When alien species make incursions into novel environments, early detection through surveillance is critical to minimizing their impacts and preserving the possibility of timely eradication. However, incipient populations can be difficult to detect, and usually, there are limited resources for surveillance or other response activities. Modern optimization techniques enable surveillance planning that accounts for the biology and expected behavior of an invasive species while exploring multiple scenarios to identify the most cost-effective options. Nevertheless, most optimization models omit some real-world limitations faced by practitioners during multi-day surveillance campaigns, such as daily working time constraints, the time and cost to access survey sites and personnel work schedules. Consequently, surveillance managers must rely on their own judgments to handle these logistical details, and default to their experience during implementation. This is sensible, but their decisions may fail to address all relevant factors and may not be cost-effective. A better planning strategy is to determine optimal routing to survey sites while accounting for common daily logistical constraints. Adding site access and other logistical constraints imposes restrictions on the scope and extent of the surveillance effort, yielding costlier but more realistic expectations of the surveillance outcomes than in a theoretical planning case.

Risk-based surveillance is a key element of plant biosecurity. Surveillance activities for invasive alien species that are harmful to plants — primarily insects, plant pathogens and weeds — take place in border (or possibly pre-border) and post-border contexts [1,2]. The objective of border surveillance is to intercept these invaders at the introduction or transport stage [3], before they can become established in novel environments [4,5]. Ordinarily, surveillance effort is targeted at or near ports of entry [2], as international trade and travel account for a large share of global species movements [2,6–9]. The detection methods (e.g. trapping or container inspections) and degree of effort applied in these locations is determined through the pest risk analysis (PRA) process, which identifies high-risk organisms as well as the commodity and geographic pathways by which they are most likely transported [2,9,10]. As with all biosecurity activities, adopting a risk basis for border surveillance decisions is critical due to the huge number of potential species introductions and limited resources to perform surveillance [3,6,7,9,11–13].

Because of the high volume of introductions and the inevitability of detection failures, even under the best of circumstances, some pests will make it across the border and establish populations [14]. This necessitates post-border surveillance, which is the focus of this review. Post-border surveillance centers on the idea of early detection [15–19]. The fundamental goal of early detection is to find invasive species populations before they are too large to eradicate [3,4,10,16,20–25]. Besides increasing the likelihood of eradication success, early detection can help to minimize further spread and limit the costs of response measures, such as deployment of biological control [5,8,17,21,23,25–27]. There are some practical differences between the three main types of post-border surveillance: detection surveys, which are focused on discovering an invader as soon as possible so that survey attention can be shifted to other locations under threat [14,19]; delimiting surveys, which are intended to find the full extent of a pest population in an invaded area to facilitate response planning [1,28–31]; and ‘proof of freedom' surveys to substantiate that a pest is not present in an area of concern [1,32]. However, the three types are conceptually similar in that they prioritize rapid discovery (or instead, rapid confirmation of absence) as a means to lessen the impact of an invasive species [28]. Arguably, the main difference between these types of surveys is the scale of the required sampling effort.

Regardless, a well-devised, risk-based strategy is crucial for post-border surveillance aimed at reliable and timely detection. Risk-based strategies account for variability between potentially invaded locations in terms of a number of relevant criteria, including environmental suitability (e.g. climatic conditions), host availability and the predicted geographic distribution of the invading species [3,29,30,33,34]; more sophisticated strategies account for aspects such as a species’ expected pattern of spread, including through spatial networks [35–37], or the consequences of imperfect detection tools [38,39]. Typically, knowledge about these risk criteria is uncertain, especially for newly recorded and therefore poorly understood invasive species [28–30,40]. Nevertheless, there are usually enough data (i.e. spatial data) describing the criteria to design surveys that are far more efficient than schemes that rely heavily on uniform or random sampling [30,33,41].

