dc.date.accessioned2016-12-27T21:52:44Z
dc.date.accessioned2018-06-13T23:08:19Z
dc.date.available2016-12-27T21:52:44Z
dc.date.available2018-06-13T23:08:19Z
dc.date.created2016-12-27T21:52:44Z
dc.date.issued2010
dc.identifier978-90-481-8561-0
dc.identifier978-90-481-8563-4
dc.identifierhttp://hdl.handle.net/10533/166283
dc.identifier1080189
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/1545085
dc.description.abstractMalicious entities may use hazardous materials as a weapon by hijacking a vehicle and transporting it to a desired target. This work presents a methodology to identify possible hijacked vehicles’ routes to vulnerable targets, assuming that probabilities of interception by law enforcement agents depend on the investment in defense resources. The methodology to identify hijacked vehicles’ routes incorporates the dual objectives of minimizing probabilities of capture and maximizing consequences if law enforcement agencies attempt to intercept the vehicle before it reaches the target. Mathematical programming models are presented to find such routes as well as the allocation of defense investments on a network.
dc.languageeng
dc.publisherSPRINGER
dc.relation10.1007/978-90-481-8563-4
dc.relationinfo:eu-repo/grantAgreement/Fondecyt/1080189
dc.relationinfo:eu-repo/semantics/dataset/hdl.handle.net/10533/93479
dc.relationinstname: Conicyt
dc.relationreponame: Repositorio Digital RI2.0
dc.relationinstname: Conicyt
dc.relationreponame: Repositorio Digital RI 2.0
dc.rightsinfo:eu-repo/semantics/openAccess
dc.titleTERRORISTS AND HAZMAT: A METHODOLOGY TO IDENTIFY POTENTIAL ROUTES
dc.typeCapitulo de libro


Este ítem pertenece a la siguiente institución