[1] Qi X, Duval R D, Christensen K. Terrorist networks, network energy and node removal: z new measure of centrality based on laplacian energy[J]. Social Networking, 2013, 2(1): 19-31. [2] 付举磊,孙多勇,肖进,汪寿阳.基于社会网络分析理论的恐怖组织网络研究综述[J].系统工程理论与实践, 2013, 33(9):2177-2186. [3] 付举磊,肖进,孙多勇,汪寿阳.基于社会网络的恐怖活动时空特征分析[J].系统工程理论与实践, 2015, 35 (9):2324-2332. [4] 柴瑞瑞,刘德海,陈静锋.恐怖袭击事件的时空差异特征分析及内生性VAR模型[J].中国管理科学, 2016, 24(11): 281-288. [5] Willis H H. Guiding resource allocations based on terrorism risk[J]. Risk Analysis, 2007, 27(3): 597-606. [6] 项寅.基于改进神经网络的恐怖袭击风险预警系统[J].灾害学,2018(1):183-189. [7] Ma L, Chen B, Qiu S, et al. Agent-based modeling of emergency evacuation in a railway station square under sarin terrorist attack[J]. International Journal of Modeling Simulation & Scientific Computing, 2016, 8(2): 183-196. [8] Li S, Zhuang J, Shen S. A three-stage evacuation decision-making and behavior model for the onset of an attack[J]. Transportation Research Part C, 2017, 79: 119-135. [9] Scaparra M P, Church RL. A bilevel mixed-integer program for critical infrastructure protection planning[J]. Computers & Operations Research , 2008 , 35(6): 1905-1923. [10] Sarhadi H, Tulett D M, Verma M. An analytical approach to the protection planning of a rail intermodal terminal network[J]. European Journal of Operational Research, 2017, 257(2): 511-525. [11] 项寅.基于双层规划的反恐应急设施选址模型及算法[J].中国管理科学,2019,27(7):147-157. [12] Meng LP, Kang Q, Han CF, et al. Determining the optimal location of terror response facilities under the risk of disruption[J]. IEEE Transactions on Intelligent Transportation Systems, 2017, 99: 1-11. [13] Zhuang J, Bier V M. Balancing terrorism and natural disasters: defensive strategy with endogenous attacker effort[J]. Operations Research, 2007, 55(5): 976-991. [14] Shan X, Zhuang J. Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game[J]. European Journal of Operational Research, 2013, 228(1): 262-272. [15] 柴瑞瑞,刘德海,陈静锋.恐怖分子跨国潜入的反恐安检资源配置研究[J].系统工程学报,2017,32(3):335-345. [16] 刘忠轶,翟昕,高岩,张福松.考虑空间因素的反恐防御竞争分析[J].系统工程理论与实践,2016,36(1):136-144. [17] 刘德海,周婷婷.基于认知差异的恐怖主义袭击误对策分析[J].系统工程理论与实践,2015,35(10):2646-2656. [18] 刘德海,鲍雪言,王谢宁.恐怖袭击事件中悲观/乐观情绪如何影响博弈均衡结果[J].中国管理科学,2017,25(10):80-88. [19] 刘德海,柴瑞瑞,韩呈军.基于心智模型的恐怖主义袭击扩展式演化博弈分析[J].中国管理科学,2018,26(2):71-78. [20] Wood R K. Deterministic network interdiction[J]. Mathematical & Computer Modelling, 1993, 17(17): 1-18. [21] Israeli E, Wood R K. Shortest-path network interdiction[J]. Networks, 2002 , 40(2): 97-111. [22] Pan F, Morton D P. Minimizing a stochastic maximum-reliability path[J]. Networks, 2010, 52(52): 111-119. |