Although a risk-based approach confers efficiency by narrowing the survey sampling frame, there is the separate issue of cost, which dictates what is feasible when developing a surveillance system [42]. An ideal system ensures reliable discovery of an invader soon after its arrival in an area of interest. Unfortunately, incipient populations are notoriously difficult to find [43,44]. As a practical matter, no detection methods are perfect, and more effective detection methods are usually more expensive to implement [38,39,45,46]. Even when detection is highly reliable, it is inefficient to survey everywhere across all areas at risk with the same degree of effort, since invasions rarely progress across a landscape in uniform fashion [39,41]. Moreover, surveillance is merely one element of post-border response to invasions; regularly, decision-makers must assess the trade-offs of devoting limited resources to surveillance instead of other management efforts [47–50].

Consequently, optimization-based surveillance planning has emerged as a sub-discipline of invasive species post-border response. Modern optimization techniques facilitate surveillance planning that accounts for the biology and behavior of an invader while comparing multiple scenarios to identify the most cost-effective options. Indeed, improvements in computational methods and resources have made it possible to find optimal solutions using complex models with varied formulations and objectives. In the next section of this review, we outline some recent advances in the application of optimization models for post-border surveillance planning. In subsequent sections, we consider the extent to which current optimization approaches capture the many real-world limitations faced by survey managers in the field. We also describe an example of optimization for a multi-day surveillance campaign that incorporates an array of practical constraints.

Contemporary work on developing surveillance strategies for invasive species has focused on determining optimal levels of survey effort, sometimes in combination with eradication or other control activities [11,21,44,47,49,51,52]. Other work has explored optimal survey selection in spatial settings [23,50,53,54] and together in both spatial and temporal domains [17,22,45,46,55–57]. In these studies, the survey manager's main objective may have been to minimize the total expected costs associated with an invader (i.e. the economic value of anticipated host losses plus control and mitigation costs) [17,22,53], the expected number of new infestations [23] or the time to first detection of an incipient population [57]. Instead, the objective may have been to minimize the number of invaded or potentially invaded host plants [50] or maximize the number of uninvaded hosts [55]. Alternately, the goal may have been to maximize the expected number of detections [45] or minimize the number of survey sites with false negatives (i.e. where surveys failed to find an established population) [46,56]. Routinely, the survey planning problems in these studies had budgetary constraints on surveillance and other elements of the management response. Further research examples have adapted portfolio theory — an approach from the finance field that maximizes the return on funds distributed among a diverse set of investment assets [58] — to address a somewhat different optimization objective: to allocate surveillance resources for the earliest possible detection, while also hedging against a highly unlikely but catastrophic outcome, i.e. failure to detect a high-impact invader before it becomes well-established and widespread [15,40,50,59].

A sizeable amount of work on optimal invasive species surveillance has come from operations research literature (see [43] for a review). Optimization models are suited to the complexity of invasive species problems because they take account of the biological and behavioral characteristics of an invader while evaluating the costs and benefits of possible management responses [43,60]. Generally, optimization models applied to invasive species combine simulation models, which depict the uncertain invasion process through space and time, with scenario approaches, such that the optimal surveillance is developed with respect to a large number of plausible invasion scenarios, thereby supporting decisions regarding the effective allocation of response resources [23,43,46,50,56,61]. For invasive species, optimal surveillance decisions specify timing, spatial intensity and configuration of surveys [23,50,52,62], and sometimes offer a choice of detection method based on features of potential survey locations (e.g. host density, proximity to known infestations or site accessibility) [46,56,57].

Recently, optimal surveillance models have incorporated statistical quality control methods to account for possible deleterious outcomes of surveillance failures. For example, acceptance sampling [63] is used in manufacturing quality control as a way to inspect large quantities of products quickly despite limited inspection resources. The basic concept is to accept or reject an entire lot (i.e. a group of items) based on findings from a sample of items in the lot; a lot is accepted only if the number of defective items in the sample remains below a defined acceptance threshold. For invasive species surveillance, this threshold can be interpreted as an acceptable level of risk of failing to detect an invader [64]. Previously, the approach was adapted for optimal inspection of live plant imports to prevent invasive species introductions [11], but it has also been applied in the post-border surveillance context. For instance, a recent study [46] utilized acceptance sampling to compare optimal survey schemes for the emerald ash borer (Agrilus planipennis), an invasive forest insect in North America, with the objective of minimizing the expected number of infested trees in sites where surveys failed to find signs of infestation. A related study [56] used the approach when evaluating the effectiveness of a management strategy that combined surveillance with optional removal of host trees conditional on detection, thus minimizing the pest's ability to spread to uninvaded sites.

