1. Boros, E., Fedzhora, L., Kantor, P. B., Saeger, K., & Stroud, P. (2009). A large-scale linear programming model for finding optimal container inspection strategies. Naval Research Logistics, 56(5), 404–420.
2. Brandenstein, A. E. (2007). Article number 4373477. In Proceedings of international Carnahan conference on security technology 2007 (pp. 109–116).
3. Chandra, J., & Schall, S. (1988). The use of repeated measurements to reduce the effects of measurement errors. IIE Transactions, 20(1), 83–87.
4. Chen, S.-L., & Chung, K.-J. (1996). Selection of the optimal precision level and target value for a production process: the lower-specification limit case. IIE Transactions, 28, 979–958.
5. Dahlman, O., Mackby, J., Sitt, B., Poucet, A., Meerburg, A., Massinon, B., Ifft, E., Asada, M., & Alewine, R. (2005). Container security: a proposal for a comprehensive code of conduct. Defense & technology papers published by the National Defense University Center for Technology and National Security Policy, Fort Lesley J. McNair, Washington, DC. Available: http://www.ndu.edu/ctnsp/publications.html .