C. Aduanas-de, Figura 2.18. Aumento de las importaciones netas de todos los productos básicos y en todas las regiones

S. Alpern, A. Morton, and K. Papadaki, Patrolling Games, Operations Research, vol.59, issue.5, pp.1246-1257, 2011.

J. Bracken and J. T. Mcgill, Mathematical Programs with Optimization Problems in the Constraints, Operations Research, vol.21, issue.1, pp.37-44, 1973.

V. Bucarey, C. Casorrán, Ó. Figueroa, K. Rosas, H. Navarrete et al., Building Real Stackelberg Security Games for Border Patrols, Lecture Notes in Computer Science, pp.193-212, 2017.

M. Canty, D. Rothenstein, and R. Avenhaus, A sequential attribute sampling inspection game for item facilities, Naval Research Logistics, vol.48, issue.6, pp.496-505, 2001.

C. Casorrán, B. Fortz, M. Labbé, and F. Ordóñez, A study of general and security Stackelberg game formulations, European Journal of Operational Research, vol.278, issue.3, pp.855-868, 2019.

. Cepal, Costo económico de los delitos, niveles de vigilancia y políticas de seguridad ciudadana en las comunas del Gran Santiago, 2000.

V. Conitzer and T. Sandholm, Computing the optimal strategy to commit to, Proceedings of the 7th ACM conference on Electronic commerce - EC '06, pp.82-90, 2006.

G. Campesi, European Border and Coast Guard (Frontex): Security, Democracy, and Rights at the EU Border, 2018.

G. B. Dantzig and P. Wolfe, Decomposition Principle for Linear Programs, Operations Research, vol.8, issue.1, pp.101-111, 1960.

, BORDER SECURITY, Foundations of Homeland Security, pp.191-203, 2017.

N. B. Dimitrov and D. P. Morton, Interdiction Models and Applications, International Series in Operations Research & Management Science, pp.73-103, 2012.

R. A. Dreiding and L. A. Mclay, An integrated model for screening cargo containers, European Journal of Operational Research, vol.230, issue.1, pp.181-189, 2013.

J. Edmonds, Maximum matching and a polyhedron with 0,1-vertices, Journal of Research of the National Bureau of Standards Section B Mathematics and Mathematical Physics, vol.69B, issue.1 and 2, p.125, 1965.

D. Gusfield, Very Simple Methods for All Pairs Network Flow Analysis, SIAM Journal on Computing, vol.19, issue.1, pp.143-155, 1990.

D. S. Hochbaum, C. Lyu, and F. Ordóñez, Security routing games with multivehicle Chinese postman problem, Networks, vol.64, issue.3, pp.181-191, 2014.

M. Jain, E. Karde?, C. Kiekintveld, M. Tambe, F. Ordóñez et al., Security Games with Arbitrary Schedules: A Branch-and-Price Approach, Security and Game Theory, pp.177-190

M. Jain, J. Tsai, J. Pita, C. Kiekintveld, S. Rathi et al., Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service, Interfaces, vol.40, issue.4, pp.267-290, 2010.

C. Kiekintveld, M. Jain, J. Tsai, J. Pita, F. Ordóñez et al., Computing Optimal Randomized Resource Allocations for Massive Security Games, Security and Game Theory, vol.1, pp.156-176

Y. Li, V. Conitzer, and D. Korzhyk, Preprint repository arXiv achieves milestone million uploads, Physics Today, 2014.

L. A. Mclay, A. J. Lee, and S. H. Jacobson, Risk-Based Policies for Airport Security Checkpoint Screening, Transportation Science, vol.44, issue.3, pp.333-349, 2010.

X. Nie, R. Batta, C. G. Drury, and L. Lin, Passenger grouping with risk levels in an airport security system, European Journal of Operational Research, vol.194, issue.2, pp.574-584, 2009.

M. W. Padberg and M. R. Rao, Odd Minimum Cut-Sets andb-Matchings, Mathematics of Operations Research, vol.7, issue.1, pp.67-80, 1982.

K. Papadaki, S. Alpern, T. Lidbetter, and A. Morton, Patrolling a Border, Operations Research, vol.64, issue.6, pp.1256-1269, 2016.

P. Paruchuri, J. P. Pearce, J. Marecki, M. Tambe, F. Ordóñez et al., Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games, AAMAS, vol.2, pp.895-902, 2008.

E. Shieh, B. An, R. Yang, M. Tambe, C. Baldwin et al., Protect: A deployed game theoretic system to protect the ports of the United States, Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, vol.1, pp.13-20, 2012.

M. U. Thomas and Y. Nisgav, An infiltration game with time dependent payoff, Naval Research Logistics Quarterly, vol.23, issue.2, pp.297-302, 1976.

P. D. Wright, M. J. Liberatore, and R. L. Nydick, A Survey of Operations Research Models and Applications in Homeland Security, Interfaces, vol.36, issue.6, pp.514-529, 2006.

H. Xu, The Mysteries of Security Games, Proceedings of the 2016 ACM Conference on Economics and Computation - EC '16, pp.497-514, 2016.

X. Yan and X. Nie, Optimal placement of multiple types of detectors under a small vessel attack threat to port security, Transportation Research Part E: Logistics and Transportation Review, vol.93, pp.71-94, 2016.

R. Yang, B. Ford, M. Tambe, and A. Lemieux, Adaptive resource allocation for wildlife protection against illegal poachers, Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, pp.453-460, 2014.

R. Yang, C. Kiekintveld, F. Ordóñez, M. Tambe, and R. John, Improving resource allocation strategies against human adversaries in security games: An extended study, Artificial Intelligence, vol.195, pp.440-469, 2013.

Z. Yin, A. X. Jiang, M. Tambe, C. Kiekintveld, K. Leyton-brown et al., TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems Using Game Theory, AI Magazine, vol.33, issue.4, p.59, 2012.

Z. Yin and M. Tambe, A unified method for handling discrete and continuous uncertainty in bayesian Stackelberg games, Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, vol.2, pp.855-862, 2012.