You are on page 1of 12

Safety Science 110 (2018) 230–241

Contents lists available at ScienceDirect

Safety Science
journal homepage: www.elsevier.com/locate/safety

A security vulnerability analysis model for dangerous goods transportation T


by rail – Case study: Chlorine transportation in Texas-Illinois

Masoud Khanmohamadia, Morteza Bagheria, , Navid Khademib, Seyed Farid Ghannadpourc
a
School of Railway Engineering, Iran University of Science and Technology, Iran
b
School of Civil Engineering, College of Engineering, University of Tehran, Iran
c
Department of industrial Engineering, Iran University of Science and Technology, Iran

A R T I C LE I N FO A B S T R A C T

Keywords: Transportation of dangerous goods has always been in the spotlight of terrorist groups with the aim of inflicting
Dangerous goods transportation severe harm to humans and the environment. The purpose of this paper is to present a security vulnerability
Terrorist attacks analysis approach to find critical areas along railway transportation routes specifically with regard to trains
Game theory carrying dangerous goods. In this study, ALOHA and ArcGIS software are used for checking the security vul-
Security vulnerability/robustness analysis
nerabilities and to estimate the population and affected infrastructure due to a malicious attack. Chlorine
Rail network resilience
transportation on the Texas-Illinois rail corridor (in the US) is studied by developing a routing model. The
priorities of the infrastructure for the terrorist’s attack are a variety of land use types as sports, educational,
commercial, and health centers; religious places; government buildings; airports; parks; and museums. In ad-
dition to the infrastructure, the size and the density of the population within the threat zone are main items for
the terrorist to plan the attack. With demographic layers in the GIS software, the number of people residing in
the study area that are exposed to the attack is identified. A zero-sum game theoretic approach is employed to
model the interactions of terrorist and operator's strategies. After running the model, (i) the operator’s route
selection probabilities are calculated, and (ii) the terrorist’s target link selection probabilities are also de-
termined. This paper shows that how critical links can be identified for different terrorist purposes, which could
be the subject of further security measures.

1. Introduction attacks several times; the attack on a railway station in Turkey killed
128 people in 2015, was one of the latest terrorist incidents on the rail
The number of disasters, man-made or natural, has grown to an transportation system.
unprecedented level during the past decade (Guha-Sapir et al., 2012). Annually, large volumes of dangerous goods, including fuels and
Studies have shown that the incident causes are divided into three ca- chemicals are carried by rail. For example, in the US, 140 million tons
tegories: (i) natural events (geographic/climatic), (ii) operational and of dangerous goods are shipped by rail annually (US-Department-of-
technical errors caused by hardware/software and human faults, and Transportation, 2007; Verma and Verter, 2007). ‘Size’ and ‘volume’ are
(iii) subversive activities such as terrorist attacks (Faturechi and Miller- main criteria for the difference between rail and road systems in the
Hooks, 2015). transportation of dangerous goods. On average, each tank wagon car-
Terrorist activities have substantially grown in recent years. As ries three times more volume than a road fuel tanker, and a train also
shown in Fig. 1, the number of terrorist attacks on transportation sys- consists of several wagons. That is the reason that an attack on a rail
tems in recent years has increased dramatically. Along with the growth line carrying dangerous goods may cause the far greater extent of da-
of incidents related to terrorist attacks and the development of various mage to the society rather than the road transportation (Verma and
forms of attacks especially toward smarter operations, transportation Verter, 2007). However, after the September 11 attacks, intelligence
systems have been proposed as an attractive target for the terrorist agencies were aware that terrorists can target dangerous goods or use
groups. them as a potential weapon to severely damage people, environment,
Rail transportation systems as well, because of the movement of and other infrastructure (Milazzo et al., 2009).
bulk cargo and a large number of passengers, have experienced terrorist Rail transportation network vulnerability analysis has developed


Corresponding author.
E-mail addresses: m_khanmohamadi@rail.iust.ac.ir (M. Khanmohamadi), morteza.bagheri@iust.ac.ir (M. Bagheri), navid.khademi@ut.ac.ir (N. Khademi),
ghannadpour@iust.ac.ir (S.F. Ghannadpour).

https://doi.org/10.1016/j.ssci.2018.04.026
Received 31 July 2017; Received in revised form 27 February 2018; Accepted 27 April 2018
Available online 19 May 2018
0925-7535/ © 2018 Elsevier Ltd. All rights reserved.
M. Khanmohamadi et al. Safety Science 110 (2018) 230–241