Optimization approaches may also be used to elucidate the factors that most influence the invasion process or may otherwise affect the likelihood of successful detection. For instance, an analysis of the potential spread of the pathogen Xylella fastidiosa in France [65] identified the primary drivers of infection and incorporated them into a network simulation model, which provided a basis for comparing the performance of several surveillance strategies. Another study of the citrus disease huanglongbing (caused by Candidatus Liberibacter asiaticus) in the United States [66] evaluated the distribution of surveillance resources as an optimization problem. The researchers found that the sensitivity of available detection methods affected the optimal arrangement of survey sites. The latter study is a relevant example of the capacity to address a practical surveillance concern (i.e. detection sensitivity) through optimization.

Model-based surveillance optimization may require substantial computing effort, particularly since it almost always involves a spatial dimension [43]. Various mathematical modeling and programming methods (e.g. mixed-integer programming [23,50,60]), facilitated by increasingly efficient optimization software, have made it possible to compute optimal solutions in a reasonable amount of time, usually a matter of hours [43]. This is true even though many optimization studies involving invasive species surveillance have added complexity by incorporating uncertainty in one or more parameters, such as dispersal [23,50,55,57,60], the probability of detection [67] or the current invasion extent [49].

As this suggests, previous research efforts have differed in terms of their sophistication and level of detail, particularly with respect to practical aspects of invasive species surveillance [30]. Some analyses have included considerations like search times at survey sites [21] or travel costs as they relate to the optimal number of site visits [45]. Other research has examined the optimality of varying surveillance effort through time rather than assuming it remains constant [22], or optimal surveillance design when surveys stop (and management efforts begin) after an invader is detected [14].

Most of these examples have addressed one or two practical constraints on surveillance planning. Relatively few studies have attempted to develop broad-scale, multi-day surveillance campaigns (although see [25,37,51]), most likely because their logistical complexity represents a significant modeling obstacle. Multi-day surveillance planning must account for numerous real-world concerns, which include securing access to a variety of sites across the area of interest, allocating visit times to ensure the sites are surveyed adequately and factoring in travel times between them — all while remaining mindful of the larger campaign schedule. Furthermore, these logistical details must be managed with regard for daily working time constraints and personnel availability.

In multi-day surveillance planning, many of the key logistical considerations depend on the configuration of the transportation network that enables access to potential survey sites in the area of interest. In geographic transportation networks, such as urban and suburban road networks, optimal planning of survey visits can be achieved with route optimization approaches. Examples of optimal routing problems include the multiple tour maximum collection problem [68], the optimal dispatch problem [69–72], the travelling salesman problem [73], and the prize-collecting Steiner tree problem [74]. A promising approach to incorporate site access and other practical considerations into optimal surveillance planning is to adapt the team orienteering problem [75]. The team orienteering problem attempts to find the shortest possible (or least expensive) path between a set of selected sites, with the constraint that not all sites can be visited within the available time [75,76]. Another constraint is that the start and end points of the path are known and consistent day-to-day (e.g. the headquarters for a survey crew). Further practical constraints can also be integrated into the problem formulation, as illustrated below.

For each day in a multi-day invasive species surveillance problem, a survey objective can be formulated as finding a route that visits a sequence of sites with a corresponding set of sampling plans. During the working day, a survey crew visits several sites in the area of interest to conduct sampling (e.g. collecting host plant materials, performing visual inspections or checking traps). These visits are scheduled to fall along a route that starts at the main facility where fleet vehicles are stored and the collected samples (if any) are processed. After the sites are visited, the survey crew returns to the main facility by the end of the day. A surveillance campaign over T days will require planning T routes with accompanying prescriptions of visited sites and sampling rates. The total time that can be spent on survey activities on any day is limited by the working day length (e.g. 7.5 h), which must include time to access the sites, perform sampling and return to the main facility.

