{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:27:11Z","timestamp":1725467231980},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,2,9]],"date-time":"2012-02-09T00:00:00Z","timestamp":1328745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1007\/s10479-012-1069-6","type":"journal-article","created":{"date-parts":[[2012,2,8]],"date-time":"2012-02-08T09:32:40Z","timestamp":1328693560000},"page":"167-187","source":"Crossref","is-referenced-by-count":7,"title":["Optimal design of container inspection strategies considering multiple objectives via an evolutionary approach"],"prefix":"10.1007","volume":"196","author":[{"given":"Ana Lisbeth","family":"Concho","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 E.","family":"Ramirez-Marquez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,2,9]]},"reference":[{"key":"1069_CR1","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/11760146_28","volume-title":"Proceedings of the IEEE international conference on intelligence and security informatics (ISI 2006)","author":"S. Anand","year":"2006","unstructured":"Anand, S., Madigan, D., Mammone, R., & Pathak, S. (2006). Experimental analysis of sequential decision making algorithms for port of entry inspection procedures. In Proceedings of the IEEE international conference on intelligence and security informatics (ISI 2006) (pp. 319\u2013330). Berlin: Springer."},{"key":"1069_CR2","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-3-540-69209-6_17","volume-title":"Intelligence and security informatics: techniques and applications","author":"E. Boros","year":"2008","unstructured":"Boros, E., Elsayed, E., Kantor, P., Roberts, F., & Xie, M. (2008). Optimization problems for port-of-entry detection systems. In Intelligence and security informatics: techniques and applications (pp. 319\u2013335). Berlin: Springer."},{"issue":"5","key":"1069_CR3","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1002\/nav.20349","volume":"56","author":"E. Boros","year":"2009","unstructured":"Boros, E., Fedzhora, L., Kantor, P., Saeger, K., & Stroud, P. (2009). Large scale LP model for finding optimal container inspection strategies. Naval Research Logistics, 56(5), 404\u2013420.","journal-title":"Naval Research Logistics"},{"issue":"3","key":"1069_CR4","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.ress.2009.10.006","volume":"95","author":"A. Concho","year":"2010","unstructured":"Concho, A., & Ramirez-Marquez, J. (2010). An evolutionary algorithm for port-of-entry security optimization considering sensor thresholds. Reliability Engineering & Systems Safety, 95(3), 255\u2013266.","journal-title":"Reliability Engineering & Systems Safety"},{"key":"1069_CR5","unstructured":"Elsayed, A., Schroepfer, C., Xie, M., Zhang, H., & Zhu, Y. (2007). Port-of-entry inspection: sensor deployment policy optimization. DIMACS\u2014port of entry inspection algorithms (Working paper). Rutgers University."},{"key":"1069_CR6","volume-title":"IEEE workshop on intelligent data acquisition and advanced computing systems: technology and applications","author":"V. Firsov","year":"2005","unstructured":"Firsov, V., Markowsky, G., Kutovoy, S., Pozdnyakow, D., Litvinova, O., & Lyzikova, N. (2005). Detection of unauthorized intrusion into cargo containers that are under custom seals. In IEEE workshop on intelligent data acquisition and advanced computing systems: technology and applications, 5\u20137 September 2005, Sofia, Bulgaria."},{"key":"1069_CR7","unstructured":"Goldberg, N., Word, J., Boros, E., & Kantor, P. (2008). Optimal sequential inspection policies (DIMACS Technical Report 2008-07). Rutgers University."},{"key":"1069_CR8","unstructured":"Hecker, J. (2002). Container security\u2014current effort to detect nuclear materials, new initiatives and challenges. United States General Accounting Office, New York. GAO-03-297T."},{"key":"1069_CR9","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/CCST.2007.4373477","volume-title":"Proceedings 41st annual IEEE international carnahan conference on security technology","author":"D. Koch","year":"2007","unstructured":"Koch, D. (2007). PortSim\u2014a port security simulation and visualization tool. In Proceedings 41st annual IEEE international carnahan conference on security technology (pp. 109\u2013116)."},{"key":"1069_CR10","volume-title":"The box: how the shipping container made the world smaller and the world economy bigger","author":"M. Levinson","year":"2006","unstructured":"Levinson, M. (2006). The box: how the shipping container made the world smaller and the world economy bigger. Princeton: Princeton University Press."