transportation security. In his study, he investigated the relationship


between vulnerability and resiliency and proposed operational mea-
sures for security resiliency. Gedik et al. (2014) considered the certainty
of information and decision making and provided a mixed integer
programming model and shortest path algorithm for the vulnerability
analysis of freight trains through analyzing the cost of delay. Their
study considered only the trains carrying coal in North America.
In the context of security vulnerability analyses, there are studies in
the literature on the subject of protecting critical assets of chemical
facilities. For example, van Staalduinen et al. (2017) proposed a
quantitative security risk assessment methodology to identify the place
and time of the protection of critical assets of a chemical facility. They
presented a Bayesian model-based approach in the evaluation of
threats. Khakzad et al. (2017) developed a multi-criteria decision ana-
lysis, the analytic network process (ANP), to the security-based rank
Fig. 1. Number of terrorist attacks on transportation systems in the world from
ordering of hazardous facilities such as chemical plants. Argenti et al.
1970 to 2015 (Global-Terrorisem-Database, 2016).
(2018) evaluated the vulnerability of a chemical facility against in-
tentional attacks using a Bayesian network approach that analyzed the
increasingly in the last decade with the goal to identify the most critical interaction between attack impact vectors and the resistance of the
locations in the rail system against disruption causes (Bababeik et al., targeted units. Regarding other studies conducted to locate security
2017a, 2017b). In a rail system, the vulnerability of the network may be resources and increasing the security of chemical facilities, interested
more pronounced than reliability because of potentially severe con- readers may refer to (Zhang and Reniers, 2016; Zhang et al., 2017; Zhu
sequences if specific links are disrupted (Khademi et al., 2015a, 2015b). et al., 2017).
Similarly, the security vulnerability in rail systems can be of significant In addition to above, identifying critical infrastructures is also a
importance and value. serious matter of concern in the investigations of security vulner-
Assessing the threats, the researchers came to the idea that network abilities. Ham and Lockwood (2002) provided a methodology for
security-vulnerability analyses and measuring the consequences of identifying critical infrastructures taking into account the risk factors,
malicious attacks are serious matters of concern. A vulnerability ana- disruption effects, and military performances. They focused on the
lysis system can lead to mitigate threats as well as to reduce the con- identification of sections of the traffic network that are vulnerable to
sequences of attacks and can be an appropriate approach to alleviate terrorist attacks. Latora and Marchiori (2005) provided a method for
security risks. As a result, the vulnerability analysis of dangerous cargos evaluating the importance of network components based on traffic
is essential because of the potential danger of this material for humans. performance indicators. They concluded that those network nodes with
So far, no specific and unique definition is provided for the vul- less connection to the network are the most desirable targets for ter-
nerability analysis of the transportation system. Many qualitative ap- rorist attacks and need more protection. Pinker (2009) developed a
proaches for calculating the risk follows this original equation (e.g. see terror threat information model capturing the uncertainty in timing and
Moore et al., 2007): location of terror attacks. They tried to create a mathematical frame-
Risk = Threat × Vulnerability × Consequences work for analyzing counterterrorism decision making with some de-
fensive mechanisms and warnings. Ukkusuri and Yushimito (2009)
According to Moore et al. (2007), the US Department of Homeland presented an innovative approach using the concepts from complex
Security has launched a framework for analyzing and managing the network science to assess the importance of road transportation net-
risks associated with terrorist attacks against critical infrastructure as- works. They employed traffic assignment techniques to assess the cri-
sets, which is Risk Analysis and Management for Critical Asset Protec- ticality of the network links by developing also an integer programming
tion (RAMCAP). In RAMCAP, the ‘threat’ is defined as the predominant model. They implemented this procedure to measure the criticality of
motive of the terrorist behind the attack and his ability to do so, ‘vul- large infrastructure in Manhattan, in the US and demonstrated the ef-
nerability’ is any structural and operational weakness in the transpor- fectiveness of this procedure for identifying critical links on the trans-
tation infrastructure, and ‘consequences’ include financial and en- portation network. Sapori et al. (2014) presented a risk-based metho-
vironmental damage from the attack. dology using process engineering for a quantitative assessment of
Berdica (2002) has defined the robustness of the transportation as security management systems. Wang et al. (2017) identified central
“the readiness for an event that can cause a significant reduction in the China's power grid as a vulnerable power system and identified critical
provision of services in road transportation.” This definition can also be areas. By implementing three different models for vulnerability ana-
used for other modes of transportation. Haimes et al. (2003) created a lysis, they found that only a few vertex disruptions could lead to some
different “risk assessment methodology for critical transportation in- critical collapse.
frastructure.” In their methodology, risk scenarios based on the criti- In the transportation science, the topic of vulnerability analysis
cality of the assets were considered, and the analysis framework took emerges where there is a serious and significant factor for the occur-
into account both the probabilities and consequences. rence of a network disruption. Transportation of dangerous goods is by
We are facing two approaches to analyze the vulnerability of far the most appropriate example. The release of dangerous goods due
transportation systems. In the first approach, only the cost and con- to a malicious attack and its impact on people is an important matter in
sequences of incidents are calculated as monetary values or as quanti- investigating the security aspects of the vulnerability of transportation
fiable performance indicators while in the second approach, vulner- of dangerous goods. Huang et al. (2004) evaluated the risk of dangerous
ability is measured based on both probabilities and consequences. The goods transportation by integrating Geographic Information Systems
second approach is followed in this paper. and Genetic Algorithms that was demonstrated on a typical portion of
In line with the studies on the vulnerability of rail freight networks, the road network in Singapore. They identified a set of evaluation cri-
Kozan and Burdett (2005) proposed an approach for sustainable train teria related to safety, costs, and security.
timing to identify critical operations and the impacts on other compo- Simulation software and geographic information systems (GIS) are
nents. Reggiani (2013) proposed a conceptual framework with the aim usually employed to evaluate the consequences of terrorist attacks as
of integrating the concept of ‘network resiliency’ in the area of well as the vulnerability of transportation systems. For example, Lisi

231
M. Khanmohamadi et al. Safety Science 110 (2018) 230–241

et al. (2007) analyzed several scenarios of the terrorist incidents at a Talarico et al. (2015), proposed a game theory based model to al-
crowded place and concluded that the consequences of attacks de- locate security resources within a chemical supply chain. They identi-
pended on the attack type and the characteristics of the infrastructure. fied the critical transportation elements and detected the best terrorist
In this study, the threat zone due to the release of chlorine was iden- and operator decisions. Feng et al. (2016) presented a game theory
tified using GIS. Milazzo et al. (2009) stressed the management of approach for allocating defense resources to protect multiple chemical
emergency responses to the terrorist attack on the transportation of facilities against terrorist attacks. Their approach was implemented on
dangerous goods in urban environments. They employed ALOHA and a real case study consisting eight chemical explosives plants in China.
EFFECTS software to calculate the threat zone of incidents. Given the Rezazadeh et al. (2017) also utilized an approach based on game theory
fact that it is not possible to predict the location and time of the attack, to schedule security patrolling for a pipeline system. Their method tried
they came to the point that identifying only the potential locations of to identify patrolling paths in order to allow the patrolling team to
terrorist activities is of great value. Garbolino and Lachtar (2012), cover high-risk parts of the network more than low-risk parts.
proposed a Spatial Decision Support System (SDSS) to analyze the In this regard, when the game theory is applied to capture the in-
propagation of toxic substances and explosive dangerous goods. They teraction between network users and network failure causes (even un-
utilized CAMEO and GIS software to simulate the aftermath of in- tintentional natural causes), one can expect that one of the best prac-
cidents. It was also found that the use of event simulation software may tices of the game theory is to use it in the context of dangerous goods
come in useful to reduce the security vulnerability. Reniers and Dullaert tranportation. Dadkar et al. (2010) developed a game-theoretic model
(2013), by offering a security vulnerability analysis, proposed an ap- of the interactions among government agencies, shippers/carriers, and
proach to determine the security risk levels of different methods of terrorists as a framework for the analysis of dangerous goods shipment
dangerous goods transportation. In this study, risk levels were obtained on the road network. The model was implemented in the UK. Reilly
based on the probability of incident consequences. It was found that et al. (2012) with a similar approach to Dadkar et al. (2010) developed
among the four methods of transportation, including pipeline, rail, a game-theoretic framework for routing the transportation of dangerous
road, and inland waterways, pipeline transportation was the least risky goods on the rail network based on the interaction between government
mode while the road became the least costly one (Reniers and Dullaert, agency, a carrier, and a terrorist, which was applied on the freight rail
2013). network in the continental US. Szeto (2013) employed a Nash game
A practical way to make a network vulnerability analysis is to theory approach to study the integrated routing and scheduling parts of
identify critical nodes and paths in the network. For this purpose, an dangerous goods shipment problem with unknown link incident prob-
interdiction model can be employed by developing a game-theoretic abilities. They formulated the problem as a route-based maxmin pro-
model between the enemy and operator. In this game, the enemy wants blem over the space–time. He expanded the network and decomposed
to maximize the damage extent while the operators want to cope with the route-based problem into a link-based linear problem to be able to
the attack through better path findings. Borrowing the analytical fra- utilize linear programming solution methods. Later on, Szeto et al.
mework of game theory, the transportation scientists could provide a (2017), through a same analytical approach, addressed a dangerous
context for modeling the interactions among agents (players) in the goods routing and scheduling problem with multiple dangerous goods
domain of transportation engineering and analyzing complex decision classes again when incident probabilities are unknown or inaccurate.
problems among decision makers. They approached a multi-demon game theory framework that gave
A pioneering study applying the game theory in transportation profound suggestions to practitioners for the safest shipment of mul-
science was the study performed by Bell and Cassir (2002). In their tiple-dangerous goods.
study, route choices of travelers in the presence of uncertainty about According to the literature and because of the unpredictability of
costs were modeled through the mixed-strategy Nash equilibrium of an time and place of a terrorist attack, the uncertainty nature of trans-
n-player, non-cooperative game. This approach was provided to de- portation engineering is pronounced more for the security vulnerability
scribe a risk-averse user equilibrium traffic assignment. Bell (2004), analyses of dangerous goods transportation. Most of the mathematical
similar to their previous work, employed a non-cooperative non-zero- models presented in the literature only allowed the operator to identify
sum game for freight transportation modeling. critical links based on network performance measures or population
One of the successful applications of game theory is its application exposure degrees, while the aim of an attack for a terrorist could not be
in vulnerability analysis of transportation networks. Along with em- confined only to population exposure, but also to infrastructure da-
ploying the game theoretic approaches in transportation system ana- mage. As a result, deploying a mathematical model for simultaneous
lyses, Bell et al. (2008) proposed a game theory approach to the road coverage of the exposed population and infrastructure and identifying
network vulnerability analysis. By defining predetermined scenarios terrorist decisions is an important scientific gap that has not been stu-
based on attack successes or failures, they determined how to use the died so far. The lack of application of spatial analysis software to in-
road network to minimize the maximum expected consequences of in- vestigate the consequences of terrorist incidents combined with hazard
cidents. A mixed strategy, according to the probability of a worst-case modeling software (such as ALOHA) is also a research gap in this do-
scenario, was chosen as their optimal strategy. Qiao et al. (2014) used main.
an optimal model with a game theory approach (using a zero-sum game The terrorist target can, in addition to damaging the network and
and the multi-star solution) and investigated the vulnerability of road transportation infrastructure, be the number of people affected by the
transportation at the level of system performance based on two in- incident. Most of the events such as the 2017 attack to a concert venue
dicators of time and cost of travel. There were two actors in their in Manchester, the November 2015 attack on a football stadium in
model: operator and enemy. The aim of the operator was to minimize France, the shooting at a concert in the US in 2017 or the attack on the
the total cost of the network by controlling the flow volumes of links building of the Islamic Consultative Assembly of Iran in 2017 targeted
and the aim of the enemy was to maximize the total cost of the network only people.
by destroying a network link. Sarhadi et al. (2015), determined an The aim of the approach proposed in this study is to guide to know
optimal strategy to fortify a number of railway terminals using a game the level of vulnerability of each route and making appropriate deci-
theory approach through adding another level to the levels of players, sions to reduce the likelihood and consequences of terrorist incidents in
i.e. outlining the framework of defender-attacker-defender levels, with the rail transportation of dangerous goods. In this study, the vulner-
the aim of minimizing the consequences of the attack. This three-level ability of the dangerous goods transportation is investigated using a
model was conducted for the first class rail network in the US and the quantitative approach based on the geographic information system
players were considered as the network owner, network users, and the (GIS) and finally, routing of chlorine transportation is performed using
enemy. the game theory approach.