To implement the optimal routing model in a spatial setting, an area of N sites (i.e. potential survey locations) must be depicted as a network of interconnected nodes. The nodes depicting adjacent sites are connected by arcs. The optimal scheduling of daily surveys can then be characterized as a problem of finding daily routes through this network of interconnected sites, subject to the working day length constraint and the rule that each route must start and end at the main facility (Figure 1). For a multi-day surveillance campaign of length T, the team orienteering problem determines T routes that maximize the total detection rate at the sites visited along the scheduled routes.

Conceptual example of optimal routing for a multi-day surveillance campaign.

Figure 1.
Conceptual example of optimal routing for a multi-day surveillance campaign.

The area of interest is represented by a network of nodes (potential survey sites) interconnected by arcs. Each day, the survey crew leaves the main facility and follows a route that takes them to a set of survey sites before returning to the facility at the end of the day. Daily route scheduling must account for several practical factors, including site visit times and travel times between them, as well as any site access limitations. All activities must take place within the specified working day length.

Figure 1.
Conceptual example of optimal routing for a multi-day surveillance campaign.

The area of interest is represented by a network of nodes (potential survey sites) interconnected by arcs. Each day, the survey crew leaves the main facility and follows a route that takes them to a set of survey sites before returning to the facility at the end of the day. Daily route scheduling must account for several practical factors, including site visit times and travel times between them, as well as any site access limitations. All activities must take place within the specified working day length.

Close modal

Although not shown here, the optimal routing problem can be linked with the acceptance sampling problem (as implemented in [46]). This would address the vexing issue of failed detections in operational invasive species surveillance. The prospect of failing to detect the presence of an invader when surveying a site is especially high in multi-day surveys, when planners must deal with daily scheduling and the associated complications.

In our view, accounting for logistical and operational constraints during optimization is crucial to planning productive multi-day surveillance. Adding these constraints to an optimization-based model will restrict the scope and extent of the cost-effective surveillance actions, and so will produce prescriptions that appear less effective than theoretical model solutions that do not account for the constraints. However, these prescriptions will offer more realistic expectations of the surveillance outcomes, which ultimately helps to protect the credibility of the surveillance plan as well as the integrity of the results.

In the absence of guidance from researchers, survey managers must rely on their own judgments and experience when implementing the surveys. This is a sensible approach, but the complexity of the multi-day surveillance problem can cause managers to overlook relevant details, such that the campaign is not truly cost-effective. There is also some risk that adjustments made in the field alter the campaign in some meaningful way, but those changes are not reported to the researcher who performed the optimization; in turn, the researcher cannot evaluate their impacts on the optimal prescriptions. We recognize that some day-to-day considerations (e.g. the effects of weather on site visit times and travel times) are difficult, if not impossible, to integrate into optimization models. Nevertheless, we contend that relieving some of the decision-making pressure on a survey manager increases the chance of a successful campaign.

Furthermore, incorporating realistic constraints and features into optimal surveillance models is a logical extension of prior research. It also honors the fundamental aim of post-border invasive species surveillance: reliable early detection. In short, a higher degree of realism enables the development of a stronger decision support system where survey managers are not forced into adjusting model-derived (and presumably optimal) prescriptions based on their local knowledge. Instead, by giving the managers real-world choices, it should be possible to curtail these on-the-fly alterations and interpretations of the prescriptions, and through that improve the robustness of surveillance campaigns.

  • Early detection of invasive alien species through surveillance is essential to limiting their impacts.

  • Optimization-based surveillance planning accounts for the characteristics of an invasive species while exploring multiple scenarios to identify prescriptions that make the best use of limited resources.

  • Most optimization models omit some of the real-world limitations faced by managers during surveillance campaigns, forcing the managers to handle these concerns themselves.

  • New optimization approaches utilize concepts such as optimal routing to incorporate these types of logistical constraints into the surveillance planning process.

The authors declare that there are no competing interests associated with the manuscript.

F.H.K., D.Y. and R.G.H. conceived of the ideas for this manuscript. F.H.K. wrote the first draft and coordinated the revisions. All authors contributed to writing and editing.

