[1] 李健和,王存奎,梅建明,马振超,翟金鹏.当代恐怖主义的特征与发展趋势[J].中国人民公安大学学报(社会科学版),2008,(3):1-7. [2] Zhuang J, Bier V M. Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort[J]. Operational Research, 2007, 55(5): 976-991. [3] Powell R. Defending against terrorist attacks with limited resources[J]. American Political Science Review, 2007, 101(3): 527-541. [4] Shan X J, Zhuang J. Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game[J]. European Journal of Operational Research, 2013, 228(1): 262-272. [5] Patterson S A, Apostolakis G E. Identification of critical locations across multiple infrastructures for terrorist actions[J]. Reliability Engineering and System Safety, 2006, 92(9): 1023-1183. [6] Haphuriwat N, Bier V M. Trade-offs between target hardening and overarching protection[J]. European Journal of Operational Research, 2011, 213(1): 320-328. [7] Bier V M, Oliveros S, Samuelson L. Choosing what to protect: strategic defense allocation against an unknown attacker[J]. Journal of Public Economic Theory, 2007, 9(4): 563-587. [8] Ghaffarzadegan N, Andersen D F. Modeling behavioral complexities of warning issuance for domestic security: a simulation approach to develop public management theories[J]. International Public Management Journal, 2012, 15(3): 337-363. [9] 柴瑞瑞,孙康,陈静锋,刘德海.连续恐怖袭击下反恐设施选址与资源调度优化模型及其应用[J].系统工程理论与实践,2016,36(2):464-472. [10] Ressler S. Social network analysis as an approach to combat terrorism: past, present, and future research[J]. Homeland Security Affairs, 2006, 2(2): 1-10. [11] Bohannon J. Counter-terrorism's new tool: ‘metanetwork' analysis[J]. Science, 2009, 325(405): 409-411. [12] 付举磊,孙多勇,肖进,汪寿阳.基于社会网络分析理论的恐怖组织网络研究综述[J].系统工程理论与实践,2013,33(9):2177-2186. [13] 付举磊,肖进,孙多勇,汪寿阳.基于社会网络的恐怖活动时空特征分析[J].系统工程理论与实践,2014,34(1):1-9. [14] LaFree G, Dugan L, Xie M, Singh P. Spatial and temporal patterns of terrorists attacks by ETA 1970 to 2007[J]. Journal of Quantitative Criminology, 2012, 28(1): 7-29. [15] Wang X Y, Erin M, Kathleen S, William R, Remco C. Investigative visual analysis of global terrorism[J]. Computer Graphics Forum, 2008, 27(3): 919-926. [16] Krisztina K K, Helge L, Günther G S. On the origin of domestic and international terrorism[J]. European Journal of Political Economy, 2011,27(S1): S17-S36. [17] Borooah V K. Terrorist incidents in India, 1998~2004: a quantitative analysis of fatality rates[J]. Terrorism and Political Violence, 2009, 21(3): 476-498. [18] 刘德海,王维国.维权型群体性突发事件社会网络结构与策略的协同演化机制[J].中国管理科学,2012,20(3):185-192. [19] 徐寅峰,刘德海.群体性突发事件产生根源的主观博弈分析[J].预测,2004,23(6):43-45. [20] 刘德海.信息交流在群体性突发事件处理中作用的博弈分析[J].中国管理科学,2005,13(3):95-102. [21] 刘德海,陈静锋.环境群体性事件“信息-权利”协同演化的仿真分析[J].系统工程理论与实践,2014,34(12):3157-3166. [22] 陈静锋,苏烨,柴瑞瑞,刘德海.群体性突发事件应急处置中政府机会主义行为的社会仿真分析[J].电子科技大学学报(社科版),2014,16(2):28-33. [23] Wilensky U. Netlogo: Center for connected learning and computer-based modeling[EB/OL]. http://ccl.northwes-tem.edu/netlogo/. Northwestern University, Evanston, IL, 1999. [24] Liu D H, Chen J F, Chai R R, Wang W G. Evolutionary analysis of important public health event-based multi-agent simulation model[J]. International Journal of Innovative Computing & Applications, 2014, 6(1): 33-43. |