232
M. Khanmohamadi et al. Safety Science 110 (2018) 230–241

Fig. 2. Study framework for this paper.

In Section 2, the suggested approach of this paper is described, information. With the possession of information about weather condi-
which includes explanations of how to perform security spatial analysis tion and shipment information (tankers), the severity of incidents is
using the ALOHA and ArcGIS software, as well as the mathematical estimated by the simulation software (ALOHA).
modeling based on a zero-sum game for the transportation of dangerous In the second step, the population and infrastructure layers are
goods. In Section 3, chlorine transportation by rail in the Texas-Illinois combined with threat zone layers in the ArcGIS (note that the threat
corridor of the US is assessed, which is an important corridor for the zone layers are extracted from ALOHA). Afterwards, affected (exposed)
transportation of chlorine in the US. Finally, in Section 4, terminates population and infrastructure for each link are calculated.
the paper with final considerations and open questions. In the third step, a two-objective model is proposed based on the
game theory and a zero-sum game is launched to obtain the optimal
2. Proposed approach operator and terrorist strategies. In Step 4, the Epsilon constraint
method is used to obtain a set of efficient solutions. In the fifth step,
According to the literature, the combination of mathematical after the model was solved, for the operator, the distribution of the
modeling and spatial analysis software for routing rail transportation of probability of the route selection is derived, and for the terrorist, the
dangerous goods with the aim of reducing security vulnerabilities has distribution of the probability of link selections is calculated. Because
not been carried out so far. The study framework of this research, as the proposed model is based on a non-cooperative zero-sum game, the
shown in Fig. 2, obtains the consequences of the incident in each link value of the game is the same for the two players.
and in each route. In this study, the dangerous goods, origins and
destinations, links, and possible routes are considered as basic

