{"id":"https://openalex.org/W4352981307","doi":"https://doi.org/10.1109/icsrs56243.2022.10067652","title":"Risk-Based Optimization of Security Strategies for Terrorist Attacks on Urban Targets","display_name":"Risk-Based Optimization of Security Strategies for Terrorist Attacks on Urban Targets","publication_year":2022,"publication_date":"2022-11-23","ids":{"openalex":"https://openalex.org/W4352981307","doi":"https://doi.org/10.1109/icsrs56243.2022.10067652"},"language":"en","primary_location":{"id":"doi:10.1109/icsrs56243.2022.10067652","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icsrs56243.2022.10067652","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 6th International Conference on System Reliability and Safety (ICSRS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100459326","display_name":"Dongyang Li","orcid":"https://orcid.org/0000-0003-0818-2526"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongyang Li","raw_affiliation_strings":["National University of Defense Technology,College of Military and Political Basic Education,Changsha,China","College of Military and Political Basic Education, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Military and Political Basic Education,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Military and Political Basic Education, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110575449","display_name":"Jun Xia","orcid":"https://orcid.org/0000-0002-9942-430X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Xia","raw_affiliation_strings":["National University of Defense Technology,College of Military and Political Basic Education,Changsha,China","College of Military and Political Basic Education, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Military and Political Basic Education,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Military and Political Basic Education, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019736625","display_name":"Jianchuan Li","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianchuan Li","raw_affiliation_strings":["National University of Defense Technology,College of Military and Political Basic Education,Changsha,China","College of Military and Political Basic Education, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Military and Political Basic Education,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"College of Military and Political Basic Education, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043641294","display_name":"Jinming Du","orcid":"https://orcid.org/0000-0003-3428-4729"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinming Du","raw_affiliation_strings":["National University of Defense Technology,National Key Laboratory of Science and Technology on Automatic Target Recognition,Changsha,China","National Key Laboratory of Science and Technology on Automatic Target Recognition, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,National Key Laboratory of Science and Technology on Automatic Target Recognition,Changsha,China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Automatic Target Recognition, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100459326"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.32652139,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"441","last_page":"446"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.8477435111999512},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.643017590045929},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.6010670065879822},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5641899108886719},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47613170742988586},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.4655704200267792},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1318865418434143},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.07392832636833191}],"concepts":[{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.8477435111999512},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.643017590045929},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.6010670065879822},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5641899108886719},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47613170742988586},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.4655704200267792},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1318865418434143},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.07392832636833191},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsrs56243.2022.10067652","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icsrs56243.2022.10067652","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 6th International Conference on System Reliability and Safety (ICSRS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","score":0.7699999809265137,"display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1978056377","https://openalex.org/W2062487524","https://openalex.org/W2075689173","https://openalex.org/W2169982652","https://openalex.org/W2320454000","https://openalex.org/W2512919568","https://openalex.org/W2589574323","https://openalex.org/W2758942335","https://openalex.org/W2790037481","https://openalex.org/W2793310508","https://openalex.org/W3196051632","https://openalex.org/W4290631843","https://openalex.org/W4388619780","https://openalex.org/W6858889683"],"related_works":["https://openalex.org/W2162350346","https://openalex.org/W2417158417","https://openalex.org/W3138050359","https://openalex.org/W2085558045","https://openalex.org/W4210784828","https://openalex.org/W2013166250","https://openalex.org/W2946634840","https://openalex.org/W2967550622","https://openalex.org/W51752556","https://openalex.org/W3193040745"],"abstract_inverted_index":{"In":[0,17],"the":[1,57,73,80,83,96,107,125,139],"field":[2],"of":[3,31,82,98,109,141],"terrorism":[4],"risk,":[5],"terrorist":[6,32,99],"attacks":[7,100],"against":[8],"urban":[9,22,102,145],"targets":[10,23,103],"have":[11],"been":[12],"a":[13,20,43,86],"hot":[14],"research":[15],"topic.":[16],"this":[18],"paper,":[19],"quantitative":[21,74],"risk":[24,34,47,53,97],"assessment":[25,35],"and":[26,36,104,113,122,130,134],"mitigation":[27],"framework":[28,75],"which":[29],"consists":[30],"attack":[33],"security":[37,68,111,143],"strategy":[38],"optimization":[39,61,123],"is":[40,50,63,76,89],"proposed.":[41],"First,":[42],"conditional":[44],"probability":[45],"based":[46,60],"description":[48],"function":[49,62,118],"constructed":[51,64],"for":[52,137],"loss":[54,58],"assessment.":[55],"Second,":[56],"minimum":[59],"to":[65,94,105],"optimize":[66,114],"anti-terrorist":[67],"strategies.":[69,115],"On":[70],"these":[71],"bases,":[72],"established.":[77],"To":[78],"verify":[79],"effectiveness":[81,108],"proposed":[84,126],"method,":[85],"railway":[87],"station":[88],"used":[90],"as":[91],"an":[92],"example":[93],"analyze":[95],"on":[101,144],"evaluate":[106],"different":[110],"measures":[112],"Through":[116],"model":[117,127],"analysis,":[119],"data":[120],"comparison":[121],"feedback,":[124],"shows":[128],"advantages":[129],"potential,":[131],"providing":[132],"decision":[133],"technical":[135],"support":[136],"solving":[138],"problem":[140],"terrorism-related":[142],"targets.":[146]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
