dc.date.accessioned | 2016-12-27T21:52:44Z | |
dc.date.accessioned | 2018-06-13T23:08:19Z | |
dc.date.available | 2016-12-27T21:52:44Z | |
dc.date.available | 2018-06-13T23:08:19Z | |
dc.date.created | 2016-12-27T21:52:44Z | |
dc.date.issued | 2010 | |
dc.identifier | 978-90-481-8561-0 | |
dc.identifier | 978-90-481-8563-4 | |
dc.identifier | http://hdl.handle.net/10533/166283 | |
dc.identifier | 1080189 | |
dc.identifier.uri | http://repositorioslatinoamericanos.uchile.cl/handle/2250/1545085 | |
dc.description.abstract | Malicious entities may use hazardous materials as a weapon by hijacking a vehicle and transporting it to a desired target. This work presents a methodology to identify possible hijacked vehicles’ routes to vulnerable targets, assuming that probabilities of interception by law enforcement agents depend on the investment in defense resources. The methodology to identify hijacked vehicles’ routes incorporates the dual objectives of minimizing probabilities of capture and maximizing consequences if law enforcement agencies attempt to intercept the vehicle before it reaches the target. Mathematical programming models are presented to find such routes as well as the allocation of defense investments on a network. | |
dc.language | eng | |
dc.publisher | SPRINGER | |
dc.relation | 10.1007/978-90-481-8563-4 | |
dc.relation | info:eu-repo/grantAgreement/Fondecyt/1080189 | |
dc.relation | info:eu-repo/semantics/dataset/hdl.handle.net/10533/93479 | |
dc.relation | instname: Conicyt | |
dc.relation | reponame: Repositorio Digital RI2.0 | |
dc.relation | instname: Conicyt | |
dc.relation | reponame: Repositorio Digital RI 2.0 | |
dc.rights | info:eu-repo/semantics/openAccess | |
dc.title | TERRORISTS AND HAZMAT: A METHODOLOGY TO IDENTIFY POTENTIAL ROUTES | |
dc.type | Capitulo de libro | |