233
M. Khanmohamadi et al. Safety Science 110 (2018) 230–241

2.1. Estimate the consequences damage. And ultimately, people in the yellow layer will be mildly da-
maged. We extract the results of the analysis from ALOHA. From the
Unlike natural disasters and human and technical errors that can be layers obtained (i.e. red, orange, and yellow), we only pick the red layer
predicted by information and statistics, the nature of sabotage attacks is (AEGL-3 layer). The spatial information of the red area will be entered
in such a way that is not predictable or are very hard to predict (Bell, into the ArcGIS software. Population and infrastructure data are also
2000; Bell et al., 2008). Therefore, the two following methods can be available in the ArcGIS data layers. Hence, the exposure of the popu-
used to calculate the vulnerability indexes: (1) the product of the lation and infrastructure affected by the attack is determined. That is to
probability of success of the attack and the consequences of the in- say, the output of the ALOHA is used by the ArcGIS to estimate the
cident, or (2) direct estimation of missing expected values when the population and infrastructure affected by the incident cases of dan-
attack is very difficult to succeed (i.e. an attack owns a very small gerous goods transportation.
probability of success) (Morgeson et al., 2011). In the event of an accident for a dangerous goods train, the area to
The approach of this study is based on the second method. We need the center of the train is affected by the accident. But, a train is not a
to aware of the characteristics and volume of material, infrastructure, fixed object. It is moving along its route; therefore, this affected area is
weather and environmental conditions, and population to draw the moving along the route of the train. In ArcGIS, the threat zones in each
expected consequences of attacks. After collecting needed information, rail link are implemented by the buffer tool, and with the intersect tool,
the threat zone of the incident is estimated by ALOHA, and then, by those infrastructures and population affected along the route of the
using ArcGIS, the extent of the population and infrastructure that af- train are determined.
fected by the attack will be derived.
2.2. Bi-objective game
2.1.1. Estimate the threat zone in ALOHA
Game theory is a set of analytical tools that analyse the interaction
The first step in determining the consequences of a terrorist attack is
between decision makers. It is based on two assumptions of decision-
to estimate the severity. Some software can only investigate a specific
makers rationality and the strategic nature of the decisions (Jehle,
incident such as fire, explosion, or release of toxic substances. Some
2001), and assumed that each player demands the highest possible
other multifunctional software is used to investigate and model a
payoff for himself. Thus far, several transportation studies have em-
combination of different and unpredictable events. Some other ad-
ployed the game theory in their analytical contexts (Bell, 2000, 2004;
vanced software can also carry out risk assessment calculations, along
Bell et al., 2008; Bell and Cassir, 2002).
with an estimate of potential outcomes, as well as the possible im-
A security vulnerability analysis tends to determine the likelihood of
plications and consequences of an incident. The most prominent soft-
threats, for example, malicious attacks on transportation networks. The
ware in this field is ALOHA and Phast. Both software has similarities.
probabilistic nature of such threats makes the analyst unable to estab-
ALOHA has different capabilities such as predicting the release of toxic
lish deterministic or exact methodological approaches. A smart terrorist
substances in the atmosphere over time and geographic locations.
chooses targets based on the defensive capabilities of a defender and his
Hence, to determine the threat zones in this study, ALOHA software is
possible reaction. Facing and overcoming him requires tailor-made
selected.
approaches while naïve measures like only increasing the security level
The ALOHA dispersion model was developed by the Emergency
of a target may increase the likelihood of attacking other targets. That is
Response Division (ERD) of National Oceanic and Atmospheric
why the game theory is proposed in several studies as a powerful and
Administration (NOAA) Office of Response and Restoration (OR&R) in
capable approach to trace terrorists in attacking strategic transportation
cooperation with the Environmental Protection Agency (EPA) in the US.
commodities (Bier et al., 2009).
This software has been created to predict the aftermath of chemical
Game theory can be divided into cooperative and non-cooperative
materials incidents. ALOHA uses warning levels to display the influence
games, accompanying complete or incomplete information by players.
of diffusion of toxins, fire, and explosives human lives. So far, several
A cooperative (or coalitional) games is a game where the interests of the
studies have been conducted regarding the safety of transportation of
players are not necessarily opposite and they may obtain collective
dangerous goods using this software (Bagheri et al., 2014; Lozano et al.,
payoffs through joint actions that they take. However, non-cooperative
2010).
games focus on developing a framework of interrelationships which
The determination of the threat zones for each substance depends
tries to predict players' individual strategies and payoffs and to discover
on the level of concerns (LOC) defined by the user. To determine this
the Nash equilibria. In this case, players’ decisions may be accompanied
level, there are different standards such as AEGL and IDLH (NOAA-
by opposite payoffs and the game environment is competitive than
Office-of-Response-and-Restoration, 2018). As shown in Fig. 3, the
cooperative. Now when the interests of the players are opposite, a non-
software output includes a three-level color spectrum: red (AEGL-3),
cooperative zero-sum game is devised. A zero-sum game is a mathe-
orange (AEGL-2), and yellow (AEGL-1). In the red layer, most people
matical model represents the interaction of players in conflicting si-
will be killed. In the orange layer, most people will suffer irreparable
tuations. In this game, player's gain or loss of utility is balanced by the
losses or gains of the utility of the other participants, and the value of
total benefits and losses of the game is zero (Neumann, 1928).
The non-cooperative zero-sum game has been utilized in several
studies in transportation science via four different contexts where the
players are (a) network defender and attacker, (b) travelers only, (c)
transportation authorities, and (d) travelers and transportation autho-
rities (Hollander and Prashker, 2006). In the defender-attacker game,
there is a cost-maximization objective that one player (the terrorist)
tries to attain and a cost-minimization objective that another player
(the operator) wishes to satisfy (i.e. objective functions of the players
are equal and opposite of each other). In this paper, the number of
population and infrastructure affected by a terrorist attack is a gain for
the terrorist and a loss for the operator. The intension of the terrorist is
to maximize the extent of affected population and infrastructure while
Fig. 3. Example of the threat zone layers in ALOHA. the operator’s intension is limit or prevent it. As a result, the zero-sum

234
M. Khanmohamadi et al. Safety Science 110 (2018) 230–241

game approach is chosen for this study. finding the links where attack to them cause higher consequences and
Matrix C is the two-player zero-sum game matrix. The operator's affects more population and infrastructure.
strategy is determined by selecting row i and simultaneously the ter- For modeling such an interaction among players, a multi-objective
rorist’s strategy by selecting column j. Thus, the operator will suffer the model (Eq. (4)) is presented so that it is possible to obtain optimal
consequences of C(i,j), and the terrorist will also impose these con- strategies for both (operator and terrorist’s) goals at the same time to be
sequences on the operator. The operator’s goal is to minimize the able to know the level of priority of each goal. For the operator, Eq. (4)
maximum consequences and the terrorist’s goal is to maximize the is with the aim of reducing the security vulnerability of the affected
minimum consequences. The term p in Eq. 1 is the probability of the population and infrastructure. p∗ and q∗ are optimal strategies for the
route selection by the operator, and the term q in this equation is the two players. Matrices C (in object F1) and V (in object F2) are, respec-
probability of target selection for an attack by the terrorist. tively, the matrices of the affected population and infrastructure. This
model can be solved through various methods; for the case study of the
minpmax qC (p,q) = max qminp C (p,q) = v (1)
present study, Epsilon constraint and weighting methods (Zopounidis
and Pardalos, 2010) are employed to solve the model.
s.t. ∑ pi = 1
i m
F1: minp (max q ( ∑ pi Cij qj )) F2: minp (max q ( ∑ pi Vij qj )) s. t . ∑ pi
∑ qj = 1 ij ij i=1
j n
= 1 ∑ qj = 1
In order to solve the model, it can be written as Eqs. (2) and (3) for j=1 (4)
the first and second players, respectively, in the form of a linear pro-
gramming model (Neumann, 1928): The important point in the preparation of infrastructure matrix,
m above, is to accurately recognize the differences between various in-
∑ Cij pi∗ −v ⩽ 0 for j = 1,...,n frastructures from the viewpoint of the operator. Because of the con-
i=1 (2) sequences of a terrorist attack on a train carrying dangerous goods,
n different infrastructures could be affected in addition to the population
∑ Cij qj∗−v ⩾ 0 for i = 1,...,m around the incident area. The operator should ascribe the relative im-
j=1 (3) portance of transportation infrastructure relative to each other with
respect to the land use and activities of them in order to get the correct
where p∗ and q∗ are optimal strategies for the two players and v is the
matrix for infrastructure in Eq. (4).
value of the game, which is the expected payoff to the player at the
equilibrium point. At the equilibrium state, the players do not better off
by choosing another action. This means that, at the optimal strategy by 2.3. Solution method
the players, they cannot improve their choices by adopting different
strategies. In multi-objective problems, a unique optimal solution cannot be
The minimum-maximum game of the two players, above, is a class achieved; on the other hand, due to the contradiction among goals,
of games for which finding equilibria is computable in polynomial time, there is no answer that is simultaneously optimal with respect to all the
using linear programming (Aumann et al., 1995). Furthermore, the lack goals. Therefore, the desirable result can only be obtained as a series of
of difference between the payoffs of the player from the perspective of near-optimal solutions. The range of solutions in a multi-objective
who begins the game first (in a simultaneous game or a sequential problem is named Pareto set or Pareto frontier. Most multi-objective
game) is an important matter in the theory of minimax games of van optimization algorithms employ the concept of domination in order to
Newman (Neumann, 1928). draw the Pareto optimal front. In this study, because of the linearity of
Eq. (1) depicts a one-goal game model. Such a model is employed the equations and the polynomial equation solution approach, the
when players have only one goal. In this study, for a situation where the Epsilon constraint method (Zopounidis and Pardalos, 2010) is utilized
operator decides to simultaneously reduce the risk of people exposure to get the results.
and infrastructure, a two-goal model based on the non-cooperative According to Eq. (5), in Epsilon constraint method, we solve all
zero-sum game is presented. The purpose of this model is to identify problem functions by transferring all objective functions, except one of
operator and terrorist strategies depending on the level of population them, into constraints. After obtaining optimal solutions, the decision
and infrastructure exposure. The initial assumption of this study is that maker can choose one of them according to the level of the desirability
the operator and terrorist follow a two-player zero-sum game approach. of each goal (Mavrotas, 2009). The points in the Pareto frontier are the
The operator’s goal is to minimize the maximum consequences of a points that have the same priority for the decision, and the final solu-
terrorist attack on the population and infrastructure affected by a ter- tion can be easily constructed with the ε-constraint method (Bérubé
rorist attack, and the terrorist’s goal is to maximize the minimum of et al., 2009).
these consequences drawn from the coping strategies of the operator.
Suppose that for every origin-destination (OD) pair, there are m minF1 (x ) s. t . F2 (x ) ⩽ ε2 ⋮Fn (x ) ⩽ εn x ∈ X (5)
routes that contain n links connecting the OD. The operator strategy is
to select one route out of m for the transportation of the dangerous
goods and the terrorist’s strategy is to select one link out of n to attack 3. Case study
the train carrying the dangerous goods. It is assumed that the operator
and terrorist are completely informed of the network structure and The US rail network is about 250,000 km and is the world’s largest
performance. The game is considered as a mixed strategy game. The rail network that 80% of this network is freight lines. The network
choice of strategies for the player is a probabilistic choice. That is, for mainly operated by private organizations. The US railways throughout
each choice of a player, there is a probability that another player is the country are covered by various railroad companies. Texas is one of
aware of the probability magnitude but is not aware of the final deci- the largest manufacturers of chlorine in the US. The Texas-Illinois
sion. Such a random selection strategy reduces the ability of the players corridor is one of the key corridors for the transportation of chemicals
to predict the opponent game player. If the terrorist wants to eventually in the US, with nearly 795 thousand tons of basic chemicals and 203
attack a link, from the viewpoint of the operator, he randomly selects a thousand tons of chemical products shipped in 2015 (Center-for-
link. But the operator may make the prediction more accurate through Transportation-Analysis, 2017).

