{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:37:36Z","timestamp":1773772656553,"version":"3.50.1"},"reference-count":112,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100008812","name":"Australian Department of Defence, Defence Science and Technology Project","doi-asserted-by":"publisher","award":["RG191353"],"award-info":[{"award-number":["RG191353"]}],"id":[{"id":"10.13039\/501100008812","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2983141","type":"journal-article","created":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T21:11:13Z","timestamp":1585170673000},"page":"60152-60178","source":"Crossref","is-referenced-by-count":25,"title":["Portfolio Optimization for Defence Applications"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1443-3005","authenticated-orcid":false,"given":"Kyle Robert","family":"Harrison","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0836-6122","authenticated-orcid":false,"given":"Saber","family":"Elsayed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6676-6584","authenticated-orcid":false,"given":"Ivan","family":"Garanovich","sequence":"additional","affiliation":[]},{"given":"Terence","family":"Weir","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Galister","sequence":"additional","affiliation":[]},{"given":"Sharon","family":"Boswell","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Taylor","sequence":"additional","affiliation":[]},{"given":"Ruhul","family":"Sarker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1111\/1475-3995.00401"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2003.810827"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1177\/1548512913509031"},{"key":"ref32","year":"2016","journal-title":"2016 Integrated Investment Program"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/03071847.2011.626270"},{"key":"ref30","article-title":"Fundamental Capability Portfolio Management","author":"hiromoto","year":"2013"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2003.158010"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1287\/inte.33.4.1.16369"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5711\/morj.7.2.61"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.5711\/morj.5.4.43"},{"key":"ref28","author":"vazirani","year":"2013","journal-title":"Approximation Algorithms"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2014.11.005"},{"key":"ref29","article-title":"Analytic architecture for capabilities-based planning, mission-system analysis, and transformation","author":"davis","year":"2002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-018-0364-9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9965.2009.00383.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1287\/opre.7.6.740"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10288-010-0125-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.04.003"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1080\/14751798.2013.864866"},{"key":"ref26","author":"markowitz","year":"1959","journal-title":"Portfolio Selection Efficient Diversification of Investments"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2016.12.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2017.07.013"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/PICMET.2008.4599767"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1389095.1389378"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1110.1002"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSE.2012.048452"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.08.017"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2089511"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2009.11.013"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.5711\/morj.14.4.41"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2008.2010006"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1389095.1389293"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2601664"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/ijfe.1664"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/MD-02-2018-0129"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011918117779"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5711\/morj.6.3.19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2011.04.012"},{"key":"ref49","first-page":"485","article-title":"A scenario-based evolutionary scheduling approach for assessing future supply chain fleet capabilities","volume":"49","author":"baker","year":"2007","journal-title":"Studies in Computational Intelligence"},{"key":"ref7","author":"silberglitt","year":"2002","journal-title":"A Decision Framework for Prioritizing Industrial Materials Research and Development"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.03.023"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1117\/12.657389"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1108\/03684920510595517"},{"key":"ref48","first-page":"51","article-title":"Applications of fuzzy goal programming in project selection of military production plants","volume":"37","author":"fu","year":"2006","journal-title":"Proc 36th Int Conf Comput Ind Eng ICC and IE"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2602051"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.5711\/morj.10.2.19"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.5711\/morj.9.1.5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20120"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.seps.2004.04.002"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0596-3"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s00291-016-0434-2"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1002\/sys.21302"},{"key":"ref70","article-title":"A portfolio optimization model for investment planning in the department of National Defence and Canadian Armed Forces","author":"rempel","year":"2015","journal-title":"Proc 46th Annu Meeting Decis Sci Inst"},{"key":"ref76","first-page":"1","article-title":"A model and solving algorithm of combination planning for weapon equipment based on Epoch-era analysis method","author":"wang","year":"1890","journal-title":"Proc AIP Conf"},{"key":"ref77","article-title":"High-end weapon equipment portfolio selection based on a heterogeneous