{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:25:43Z","timestamp":1725467143508},"reference-count":28,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2012,7,1]],"date-time":"2012-07-01T00:00:00Z","timestamp":1341100800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"name":"US Department of Homeland Security","award":["2008-DN-077-ARI001-03"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["European Journal of Operational Research"],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1016\/j.ejor.2012.01.060","type":"journal-article","created":{"date-parts":[[2012,2,16]],"date-time":"2012-02-16T11:57:31Z","timestamp":1329393451000},"page":"522-529","source":"Crossref","is-referenced-by-count":24,"title":["Multilevel, threshold-based policies for cargo container security screening systems"],"prefix":"10.1016","volume":"220","author":[{"given":"Laura A.","family":"McLay","sequence":"first","affiliation":[]},{"given":"Rebecca","family":"Dreiding","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.ejor.2012.01.060_b0005","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1287\/deca.1080.0124","article-title":"A decision tree model for evaluating countermeasures to secure cargo at United States Southwestern ports of entry","volume":"5","author":"Bakir","year":"2008","journal-title":"Decision Analysis"},{"issue":"5","key":"10.1016\/j.ejor.2012.01.060_b0010","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1002\/nav.20349","article-title":"Large scale LP model for finding optimal container inspection strategies","volume":"56","author":"Boros","year":"2009","journal-title":"Naval Research Logistics"},{"issue":"1","key":"10.1016\/j.ejor.2012.01.060_b0015","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10479-010-0799-6","article-title":"Optimal sequential inspection policies","volume":"187","author":"Boros","year":"2011","journal-title":"Annals of Operations Research"},{"issue":"3","key":"10.1016\/j.ejor.2012.01.060_b0020","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.ress.2009.10.006","article-title":"An evolutionary algorithm for port-of-entry security optimization considering sensor thresholds","volume":"95","author":"Concho","year":"2010","journal-title":"Reliability Engineering & System Safety"},{"key":"10.1016\/j.ejor.2012.01.060_b0025","doi-asserted-by":"crossref","unstructured":"Dimitrov, N., Michalopolous, D.P., Morton, D.P., Nehme, M.V., Pan, F., Popova, E., Schneider, E.A., Thoreson, G.G., 2011. Network deployment of radiation detectors with physics-based detection probability calculations. Annals of Operations Research (to appear).","DOI":"10.1007\/s10479-009-0677-2"},{"key":"10.1016\/j.ejor.2012.01.060_b0030","unstructured":"Fritelli, J.F., 2005. Port and maritime security: Background issues for congress. CRS Report for Congress, Congressional Research Service, The Library of Congress, RL31733."},{"issue":"1","key":"10.1016\/j.ejor.2012.01.060_b0035","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s10479-010-0717-y","article-title":"Detecting nuclear materials smuggling: Using radiography to improve container inspection policies","volume":"187","author":"Gaukler","year":"2011","journal-title":"Annals of Operations Research"},{"key":"10.1016\/j.ejor.2012.01.060_b0040","doi-asserted-by":"crossref","unstructured":"Gaukler, G., Li, C., Cannaday, R., Chirayath, S.S., Ding, Y., 2012. Detecting nuclear materials smuggling: Performance evaluation of container inspection policies. Risk Analysis (to appear).","DOI":"10.1111\/j.1539-6924.2011.01696.x"},{"key":"10.1016\/j.ejor.2012.01.060_b0045","unstructured":"Huizenga, D., 2005. Detecting nuclear weapons and radiological material: How effective is available technology? Statement before the Subcommittee on Prevention of Nuclear and Biological Attacks and Subcommittee on Emergency Preparedness, Science and Technology, The House Committee on Homeland Security, June 21."},{"issue":"4","key":"10.1016\/j.ejor.2012.01.060_b0050","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1111\/j.1539-6924.2010.01370.x","article-title":"Deceptive detection methods for effective security with inadequate budgets: The testing power index","volume":"30","author":"Kantor","year":"2010","journal-title":"Risk Analysis"},{"key":"10.1016\/j.ejor.2012.01.060_b0055","series-title":"Knapsack Problems","author":"Kellerer","year":"2004"},{"issue":"6","key":"10.1016\/j.ejor.2012.01.060_b0060","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1111\/j.1539-6924.1996.tb00831.x","article-title":"Addressing the dependency problem in access security system architecture design","volume":"16","author":"Kobza","year":"1996","journal-title":"Risk Analysis"},{"issue":"3","key":"10.1016\/j.ejor.2012.01.060_b0065","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1057\/palgrave.jors.2600331","article-title":"Probability models for access security system architectures","volume":"48","author":"Kobza","year":"1997","journal-title":"Journal of the Operational Research Society"},{"key":"10.1016\/j.ejor.2012.01.060_b0070","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0951-8320(03)00126-1","article-title":"Exact reliability formula and bounds for general k-out-of-n systems","volume":"82","author":"Koucky","year":"2003","journal-title":"Reliability Engineering and System Safety"},{"key":"10.1016\/j.ejor.2012.01.060_b0075","unstructured":"Lava, J., 2008. US Customs and Border Protection. DIMACS\/DyDAn\/LPS Workshop on Port Security\/Safety, Inspection, Risk Analysis, and Modeling, Piscataway, NJ, November 17-18, 2008."