1. Alderson, D. L., Brown, G. G., Carlyle, W. M. & Wood, R. K. (2011). Solving defender-attacker-defender models for infrastructure defense. In ‘12th INFORMS computing society conference, Monterey, CA, USA’, INFORMS (pp. 28–4–9).
2. Anthony, B., Penrose, J. K., Jakiel, S., Couture, T., Crowe, S., Fowler, M., Keyhan, R., Sorenson, K., Bradley, M. & Badavi, M. A. (2017). ‘The typology of modern slavery: Defining sex and labor trafficking in the United States’. Retrieved from https://polarisproject.org/wp-content/uploads/2019/09/Polaris-Typology-of-Modern-Slavery-1.pdf.
3. Baycik, N. O., Sharkey, T. C., & Rainwater, C. E. (2018). Interdicting layered physical and information flow networks. IISE Transactions, 50(4), 316–331. https://doi.org/10.1080/24725854.2017.1401754
4. Belles, N. (2018). Defining Sex Trafficking. In ‘Handbook of sex trafficking’. Springer (pp. 3–8).
5. Carpenter, A. & Gates, J. (2016). ‘The nature and extent of gang involvement in sex trafficking in San Diego County’. Retrieved from https://www.ojp.gov/ncjrs/virtual-library/abstracts/nature-and-extent-gang-involvement-sex-trafficking-san-diego-county.