235
M. Khanmohamadi et al. Safety Science 110 (2018) 230–241

3.1. Chlorine transportation Table 1


Chlorine characteristics (Cameo-Chemicals, 2018).
Every year about 1.7 million rail cars of dangerous goods are 7782–50-5 1017 Poison Gas Oxidizer Corrosive Diamond
shipped by rail routes in the US, from which 75,000 wagons is dedi-
cated to the shipment of Toxic Inhalation Hazard (TIH) chemicals CAS number UN/NA number DOT hazard label
(Association-of-American-Railroads, 2009). TIH materials are also
among substances that are of significant importance in industry and the
industrial economy; on the other hand since they simply disseminate to
the air after release with huge side effects on people health, perhaps
these materials are the most dangerous substances (Branscomb et al.,
2010). The release of TIH chemicals to air can be one of the main ob-
jectives of terrorists’ operations. The obvious example is the use of
chlorine in Iraq war by terrorist groups. Chlorine and ammonia com-
pose about 70% of rail freight of TIH materials in the US (Hartong et al.,
2007). In this study, rail transportation of chlorine within the Texas-
Illinois corridor, which is one of the major chlorine transportation
routes, is studied.
The chlorine industrial production in the US comprises more than
15 million tons per year. Chlorine is produced in few states that must be
transferred throughout the US on high volume. In 2007, some regions in
the south of the US especially Texas and Louisiana had the highest le-
vels of chlorine production (Branscomb et al., 2010). As a result, storing
and transporting such large volumes nearby towns and urban centers as
well as around critical infrastructure and vulnerable areas can be a
tempting target for terrorist attacks. The study conducted at the Army
Research Laboratory showed that in the worst case scenario, a terrorist
attack to wagons containing chlorine in a densely populated area causes
the death of 100 people per second and about 100 thousand of death in Fig. 4. Threat zone for Oklahoma in ALOHA.
half an hour (Barrett, 2009; Maty, 2017). The chlorine characteristics
are briefly provided in Table 1. As it is clear from the risk diamond in
this table, this material is extremely harmful to human health. Table 2
Threat zone for rail links in each state.
Threat zone (square. 7.5 8.2 8.9 8.8 8.6 8.7 9.1 8.3 8.6 7.8 9.6
3.2. Consequences of an incident
km)

In this study, the routing is conducted for a train containing five cars State IL IN KY MO KS TN MS OK AR LA TX
of the type DOT-111, each of them has a capacity of 30,000 gallons of
chlorine. The technical characteristics of the tankers can be found in the
Association of American Railroads (AAR) report (c.f. Maty, 2017).
climatic conditions, the radius of threat zone varies. All the calculated
Firstly, using the ALOHA simulation software, we simulated an in-
radii of threat zones by the ALOHA software are shown in Table 2. The
cident based on the weather condition of the state. To determine the
largest and smallest threat zones are in Texas with 9.6 km radius and in
range of areas affected by the incident, Acute Exposure Guideline Levels
Illinois with 7.5 km radius, respectively.
(AEGLs) (EPA, 2017) is employed. AEGLs for hazardous chemicals
Fig. 5 shows the routes in the ArcGIS environment with the threat
contains a detailed and comprehensive methodology for developing
zone shown by dark circles continued along the route. The routes
inhalation exposure guideline levels for toxic substances. It helps to
consist of 33 links. The infrastructure and population layers used in this
respond to emergency situations, including chemical spills or other
study are based on US 2010 data. These layers include population and
catastrophic events where the public are exposed to the release of a
transportation infrastructures; religious, commercial, and government
hazardous substance to the air. Because we wanted to consider the
places; airports; parks; healthcare centers; museums; and educational
worst case scenario, we only consider the affected distance in the third
and sports places.
layer of AEGL (red1 area in Fig. 3), where, according to the guideline,
all people are likely to be killed in this layer. Given that the response
time of the incident is taken 30 min, as a result, AEGLs level is de- 3.3. Bi-objective game
termined about 28 ppm in the third layer for 30 min (EPA, 2017).
A total of 33 links comprising 41 different routes are identified in In the multi-objective games proposed in this paper, the operator
the study area. After extracting the threat zone for the AEGL-3 level performs routing of dangerous goods aimed at reducing the con-
from the ALOHA software for an attack scenario to transportation links, sequences of population and infrastructure exposure level. As shown in
the links’ threat zones are defined in ArcGIS10.4.1 using the buffer and Eq. (4), the operator wants to reduce the consequences of a terrorist
intersect tool. Then, the population and infrastructures affected due to attack on the population and the infrastructure according to their
the attack are determined. For example, Fig. 4 shows the threat zone priority levels and terrorists also want to cause the maximum damage
obtained in the ALOHA for the links in the state of Oklahoma, with a based on the priority level of population consequences to the infra-
radius equal to 8.3 km that repeated along the links. structure consequences. The Epsilon constraint method is used to solve
This is the radius of the threat zone calculated by ALOHA for the above bi-objective model.
Oklahoma; however, for the same train with different geographic and To determine the infrastructure priorities relative to each other, the
annual report of infrastructure protection budget is used. The US gov-
1
For interpretation of color in Fig. 3, the reader is referred to the web version of this ernment annually allocates funding to protect infrastructure and people
article. (c.f. US annual budget (Office-of-Management-and-Budget, 2016)). The

236
M. Khanmohamadi et al. Safety Science 110 (2018) 230–241

Fig. 5. Threat zone for routes between Texas – Illinois in ArcGIS.

