2007
DOI: 10.1002/nav.20263
|View full text |Cite
|
Sign up to set email alerts
|

Models of sensor operations for border surveillance

Abstract: This paper is motivated by the diverse array of border threats, ranging from terrorists to arms dealers and human traffickers. We consider a moving sensor that patrols a certain section of a border with the objective to detect infiltrators who attempt to penetrate that section. Infiltrators arrive according to a Poisson process along the border with a specified distribution of arrival location, and disappear a random amount of time after their arrival. The measures of effectiveness are the target (infiltrator)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 4 publications
(8 reference statements)
0
20
0
Order By: Relevance
“…The case of a thick infiltrator has been considered by Baston and Kikuta (2009). If there are many infiltrators and they arrive in a Poisson manner, the analysis is given by Szechtman et al (2008). Multiple infiltrators are also considered by Zoroa et al (2012) where the infiltration is through a circular rather than a linear boundary.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The case of a thick infiltrator has been considered by Baston and Kikuta (2009). If there are many infiltrators and they arrive in a Poisson manner, the analysis is given by Szechtman et al (2008). Multiple infiltrators are also considered by Zoroa et al (2012) where the infiltration is through a circular rather than a linear boundary.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Atkinson and Wein (2010) examine how a government should allocate its resources over the inspection of terror and criminal networks to exploit the finding of Smith, Damphousse, and Roberts (2006) that, prior to an attack, terrorists frequently participate in crimes such as theft or procuring explosives. Other articles address problems such as predicting the number of undetected terror threats (Kaplan, 2010), estimating the duration of a terrorist plot (Kaplan, 2012a), locating terrorists (Alpern & Lidbetter, 2013;Atkinson, Kress, & Lange, 2016), processing intelligence (Dimitrov, Kress, & Nevo, 2016;Lin, Kress, & Szechtman, 2009), patrolling an area (Lin, Atkinson, & Glazebrook, 2014;Papadaki, Alpern, Lidbetter, & Morton, 2016;Szechtman, Kress, Lin, & Cfir, 2008), and predicting the goal of a suspected terrorist (Tsitsiklis & Xu, 2018). In particular, Atkinson et al (2016) consider a searcher who, based on a stream of unreliable intelligence about a target's location, needs to decide whether to engage or to wait for more information.…”
Section: Related Workmentioning
confidence: 99%
“…Applications of this work are envisioned in border patrol wherein unmanned vehicles are placed to optimally intercept moving targets that cross a region under surveillance (cf. Girard et al [2004], Szechtman et al [2008]).…”
Section: Introductionmentioning
confidence: 99%