive strategy with endogenous attacker effort[J]. Operations Research, 2007, 55(5): 976-991. [13] Pinker E J. An analysis of short-term responses to threats of terrorism[J]. Management Science, 2007, 53(6): 865-880. [14] Shan X, Zhuang J. Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game[J]. European Journal of Operational Research, 2013, 228(1): 262-272. [15] Navid Ghaffarzadegan, David Andersen F. Modeling behavioral complexities of warning Issuance for domestic security: a simulation approach to develop public management theories[J]. International Public Management Journal, 2012, 15(3): 337-363. [16] Berman O, Gavious A. Location of terror response facilities: a game between state and terrorist[J]. European Journal of Operational Research, 2007, 177(2): 1113-1133. [17] Aliakbarian N, Dehghanian F, Salari M. A bi-level programming model for protection of hierarchical facilities under imminent attacks[J]. Computers & Operations Research, 2015, 64(C): 210-224. [18] 柴瑞瑞,孙康,陈静锋,等.连续恐怖袭击下反恐设施选址与资源调度优化模型及其应用[J].系统工程理论与实践,2016,36(2):464-472. [19] 韩传峰,孟令鹏,张超,等.基于完全信息动态博弈的反恐设施选址模型[J].系统工程理论与实践,2012,32(2):366-372. [20] 方磊,何建敏.应急系统优化选址的模型及其算法[J].系统工程学报,2003,18(1):49-54. [21] 张玲,黄钧.基于场景分析的应急资源布局模型研究[J].中国管理科学,2008(s1):164-167. [22] 刘春林,施建军,何建敏.一类应急物资调度的优化模型研究[J].中国管理科学,2001,9(3):29-36. [23] Keici S, Aras N, Verter V. Incorporating the threat of terrorist attacks in the design of public service facility networks[J]. Optimization Letters, 2012, 6(6): 1101-1121. [24] Ali M A M, Hyung S Y. Transportation problem: a special case for linear programing problems in mining engineering[J]. International Journal of Mining Science and Technology, 2012, 22(3): 371-377. [25] Myerson R B. Game theory: analysis of conflict[M]. Harvard University Press, 1997. |