Fig. 6. Game value with Epsilon constraint method for population and infrastructure.

data on this budget is used to determine the infrastructure priorities. infrastructures within the threat zone of each link by the total number
The type of infrastructure, in fact, is one of the classes like religious of infrastructure exposed within the study area, we can obtain an in-
places, commercial centers etc., mentioned previously. When we ex- dicator for the security vulnerability analysis.
tract the budget for protecting infrastructure from the US annual budget Suppose, for example, that the number of educational infra-
report, with the total number of infrastructure in the range of the links’ structures within the threat zone of link 14 is 10 (i.e. for the trans-
threat zones (in the ArcGIS software) and by dividing the number of portation of chlorine over the entire length of link 14, there are 10

237
M. Khanmohamadi et al. Safety Science 110 (2018) 230–241

Fig. 7. Probability distribution of route selection for the operator.

educational infrastructures at risk). Now suppose, for example, we have objective function encompasses the damage to the population and the
1000 educational infrastructures around all the threat zones of the constraint incorporates the damage to the infrastructure. The popula-
whole study area of the chlorine transportation. Dividing 10 by 1000 tion ranges from 1 million to 1.6 million according to the changes to the
(equal to 0.01) and multiplying 0.01 by the annual security budget extent of damage to infrastructures. The values on the horizontal axis of
assigned to educational infrastructures, we derive a link specific in- Fig. 6 are the values of epsilons (for example, ‘80’ on the horizontal axis
dicator. If we do the same for the rest of infrastructure types in the mentions that the amount of infrastructure exposure degree should not
threat zones of the transportation of chlorine along link 14, then finally, exceed 80 (8 million $)). By solving the problem with this constraint
we have a synthesized index of the importance of attack to link 14 with (i.e. 80 amount), the population affected by the attack is 1.5 million
respect to the all the infrastructures located within the threat zone people. It should be mentioned that by increasing the extent of damage
around this link. This amount is, in fact, the payoff of the terrorist’s to infrastructure, the degree of damage to the population can be re-
decision to attack the link and the operator’s decision payoff to put this duced or vice versa, yet this is not a linear relationship, as also depicted
link on the route transporting chlorine. in Fig. 6.
Of course, all mentioned above is at the level of exposure of infra- As shown in Fig. 6, the operator’s decision to pay attention to the
structures. The problem is according to Eq. (4) have two objectives that infrastructure exposure, for values less than 11.5 million $ (on the
include population exposure other than the infrastructure exposure. horizontal axis), could not have a significant impact on the size of the
The Epsilon constraint method is used to solve the bi-objective model. population affected by the attack. In comparison to this game value, on
After running the model, the game value is obtained according to Fig. 6. the other hand, if the operator prefers the value of the game equal to
According to Eq. (5), we consider the second objective (exposure of 8.5 million $ of the infrastructure damage, the result of the game’s
infrastructure) as the constraint in the Epsilon constraint method. That value for the target population would increase to 1.5 million people,
is, in our game model with the Epsilon constraint approach, the resulting in an increase of 500,000 people hurt because of the attack.

Fig. 8. The probability distribution of links selection for terrorist.

238
M. Khanmohamadi et al. Safety Science 110 (2018) 230–241

Fig. 9. Route no. 1 – Texas to Illinois.

The minimum game value for population objective is 992,977 person Table 3
(11.5 million $ for infrastructure). As mentioned above, from this point, Critical links ranked by different indicators.
according to Fig. 6, if the operator deems to increase the value of the Indicator Rank
game in favor of the infrastructure damages, the value of the game will
not change in terms of the population exposure. Link 27 Link 30 Link 31 Link33
Figs. 7 and 8 show, respectively, the probability distribution of
Population 2 3 4 1
route selection by the operator and the probability distribution of link Transportation 1 2 4 3
selection by the terrorist according to different priorities. ‘Different Religion 8 12 28–33 28–33
priorities’ means that how we assign to ‘infrastructure damage’ and Commercial 3 10 17 4
‘population hurt’ relative importance when solving the bi-objective Government 24–33 24–33 24–33 24–33
Airport 9 3 30 6
problem (Eq. (4)).
Park 1 5 8 4
Since the damage to infrastructure is used as the constraint in the bi- Healthcare 7 4 3 1
objective Epsilon constraint method, ‘E’ in Figs. 7 and 8 is, in fact, the Museum 2 8 27 4
upper level of the infrastructure costs (i.e. epsilon in Eq. (5)). For ex- Education 3 11 13 4
ample, E1 in Fig. 7 is a value equal to 7.8 billion $ meaning that the Sport 6 4 12 2

damage extent to infrastructure should not exceed this amount. The


horizontal axis of Fig. 7 shows 41 routes for carrying dangerous goods
by the operator. The vertical axis is the probability of selecting any
route by the operator (which is a function of the values of the epsilon
(12 values)).
Increasing E from E1 to E12 implies reducing the importance of
infrastructure in favor of population, which results in an increase in the
game value for the infrastructure exposure and a decrease in the game
value for the population exposure, as also shown in Fig. 6. As can be
seen in Fig. 7, the probability of choosing the transportation routes
would change with the changes of the relative importance of population
and infrastructure damage. Route 1 gets a high probability value for
being selected by the operator. Some other routes, such as routes 40 and
41, are selected in only a few epsilon values.
The probability values of links (targeted by the terrorist) are sig-
nificantly different from the routes probability values (chosen by the
operator). According to Fig. 8, links 27, 30, 31, and 33 are the most
desirable objects for the terrorist’s attacks, and they are supposed to be
the critical links. As shown in Fig. 8, except for link 4 in E4, link 11 in
Fig. 10. Link 31 in Illinois. E2, and link 17 in E8, only links 27, 30, 31, and 33 are desirable for the

