2009
DOI: 10.1007/s10479-009-0677-2
|View full text |Cite
|
Sign up to set email alerts
|

Network deployment of radiation detectors with physics-based detection probability calculations

Abstract: We describe a model for deploying radiation detectors on a transportation network consisting of two adversaries: a nuclear-material smuggler and an interdictor. The interdictor first installs the detectors. These installations are transparent to the smuggler, and are made under an uncertain threat scenario, which specifies the smuggler's origin and destination, the nature of the material being smuggled, the manner in which it is shielded, and the mechanism by which the smuggler selects a route. The interdictor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 30 publications
(17 citation statements)
references
References 17 publications
0
17
0
Order By: Relevance
“…The development of this model began as part of the DOE's Second Line of Defense Program [45,55] and later was coupled with physics-based estimates of detection probabilities and adapted for U.S. ports of entry [22]. The model we review here is the simplest of a family of models that has been developed.…”
Section: Locating Radiation Detectorsmentioning
confidence: 99%
See 2 more Smart Citations
“…The development of this model began as part of the DOE's Second Line of Defense Program [45,55] and later was coupled with physics-based estimates of detection probabilities and adapted for U.S. ports of entry [22]. The model we review here is the simplest of a family of models that has been developed.…”
Section: Locating Radiation Detectorsmentioning
confidence: 99%
“…While there are an enormous number of factors that affect the detection probability of an RPM, under mild assumptions, we can aggregate many of these and achieve an equivalent model [22]. This significantly reduces model complexity.…”
Section: Formulation and Tractabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Traditional game theorists have treated somewhat similar games. Normal form network interdiction games have been studied by Dimitrov et al [10], Bayrak and Bailey [4], and Washburn and Wood [39], although these article make somewhat different assumptions and have different payoff criteria. Extensive form games, in which the route or the IED placement or both are decided adaptively, have been studied by Guttfraind, Hagberg and Pan [14], Israeli and Wood [20], and arise generally in Ref.…”
Section: Introductionmentioning
confidence: 99%
“…A weapon can be transported in a cargo container, in a small vessel, on a general aviation aircraft, on a train, or on a large cargo ship, for example. Much research has focused on screening for nuclear material in cargo containers at domestic and foreign ports and at land border crossings (Wein et al 2007;Dimitrov et al 2011;McLay et al 2011).…”
Section: Introductionmentioning
confidence: 99%