},{"key":"10.1016\/j.ejor.2012.01.060_b0080","unstructured":"McLay, L.A., Dreiding, R., 2009. Risk-based policies for detecting nuclear material on cargo containers with classification errors. Technical report, Virginia Commonwealth University, Richmond, VA."},{"key":"10.1016\/j.ejor.2012.01.060_b0085","unstructured":"McLay, L.A., Dreiding, R., 2011. Multilevel, threshold-based policies for cargo container security screening systems. Technical report, Virginia Commonwealth University, Richmond, VA, available at ."},{"issue":"1","key":"10.1016\/j.ejor.2012.01.060_b0090","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s10479-009-0667-4","article-title":"Interdicting nuclear material on cargo containers using knapsack problem models","volume":"187","author":"McLay","year":"2011","journal-title":"Annals of Operations Research"},{"issue":"2","key":"10.1016\/j.ejor.2012.01.060_b0095","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1287\/deca.1100.0171","article-title":"Is screening cargo containers for smuggled nuclear threats worthwhile?","volume":"7","author":"Merrick","year":"2010","journal-title":"Decision Analysis"},{"key":"10.1016\/j.ejor.2012.01.060_b0100","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/07408170500488956","article-title":"Models for nuclear smuggling interdiction","volume":"39","author":"Morton","year":"2007","journal-title":"IIE Transactions"},{"key":"10.1016\/j.ejor.2012.01.060_b0105","unstructured":"Nehme, M.V., 2009. Two-person games for stochastic network interdiction: Models, methods, and complexities. Ph. D. thesis, The University of Texas, Austin, TX."},{"key":"10.1016\/j.ejor.2012.01.060_b0110","doi-asserted-by":"crossref","first-page":"1698","DOI":"10.1016\/j.ress.2008.01.003","article-title":"Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach","volume":"93","author":"Ramirez-Marquez","year":"2008","journal-title":"Reliability Engineering and System Safety"},{"key":"10.1016\/j.ejor.2012.01.060_b0115","unstructured":"Rooney, B., 2005. Detecting nuclear weapons and radiological material: How effective is available technology? Statement before the Subcommittee on Prevention of Nuclear and Biological Attacks and Subcommittee on Emergency Preparedness, The House Committee on Homeland Security."},{"key":"10.1016\/j.ejor.2012.01.060_b0120","unstructured":"Strohm, C., 2006. Investigators call cargo security program unreliable. GovExec.com. April 6, available at , accessed on November 22, 2006."},{"key":"10.1016\/j.ejor.2012.01.060_b0125","unstructured":"United States Customs and Border Protection, 2007. Secure Freight with CSI, Megaports. Fact sheet, Washington, D.C."},{"key":"10.1016\/j.ejor.2012.01.060_b0130","unstructured":"United States Department of Transportation, 2007. America\u2019s container ports: Delivering the goods. Research and innovative technology administration, Bureau of Transportation Statistics, Washington, D.C."},{"key":"10.1016\/j.ejor.2012.01.060_b0135","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1080\/08929880701715100","article-title":"The optimal spatiotemporal deployment of radiation portal monitors can improve nuclear detection at overseas ports","volume":"15","author":"Wein","year":"2007","journal-title":"Science and Global Security"},{"issue":"5","key":"10.1016\/j.ejor.2012.01.060_b0140","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1111\/j.1539-6924.2006.00817.x","article-title":"Preventing the importation of illicit nuclear materials in shipping containers","volume":"26","author":"Wein","year":"2006","journal-title":"Risk Analysis"}],"container-title":["European Journal of Operational Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377221712000987?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377221712000987?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,11,26]],"date-time":"2018-11-26T04:24:47Z","timestamp":1543206287000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0377221712000987"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["S0377221712000987"],"URL":"https:\/\/doi.org\/10.1016\/j.ejor.2012.01.060","relation":{},"ISSN":["0377-2217"],"issn-type":[{"value":"0377-2217","type":"print"}],"subject":[],"published":{"date-parts":[[2012,7]]}}}