239
M. Khanmohamadi et al. Safety Science 110 (2018) 230–241

terrorist. These four links are in Illinois and all the routes terminated to Bell, M.G., 2000. A game theory approach to measuring the performance reliability of
Illinois pass through one of them. transport networks. Transport. Res. Part B: Methodol. 34, 533–545.
Bell, M.G., Kanturska, U., Schmocker, J.D., Fonzone, A., 2008. Attacker-defender models
Among the four critical links 27, 31, 33, and 34, link 31 gets the and road network vulnerability. Philos. Trans. A Math. Phys. Eng. Sci. 366,
lowest weight from the perspective of the terrorist (as a potential target 1893–1906.
object). But, since the terrorist’s goal is to guarantee the maximum of Bell, M.G.H., 2004. Games, heuristics, and risk averseness in vehicle routing problems. J.
Urban Plann. Dev. 130, 37–41.
minimum damage, by reducing the importance of infrastructure in Bell, M.G.H., Cassir, C., 2002. Risk-averse user equilibrium traffic assignment: an appli-
favor of population, this link would be more highlighted to be attacked. cation of game theory. Transport. Res. Part B: Methodol. 36, 671–681.
Fig. 9 shows route no. 1 from Texas to Illinois and Fig. 10 depicts link Berdica, K., 2002. An introduction to road vulnerability: what has been done, is done and
should be done. Transport Policy 9, 117–127.
31 in Illinois. Bérubé, J.-F., Gendreau, M., Potvin, J.-Y., 2009. An exact ∊-constraint method for bi-
For the critical links 27, 31, 33, and 34, the ranks in comparison to objective combinatorial optimization problems: application to the traveling salesman
all the links in the study area with respect to the population and in- problem with profits. Eur. J. Oper. Res. 194, 39–50.
Bier, V.M., Cox Jr, L.A., Azaiez, M.N., 2009. Why both Game Theory and Reliability
frastructure exposures are listed in Table 3. As it is observed, these four
Theory are Important in Defending Infrastructure Against Intelligent Attacks, Game
critical links get the highest ranks in terms of population and infra- Theoretic Risk Analysis of Security Threats. Springer, pp. 1–11.
structure exposure except for the ‘government infrastructure.’ Branscomb, L., Fagan, M., Auerswald, P.E., Ellis, R.N., Barcham, R., 2010. Rail
Transportation of Toxic Inhalation Hazards: Policy Responses to the Safety and
Security Externality. Discussion Paper, Belfer Center for Science and International
4. Conclusion Affairs, Harvard Kennedy School.
Cameo-Chemicals, 2018. Chlorine. Office of Response and Restoration, National Ocean
This paper presents a new approach for the use of a hazard modeling Service, National Oceanic and Atmospheric Administration, US (URL: < https://
cameochemicals.noaa.gov/chemical/2862 > , last accessed: 2/1/2018).
software (ALOHA) and a spatial analysis software (ArcGIS), combined Center-for-Transportation-Analysis, 2017. Freight Analysis Framework, Version 4. Bureau
with the game theory, for decision making under uncertainty and of Transportation Statistics, Federal Highway Administration (the URL: < http://faf.
evaluating terrorist threats of attacking trains carrying dangerous ornl.gov/fafweb/ > , last accessed: 2/1/2018).
Dadkar, Y., Nozick, L., Jones, D., 2010. Optimizing facility use restrictions for the
goods. Previous studies have only considered affected population or movement of hazardous materials. Transport. Res. Part B: Methodol. 44, 267–281.
cost as the inputs of each player in the game theory, while this study EPA, 2017. Chlorine Results – AEGL Program. United States Environmental Protection
considered affected population and infrastructure simultaneously by a Agency, Washington, D.C., US.
Faturechi, R., Miller-Hooks, E., 2015. Measuring the performance of transportation in-
two-objective model. At the end, an operator could use this approach to frastructure systems in disasters: a comprehensive review. J. Infrastruct. Syst. 21,
forecast terrorist decision and to identify the critical links. 04014025.
To obtain the severity of a terrorist’s attack to the chlorine trans- Feng, Q., Cai, H., Chen, Z., Zhao, X., Chen, Y., 2016. Using game theory to optimize
allocation of defensive resources to protect multiple chemical facilities in a city
portation on the rail corridor from Texas to Illinois, ALOHA software
against terrorist attacks. J. Loss Prev. Process Ind. 43, 614–628.
was used to obtain the threat zone of the event, and then, the ArcGIS Garbolino, E., Lachtar, D., 2012. Dangerous Goods transportation and biophysical vul-
software gave the extent of exposure to the population and infra- nerability: the contribution of GIS and simulation softwares. In: Transport Dangerous
structures. A bi-objective game theoretic model was solved through the Goods. Springer, pp. 1–43.
Gedik, R., Medal, H., Rainwater, C., Pohl, E.A., Mason, S.J., 2014. Vulnerability assess-
Epsilon constraint method. To determine the differences of infra- ment and re-routing of freight trains under disruptions: a coal supply chain network
structures relative to each other, the report of the US annual budget and application. Transport. Res. Part E: Log. Transport. Rev. 71, 45–57.
the allocation of funds to different departments were used. After run- Global-Terrorisem-Database, 2016. Terroris Attack to Transportation Systems. National
Consortium for the Study of Terrorism and Responses to Terrorism, A Center of
ning the model, critical links were determined for various terrorist Excellence of the U.S. Department of Homeland Security, University of Maryland,
purposes according to the probability distribution of route selection, College Park, USA (URL: < https://www.start.umd.edu/gtd/search/Results.aspx?
given different objectives of the operator. target=19 > , last accessed: 2/1/2018).
Guha-Sapir, D., Vos, F., Below, R., Ponserre, S., 2012. Annual disaster statistical review
There are several key areas for the extension of this research. First, 2011: the numbers and trends. Centre for Research on the Epidemiology of Disasters
extending this approach to a network with different origins and desti- (CRED).
nations containing different commodities; second, the expansion of the Haimes, Y.Y., Lambert, J.H., Kaplan, S., Pikus, I., Leung, F., Mosenthal, A., 2003. Risk
assessment methodology for critical transportation infrastructure. Diane Publishing
game to a three-level game model and taking into account the level of
Company.
protection of links by a third player; finally, developing a model taking Ham, D.B., Lockwood, S., 2002. National needs assessment for ensuring transportation
into account the objectives of reducing the risk due to natural hazards. infrastructure security. Contractor’s Final Report to the American Association of State
Highway and Transportation Officials.
Hartong, M., Goel, R., Wijesekera, D., 2007. A Risk Assessment Framework for TIH Train
Appendix A. Supplementary material Routing. Federal Railroad Administration, Howard University, George Mason
University.
Supplementary data associated with this article can be found, in the Hollander, Y., Prashker, J.N., 2006. The applicability of non-cooperative game theory in
transport analysis. Transportation 33, 481–496.
online version, at http://dx.doi.org/10.1016/j.ssci.2018.04.026. Huang, B., Cheu, R.L., Liew, Y.S., 2004. GIS and genetic algorithms for HAZMAT route
planning with security considerations. Int. J. Geogr. Inf. Sci. 18, 769–787.
References Jehle, G.A., 2001. Advanced microeconomic theory. Pearson Education India.
Khademi, N., Babaei, M., Fani, A., 2015a. Interurban rail network robustness analysis:
case study of Iran. In: Podofillini, Luca, Sudret, Bruno, Stojadinović, Božidar, Zio,
Argenti, F., Landucci, G., Reniers, G., Cozzani, V., 2018. Vulnerability assessment of Enrico, Kröger, Wolfgang (Eds.), Safety and Reliability of Complex Engineered
chemical facilities to intentional attacks based on Bayesian Network. Reliab. Eng. Systems. CRC Press, The Netherlands, pp. 2217–2227.
Syst. Saf. 169, 515–530. Khademi, N., Balaei, B., Shahri, M., Mirzaei, M., Sarrafi, B., Zahabiun, M., Mohaymany,
Association-of-American-Railroads, 2009. Hazmat transportation by rail: An unfair lia- A.S., 2015b. Transportation network vulnerability analysis for the case of a cata-
bility Policy and Economics Department, Association of American Railroads, strophic earthquake. Int. J. Disaster Risk Reduct. 12, 234–254.
Washington, DC (URL: < http://thehill.com/sites/default/files/aar_ Khakzad, N., Reniers, G., van Gelder, P., 2017. A multi-criteria decision making approach
hazmatbyrailseptember2009_0.pdf > , last accessed: 2/1/2018). to security assessment of hazardous facilities. J. Loss Prev. Process Ind. 48, 234–243.
Aumann, R.J., Maschler, M., Stearns, R.E., 1995. Repeated Games with Incomplete Kozan, E., Burdett, R., 2005. A railway capacity determination model and rail access
Information. MIT Press. charging methodologies. Transport. Plann. Technol. 28, 27–45.
Bababeik, M., Khademi, N., Chen, A., Nasiri, M.M., 2017a. Vulnerability analysis of Latora, V., Marchiori, M., 2005. Vulnerability and protection of infrastructure networks.
railway networks in case of multi-link blockage. Transp. Res. Proc. 22, 275–284. Phys. Rev. E 71, 015103.
Bababeik, M., Nasiri, M.M., Khademi, N., Chen, A., 2017b. Vulnerability evaluation of Lisi, R., Maschio, G., Milazzo, M.F., 2007. Terrorist actions in the transport of dangerous
freight railway networks using a heuristic routing and scheduling optimization goods in urban areas, IChemE symposium series.
model. Transportation. http://dx.doi.org/10.1007/s11116-017-9815-x. Lozano, A., Muñoz, Á., Antún, J.P., Granados, F., Guarneros, L., 2010. Analysis of hazmat
Bagheri, M., Verma, M., Verter, V., 2014. Transport mode selection for toxic gases: rail or transportation accidents in congested urban areas, based on actual accidents in
road? Risk Anal. 34, 168–186. Mexico. Proc.-Soc. Behavioral Sci. 2, 6053–6064.
Barrett, A.M., 2009. Mathematical Modeling and Decision Analysis for Terrorism Defense: Maty, A.D., 2017. Field guide to tank cars. Bureau of Explosives, Association of American
Assessing Chlorine Truck Attack Consequence and Countermeasure Cost Railroad, Washington, DC (the URL: www.aar.org).
Effectiveness. PhD thesis, Carnegie Mellon University, Pittsburgh, Pennsylvania. Mavrotas, G., 2009. Effective implementation of the ε-constraint method in multi-

