Citation: |
[1] |
Construction Industry Institute (CII), Implementing Project Security Practices, Implementation resource BMM-3, Benchmarking and Metrics, CII, University of Texas at Austin, USA, 2005. |
[2] |
Federal Aviation Administration (FAA), Recommended Security Guidelines for Airport Planning, Design and Construction, Report No DOT/FAA/AR-00/52, U.S. Dept. of Transportation, Washington, D.C, 2001. |
[3] |
Foreign Affairs Manual (FAM), Construction security certification program, manual 12 FAM 360, Foreign Affairs Manual, Chapter 12- Diplomatic Security, U.S. Department of State, 2002. |
[4] |
Presidential Executive Order (PEO), National industrial security program, Federal Register, 58 (1993), 1-6. |
[5] |
Y. Q. Bai and C. H. Guo, Doubly nonnegative relaxation method for solving multiple objective quadratic programming problems, Journal of Industrial and Management Optimization, 10 (2014), 543-556.doi: 10.3934/jimo.2014.10.543. |
[6] |
R. A. Blais, M. D. Henry, S. R. Lilley, J. A. Pan, M. Grimes and Y. Y. Haimes, Risk-based methodology for assessing and managing the severity of a terrorist attack, In Systems and Information Engineering Design Symposium, SIEDS'09., 2009 (2009), 171-176. |
[7] |
K. Branch and K. Baker, Security during the construction of critical infrastructure in the post 9/11 context in the U.S, 8th Annual Conference on Human Factors and Power Plants, Institute of Electrical and Electronics Engineers (IEEE), Monterey, CA, USA, 2007. |
[8] |
J. Cai, Hydropower in China, Department of Technology and Built Environment, University of Gavle, 2009, Master's Thesis in Energy System. |
[9] |
O. Chadli, H. Mahdioui and J. C. Yao, Bilevel mixed equilibrium problems in Banach spaces: Existence and algorithmic aspects, Journal of Industrial and Management Optimization, 1 (2011), 549-561. |
[10] |
A. Charnes and W. W. Cooper, Chance-constrained programming, Management Science, 6 (1959), 73-79.doi: 10.1287/mnsc.6.1.73. |
[11] |
R. L. Church, M. P. Scaparra and R. S. Middleton, Identifying critical infrastructure: The median and covering facility interdiction problems, Annals of the Association of American Geographers, 94 (2004), 491-502. |
[12] |
M. R. Hallowell and J. A. Gambatese, Construction safety risk mitigation, Journal of Construction Engineering and Management, 135 (2009), 1316-1323. |
[13] |
A. Khalafallah and K. El-Rayes, Minimizing construction-related security risks during airport expansion projects, Journal of Construction Engineering and Management, 134 (2008), 40-48. |
[14] |
T. Li, C. Wang, W. Wang and W. Su, A global optimization bionics algorithm for solving integer programming-Plant Growth Simulation Algorithm, in Proceedings of International Conference of Management Science and Engineering, (2005), 13-15. |
[15] |
T. F. Liang and H. W. Cheng, Multi-objective aggregate production planning decisions using two-phase fuzzy goal programming method, Journal of Industrial and Management Optimization, 7 (2011), 365-383.doi: 10.3934/jimo.2011.7.365. |
[16] |
F. Liberatore, M. P. Scaparra and M. S. Daskin, Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification, Computers & Operations Research, 38 (2011), 357-366.doi: 10.1016/j.cor.2010.06.002. |
[17] |
B. D. Liu, Theory and Practice of Uncertain Programming, Springer Verlag, 2009. |
[18] |
G. S. Liu and J. Zhang, Decision making of transportation plan, a bilevel transportation problem approach, Journal of Industrial and Management Optimization, 1 (2005), 305-314.doi: 10.3934/jimo.2005.1.305. |
[19] |
B. Matthews, J. R. Sylvie, S. Lee, S. R. Thomas, R. E. Chapman and G. E. Gibson, Addressing security in early stages of project life cycle, Journal of Management in Engineering, 22 (2006), 196-202. |
[20] |
B. Merz, H. Kreibich and A. Thieken, et al., Estimation uncertainty of direct monetary flood damage to buildings, Natural Hazards and Earth System Science, 4 (2004), 153-163. |
[21] |
