1. P. D. Wright, M. J. Liberatore, and R. L. Nydick, “A survey of operations research models and applications in homeland security,” Interfaces, Vol. 36, No. 6, 514–529 (2006).
2. J. W. Herrmann, “Using operations research methods for homeland security problems,” in: J. W. Herrmann (ed.), Handbook of Operations Research for Homeland Security, Intern. Ser. in Operations Research & Management Science, Vol. 183, Springer, New York (2013), pp. 1–24.
3. O. O. Haivoronskyy, Yu. M. Ermoliev, P. S. Knopov, and V. I. Norkin, “Mathematical modeling of distributed catastrophic and terrorist risks,” Cybern. Syst. Analysis, Vol. 51, No. 1, 85–95 (2015). DOI:
https://doi.org/10.1007/s10559-015-9724-y
.
4. V. I. Norkin, A. A. Gaivoronski, V. A. Zaslavsky, and P. S. Knopov, “Models of the optimal resource allocation for the critical infrastructure protection,” Cybern. Syst. Analysis, Vol. 54, No. 5, 696–706 (2018).
5. A. V. Eremeev, L. A. Zaozerskaya, and A. A. Kolokolov, “Set covering problem: Complexity, algorithms, and experimental analysis,” Discrete Analysis and Operations Research, Vol. 7, No. 2, 22–46 (2000).