240
M. Khanmohamadi et al. Safety Science 110 (2018) 230–241

objective mathematical programming problems. Appl. Math. Comput. 213, 455–465. Sapori, E., Sciutto, M., Sciutto, G., 2014. A quantitative approach to risk management in
Milazzo, M.F., Ancione, G., Lisi, R., Vianello, C., Maschio, G., 2009. Risk management of critical infrastructures. Transp. Res. Proc. 3, 740–749.
terrorist attacks in the transport of hazardous materials using dynamic geoevents. J. Sarhadi, H., Tulett, D.M., Verma, M., 2015. A defender-attacker-defender approach to the
Loss Prev. Process Ind. 22, 625–633. optimal fortification of a rail intermodal terminal network. J. Transport. Security 8,
Moore, D.A., Fuller, B., Hazzan, M., Jones, J.W., 2007. Development of a security vul- 17–32.
nerability assessment process for the RAMCAP chemical sector. J. Hazard. Mater. Szeto, W.Y., 2013. Routing and scheduling hazardous material shipments: nash game
142, 689–694. approach. Transport. B: Transport Dyn. 1, 237–260.
Morgeson, J., Brooks, P.S., Disraelly, D.S., Erb, J.L., Neiman, M.L., Picard, W.C., 2011. Szeto, W.Y., Farahani, R.Z., Sumalee, A., 2017. Link-based multi-class hazmat routing-
Doctrinal Guidelines for Quantitative Vulnerability Assessments of Infrastructure- scheduling problem: a multiple demon approach. Eur. J. Oper. Res. 261, 337–354.
Related Risks. Volume I. INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA. Talarico, L., Reniers, G., Sörensen, K., Springael, J., 2015. MISTRAL: a game-theoretical
Neumann, J.V., 1928. Zur theorie der gesellschaftsspiele. Mathematische annalen 100, model to allocate security measures in a multi-modal chemical transportation net-
295–320. work with adaptive adversaries. Reliab. Eng. Syst. Saf. 138, 105–114.
NOAA-Office-of-Response-and-Restoration, 2018. Public Exposure Guidelines. National Ukkusuri, S.V., Yushimito, W.F., 2009. A methodology to assess the criticality of highway
Oceanic and Atmospheric Administration, US Department of Commerce, transportation networks. J. Transport. Sec. 2, 29–46.
URL: < https://response.restoration.noaa.gov/oil-and-chemical-spills/chemical- US-Department-of-Transportation, 2007. Hazardous materials incident data. Office of
spills/resources/public-exposure-guidelines.html > , (last accessed 1/1/2018). Hazardous Materials Safety, United States Department of Transportation,
Office-of-Management-and-Budget, 2016. Fiscal Year 2016 – US Government budget. Washington, DC.
Government Publishing Office, Washington DC, US. van Staalduinen, M.A., Khan, F., Gadag, V., Reniers, G., 2017. Functional quantitative
Pinker, E.J., 2009. A Mathematical analysis of short-term responses to threats of ter- security risk analysis (QSRA) to assist in protecting critical process infrastructure.
rorism. In: Memon, N., David Farley, J., Hicks, D.L., Rosenorn, T. (Eds.), Reliab. Eng. Syst. Saf. 157, 23–34.
Mathematical Methods in Counterterrorism. Springer, Vienna, pp. 141–160. Verma, M., Verter, V., 2007. Railroad transportation of dangerous goods: Population
Qiao, W., Lu, Y., Xiong, C., Haghani, A., 2014. A game theory approach for the mea- exposure to airborne toxins. Comput. Oper. Res. 34, 1287–1303.
surement of transport network vulnerability from the system prospective. Transport. Wang, S., Zhang, J., Zhao, M., Min, X., 2017. Vulnerability analysis and critical areas
B: Transport Dyn. 2, 188–202. identification of the power systems under terrorist attacks. Phys. A: Stat. Mech. Appl.
Reggiani, A., 2013. Network resilience for transport security: some methodological con- 473, 156–165.
siderations. Transp. Policy 28, 63–68. Zhang, L., Reniers, G., 2016. A game-theoretical model to improve process plant pro-
Reilly, A., Nozick, L., Xu, N., Jones, D., 2012. Game theory-based identification of facility tection from terrorist attacks. Risk Anal. 36, 2285–2297.
use restrictions for the movement of hazardous materials under terrorist threat. Zhang, L., Reniers, G., Qiu, X., 2017. Playing chemical plant protection game with dis-
Transport. Res. Part E: Log. Transport. Rev. 48, 115–131. tribution-free uncertainties. Reliab. Eng. Syst. Saf.
Reniers, G.L.L., Dullaert, W., 2013. A method to assess multi-modal Hazmat transport Zhu, Z., Chen, B., Reniers, G., Zhang, L., Qiu, S., Qiu, X., 2017. Playing chemical plant
security vulnerabilities: Hazmat transport SVA. Transp. Policy 28, 103–113. environmental protection games with historical monitoring data. Int. J. Environ. Res.
Rezazadeh, A., Zhang, L., Reniers, G., Khakzad, N., Cozzani, V., 2017. Optimal patrol Public Health 14, 1155.
scheduling of hazardous pipelines using game theory. Process Saf. Environ. Prot. 109, Zopounidis, C., Pardalos, P.M., 2010. Handbook of Multicriteria Analysis. Springer
242–256. Science & Business Media.

241

You might also like