J. R. O'Hanley and R. L. Church, Designing robust coverage networks to hedge against worst-case facility losses, European Journal of Operational Research, 209 (2011), 23-36.doi: 10.1016/j.ejor.2010.08.030. |
[22] |
J. Peng and B. D. Liu, Birandom variables and birandom programming, Computers & Industrial Engineering, 53 (2007), 433-453. |
[23] |
R. S. Rao, S. V. L. Narasimham and M. Ramalingaraju, Optimal capacitor placement in a radial distribution system using Plant Growth Simulation Algorithm, Electrical Power and Energy Systems, 33 (2011), 1133-1139. |
[24] |
J. A. Rice, Mathematical Statistics and Data Analysis, 2007, Duxbury press. |
[25] |
H. Said and K. El-Rayes, Optimizing the planning of construction site security for critical infrastructure projects, Automation in Construction, 19 (2010), 221-234. |
[26] |
A. K. Sarma and K. M. Rafi, Optimal selection of capacitors for radial distribution systems using Plant Growth Simulation Algorithm, International Journal of Advances in Science and Technology, 30 (2011), 43-54. |
[27] |
M. P. Scaparra and R. L. Church, A bilevel mixed-integer program for critical infrastructure protection planning, Computers & Operations Research, 35 (2008), 1905-1923. |
[28] |
M. Simaan and J. B. Cruz, On the Stackelberg strategy in nonzero-sum games, Journal of Optimization Theory and Applications, 11 (1973), 533-555.doi: 10.1007/BF00935665. |
[29] |
S. Simpson, Airport Security During Construction, presentation in: 4th Annual International Airfield Operations Area Expo & Conference, Airport Consultants Council (AAC), Milwaukee, WI, USA, 2008. |
[30] |
C. J. Tarr, CLASP: A computerised aid to cost effective perimeter security, in Security Technology 28th International Carnahan conference, Institute of Electrical and Electronics Engineers (IEEE), Atlanta, GA, USA, (1992), 164-168. |
[31] |
T. M. Toole, Construction site safety roles, Journal of Construction Engineering and Management, 128 (2002), 203-210. |
[32] |
T. Uno and H. Katagiri, Single-and multi-objective defensive location problems on a network, European Journal of Operational Research, 188 (2008), 76-84.doi: 10.1016/j.ejor.2007.04.003. |
[33] |
L. N. Vicente and P. H. Calamai, Bilevel and multilevel programming: A bibliography review, Journal of Global Optimization, 5 (1994), 291-306.doi: 10.1007/BF01096458. |
[34] |
G. H. Walker, Securing the construction site, presentation in: 28th IRMI Construction Risk Conference, IRMI, Las Vegas, VA, USA, 2008. |
[35] |
C. Wang and H. Cheng, Transmission network optimal planning based on Plant Growth Simulation Algorithm, European Transactions on Electrical Power, 19 (2009), 291-301. |
[36] |
J. P. Xu and C. Ding, A class of chance constrained multiobjective linear programming with birandom coeffcients and its application to vendors selection, International Journal of Production Economics, 131 (2011), 709-720. |
[37] |
J. P. Xu and Z. M. Tao, A class of multi-objective equilibrium chance maximization model with twofold random phenomenon and its application to hydropower station operation, Mathematics and Computers in Simulation, 85 (2012), 11-33.doi: 10.1016/j.matcom.2012.09.010. |
[38] |
J. P. Xu, Y. Tu and Z. Q. Zeng, A nonlinear multi-objective bilevel traffic assignment model with complex random coefficients in large-scale construction project, Mathematical Problems in Engineering, 2012 (2012), Article ID 463976, 40 pages.doi: 10.1155/2012/463976. |
[39] |
J. P. Xu and P. Wei, Production-distribution planning of construction supply chain management under fuzzy random environment for large-scale construction project, Journal of Industrial and Management Optimization, 9 (2013), 31-56.doi: 10.3934/jimo.2013.9.31. |
[40] |
J. P. Xu and L. M. Yao, Random-Like Multiple Objective Decision Making, 2011, Springer. |
[41] |
L. Zhang and S. Y. Wu, Robust solutions to Euclidean facility location problems with uncertain data, Journal of Industrial and Management Optimization, 6 (2010), 751-760.doi: 10.3934/jimo.2010.6.751. |