network model","author":"li","year":"2018","journal-title":"J Global Optim"},{"key":"ref74","first-page":"166","article-title":"Scenario-based approach for project portfolio selection in army engineering and manufacturing development","volume":"27","author":"zhang","year":"2016","journal-title":"Journal of Systems Engineering and Electronics"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2017.7934733"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2018.8632316"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"85","DOI":"10.21629\/JSEE.2019.01.09","article-title":"Scenario-based modeling and solving research on robust weapon project planning problems","volume":"30","author":"xia","year":"2019","journal-title":"J Syst Eng Electron"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.05.042"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2012.2227972"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SYSoSE.2012.6384128"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1287\/inte.2013.0690"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1177\/1548512912466195"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2013.36"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.1046.367"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.03.085"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.926-930.3806"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2012.2196800"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1177\/0954405414534640"},{"key":"ref1","first-page":"77","article-title":"Portfolio selection","volume":"7","author":"markowitz","year":"1952","journal-title":"J Finance"},{"key":"ref109","first-page":"424","article-title":"Time discounting in military cost-benefit analysis","author":"hansen","year":"2015","journal-title":"Military Cost-Benefit Analysis Theory and Practice"},{"key":"ref95","first-page":"289","article-title":"A risk-based approach to cost-benefit analysis","author":"mun","year":"2015","journal-title":"Military Cost-Benefit Analysis"},{"key":"ref108","author":"deb","year":"2001","journal-title":"Multi-Objective Optimization Using Evolutionary Algorithms"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2016.03.014"},{"key":"ref107","author":"lee","year":"1972","journal-title":"Goal Programming for Decision Analysis"},{"key":"ref93","first-page":"70","article-title":"Measuring defense output: An economics perspective","author":"hartley","year":"2015","journal-title":"Military Cost-Benefit Analysis Theory and Practice"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1.2.138"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9943-6_14"},{"key":"ref105","first-page":"1","article-title":"A decision analytic approach for measuring the value of counter-IED solutions at the Joint Improvised Explosive Device Defeat Organization","author":"woodaman","year":"2010","journal-title":"Proc GMU-AFCEA Symp Crit"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/s00158-009-0460-7"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2007.892759"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1080\/14702436.2018.1497441"},{"key":"ref102","first-page":"263","article-title":"The role of cost-effectiveness analysis in allocating defense resources","author":"wall","year":"2015","journal-title":"Military Cost-Benefit Analysis Theory and Practice"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2004.04.001"},{"key":"ref112","first-page":"3","article-title":"Linear integer programming methods and approaches&#x2013;a survey","volume":"11","author":"genova","year":"2011","journal-title":"Cybern Inf Technol"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1257\/aer.91.1.260"},{"key":"ref98","first-page":"284","year":"2012","journal-title":"Defence Capability Plan Public Version 2012"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1177\/1548512917707077"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2007.368141"},{"key":"ref97","first-page":"31","article-title":"Warfare Simulation and Technology Forecasting in Support of Military Decision Making","author":"malmi","year":"2011","journal-title":"The 1st Int Conf Adv Commun Comput"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/9781118593486.ch4"},{"key":"ref11","article-title":"Portfolio selection challenges in defense applications","author":"tate","year":"2017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2010.494883"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1287\/inte.1040.0107"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/14702436.2018.1497443"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.02.003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2283916"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.07.009"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1287\/inte.24.6.19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3934\/jimo.2016068"},{"key":"ref84","author":"jolliffe","year":"2011","journal-title":"Principal Component Analysis"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870654"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1080\/14786440109462720","article-title":"LIII. On lines and planes of closest fit to systems of points in space","volume":"2","author":"pearson","year":"1901","journal-title":"London Edinburgh and Dublin Philosophical Mag and J Sci"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2828779"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2004.04.002"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/0169-2070(90)90103-I"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2794381"},{"key":"ref87","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-48318-9","volume":"186","author":"hwang","year":"1981","journal-title":"Multiple Attribute Decision Making"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.12.033"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09046777.pdf?arnumber=9046777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T18:45:51Z","timestamp":1643309151000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9046777\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":112,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2983141","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}