},{"key":"1069_CR11","first-page":"1","volume-title":"Proceedings of the IEEE international conference on intelligence and security informatics (ISI 2007)","author":"D. Madigan","year":"2007","unstructured":"Madigan, D., Mittal, S., & Roberts, F. (2007). Sequential decision making algorithms for port of entry inspection: overcoming computational challenges. In Proceedings of the IEEE international conference on intelligence and security informatics (ISI 2007) (pp. 1\u20137)."},{"issue":"11","key":"1069_CR12","doi-asserted-by":"crossref","first-page":"1698","DOI":"10.1016\/j.ress.2008.01.003","volume":"93","author":"J. E. Ramirez-Marquez","year":"2008","unstructured":"Ramirez-Marquez, J. E. (2008). Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach. Reliability Engineering & Systems Safety, 93(11), 1698\u20131709.","journal-title":"Reliability Engineering & Systems Safety"},{"issue":"11","key":"1069_CR13","doi-asserted-by":"crossref","first-page":"1689","DOI":"10.1016\/j.ress.2008.01.001","volume":"93","author":"J. E. Ramirez-Marquez","year":"2008","unstructured":"Ramirez-Marquez, J. E., & Rocco, C. (2008). All-terminal network reliability optimization via probabilistic solution discovery. Reliability Engineering & Systems Safety, 93(11), 1689\u20131697.","journal-title":"Reliability Engineering & Systems Safety"},{"issue":"5","key":"1069_CR14","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1016\/j.ress.2008.10.006","volume":"94","author":"J. E. Ramirez-Marquez","year":"2009","unstructured":"Ramirez-Marquez, J. E., & Rocco, C. (2009). Stochastic network interdiction optimization via capacitated network reliability modeling & probabilistic solution discovery. Reliability Engineering & Systems Safety, 94(5), 913\u2013921.","journal-title":"Reliability Engineering & Systems Safety"},{"key":"1069_CR15","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1109\/WSC.2006.323125","volume-title":"Proceedings of the 2006 winter simulation conference","author":"J. Sekine","year":"2006","unstructured":"Sekine, J., Campos-N\u00e1\u00f1ez, E., Harrald, J., & Abeledo, H. (2006). A simulation-based approach to trade-off analysis of port security. In Proceedings of the 2006 winter simulation conference (pp. 521\u2013528)."},{"key":"1069_CR16","first-page":"328","volume-title":"Proceedings of the conference on computer, communication and control technologies","author":"P. Stroud","year":"2003","unstructured":"Stroud, P., & Saeger, K. (2003). Enumeration of increasing boolean expressions and alternative digraph implementations for diagnostic applications. In J. Chu, J. Ferrer, T. Nguyen, & Y. Yu (Eds.), Proceedings of the conference on computer, communication and control technologies (Vol. 4, pp. 328\u2013333)."},{"key":"1069_CR17","unstructured":"Van Weele, S., & Ramirez-Marquez, J. (2010). Optimization of container inspection strategy via a genetic algorithm. Special Volume on Port Security\/Safety, Risk Analysis and Modeling\u2014Annals of Operations Research."},{"issue":"5","key":"1069_CR18","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1111\/j.1539-6924.2006.00817.x","volume":"26","author":"L. Wein","year":"2006","unstructured":"Wein, L., Wilkins, A., Baveja, M., & Flynn, S. (2006). Preventing the importation of illicit nuclear materials in shipping containers. Risk Analysis, 26(5), 1377\u20131393.","journal-title":"Risk Analysis"},{"issue":"2","key":"1069_CR19","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/TASE.2009.2022172","volume":"7","author":"C. Young","year":"2010","unstructured":"Young, C., Li, M., Zhu, Y., Xie, M., Elsayed, E., & Asamov, T. (2010). Multiobjective optimization of a port-of-entry inspection policy. IEEE Transactions on Automation Science and Engineering, 7(2), 392\u2013400.","journal-title":"IEEE Transactions on Automation Science and Engineering"}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-012-1069-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10479-012-1069-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-012-1069-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T11:51:55Z","timestamp":1686743515000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10479-012-1069-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,9]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["1069"],"URL":"https:\/\/doi.org\/10.1007\/s10479-012-1069-6","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,2,9]]}}}