[1] Riley K.,Hoffman B.Domestic terrorism[R].A National Assessment of State and Local Preparedness,Santa Monica:Rand,1995
[2] Basuchoudhary A.,Shughart W.F.On Ethnic Conflict and the Origins of Transnational Terrorism[J].Defence and Peace Economics,2010,21(1):65-87
[3] Kis-Katos K.,Liebert H.,Schulze G.G.On the Origin of Domestic and International Terrorism[J].European Journal of Political Economy,2011,27(1):S17-S36
[4] Milazzo M.F.,Ancione G.,Lisi R.,et al.Risk Management of Terrorist Attacks in the Transport of Hazardous Materials Using Dynamic Geoevents[J].Journal of Loss Prevention in the Process Industries,2009,22(5):625-633
[5] Woods J.The 9/11 Effect:Towards a Social Science of the Terrorist Threat[J].The Social Science Journal,2011,48(1):213-233
[6] Hupert N.,Mushlin A.,Callahan M.A.Modeling the Public Health Response to Bioterrorism:Using Discrete Event Simulation to Design Antibiotic Distribution Centers[J].Medical Decision Making,2002,3(22):1-9
[7] 澎湃,王恒山,李煜.突发事件信息传播超网络中枢纽节点的判定研究[J].管理评论,2013,25(6):104-111
[8] 王循庆,李勇建,孙华丽.基于随机Petri网的群体性突发事件情景演变模型[J].管理评论,2014,26(8):53-62
[9] Kyle R.,Via D.,Lowy R.,et al.A Multidisciplinary Approach to Teach Responses to Weapons of Mass Destruction and Terrorism Using Combined Simulation Modalities[J].Journal of Clinical Anesthesia,2004,16(2):152-158
[10] Clauset A.,Woodard R.Estimating the Historical and Future Probabilities of Large Terrorist Events[J].The Annals of Applied Statistics,2013,7(4):1838-1865
[11] Lindelauf R.H.A.,Hamers H.J.M,Husslage B.G.M.Cooperative Game Theoretic Centrality Analysis of Terrorist Networks:The Cases of Jemash Islamiyah and Al Qaeda[J].European Journal of Operational Research,2013,229(1):230-238
[12] Husslage B.,Borm P.,Burg T.,et al.Ranking Terrorists in Networks:A Sensitivity Analysis of Al Qaeda's 9/11 Attack[J].Social Networks,2015,42:1-7
[13] 郭济主编.政府应急管理实务[M].北京:中共中央党校出版社,2004
[14] 刘佳,陈建明,陈安.应急管理中的动态模糊分类分级算法研究[J].管理评论,2007,19(3):38-43
[15] 杨静,陈建明,赵红.应急管理中的突发事件分类分级研究[J].管理评论,2005,17(4):37-41
[16] 吴凤平,程铁军.基于改进的灰色定权聚类分析的突发事件分级研究[J].中国管理科学,2013,21(S1):110-113
[17] 薛澜,钟开斌.突发公共事件分类、分级与分期:应急体制的管理基础[J].CPA中国行政管理,2005,236(2):102-107
[18] 吴宗之,刘茂.突发事件管理中的"分类""分级"与"分期"原则——《中华人民共和国突发事件应对法(草案)》的管理基础[J].中国安全科学学报,2003,13(1):15-18
[19] 龚鹏飞.道路交通突发事件分类与分级[J].灾害学,2013,28(1):45-49
[20] Jiao Y.B.,Liu H.B.Application of Genetic Algorithm:Support Vector Machine (GA-SVM) for Damage Identification of Bridge[J].International Journal of Computational Intelligence and Applications,2011,10(4):383-397
[21] Hsu C.W.,Lin C.J.A Simple Decomposition Method for Support Vector Machines[J].Machine Learning,2002,46(1-3):291-314
[22] Geem Z.W.,Kim J.H.,Loganathan G.V.A New Heuristic Optimization Algorithm:Harmony Search[J].Simulation,2001,76(2):60-68
[23] Huang J.,Bo Y.,Wang H.Electromechanical Equipment State Forecasting Based on Genetic Algorithm-Support Vector Regression[J].Expert Systems with Applications,2011,38(7):8399-8402
[24] Pai P.F.,Huang K.C.,Lin K.P.Tourism Demand Forecasting Using Novel Hybrid System[J].Expert Systems with Applications,2014,41(41):3691-3702
[25] Witten I.H.,Frank E.Data Mining:Practical Machine Learning Tools and Techniques[M].Burlingpon:Morgan Kaufmann,2005
[26] Sokolova M.,Lapalme G.A Systematic Analysis of Performance Measures for Classification Tasks[J].Information Processing and Management,2009,45(4):427-437
[27] Shmueli G.,Patel N.R.,Bruce P.C.Data Mining for Business Intelligence[M].New Jersey:John Wiley and Sons Inc,2007 |