PRA

Pest risk analysis; USDA, US Department of Agriculture.

1
Anderson
,
C.
,
Low-Choy
,
S.
,
Whittle
,
P.
,
Taylor
,
S.
,
Gambley
,
C.
,
Smith
,
L.
et al. (
2017
)
Australian plant biosecurity surveillance systems
.
Crop Prot.
100
,
8
20
2
Poland
,
T.M.
and
Rassati
,
D.
(
2019
)
Improved biosecurity surveillance of non-native forest insects: a review of current methods
.
J. Pest Sci.
92
,
37
49
3
Leung
,
B.
,
Roura-Pascual
,
N.
,
Bacher
,
S.
,
Heikkilä
,
J.
,
Brotons
,
L.
,
Burgman
,
M.A.
et al. (
2012
)
TEASIng apart alien species risk assessments: a framework for best practices
.
Ecol. Lett.
15
,
1475
1493
4
Finnoff
,
D.
,
Shogren
,
J.F.
,
Leung
,
B.
and
Lodge
,
D.
(
2007
)
Take a risk: preferring prevention over control of biological invaders
.
Ecol. Econ.
62
,
216
222
5
Olson
,
L.J.
and
Roy
,
S.
(
2005
)
On prevention and control of an uncertain biological invasion
.
Appl. Econ. Perspect. Policy
27
,
491
497
6
Costello
,
C.
,
Springborn
,
M.
,
McAusland
,
C.
and
Solow
,
A.
(
2007
)
Unintended biological invasions: does risk vary by trading partner?
J. Environ. Econ. Manage.
54
,
262
276
7
Faulkner
,
K.T.
,
Robertson
,
M.P.
,
Rouget
,
M.
and
Wilson
,
J.R.U.
(
2017
)
Prioritising surveillance for alien organisms transported as stowaways on ships travelling to South Africa
.
PLoS ONE
12
,
e0173340
8
Epanchin-Niell
,
R.S.
and
Liebhold
,
A.M.
(
2015
)
Benefits of invasion prevention: effect of time lags, spread rates, and damage persistence
.
Ecol. Econ.
116
,
146
153
9
Turner
,
R.M.
,
Plank
,
M.J.
,
Brockerhoff
,
E.G.
Pawson
,
S.
,
Liebhold
,
A.
and
James
,
A.
(
2020
)
Considering unseen arrivals in predictions of establishment risk based on border biosecurity interceptions
.
Ecol. Appl.
,
e2194
10
Baker
,
R.H.A.
,
Battisti
,
A.
,
Bremmer
,
J.
,
Kenis
,
M.
,
Mumford
,
J.
,
Petter
,
F.
et al. (
2009
)
PRATIQUE: a research project to enhance pest risk analysis techniques in the european union
.
EPPO Bull.
39
,
87
93
11
Chen
,
C.
,
Epanchin-Niell
,
R.S.
and
Haight
,
R.G.
(
2018
)
Optimal inspection of imports to prevent invasive pest introduction
.
Risk Anal.
38
,
603
619
12
Surkov
,
I.V.
,
Oude Lansink
,
A.G.J.M.
and
van der Werf
,
W.
(
2009
)
The optimal amount and allocation of sampling effort for plant health inspection
.
Eur. Rev. Agric. Econ.
36
,
295
320
13
Lodge
,
D.M.
,
Williams
,
S.
,
MacIsaac
,
H.J.
,
Hayes
,
K.R.
,
Leung
,
B.
,
Reichard
,
S.
et al. (
2006
)
Biological invasions: recommendations for U.S. policy and management
.
Ecol. Appl.
16
,
2035
2054
14
Guillera-Arroita
,
G.
,
Hauser
,
C.E.
and
McCarthy
,
M.A.
(
2014
)
Optimal surveillance strategy for invasive species management when surveys stop after detection
.
Ecol. Evol.
4
,
1751
1760
15
Barnes
,
B.
,
Giannini
,
F.
,
Arthur
,
A.
and
Walker
,
J.
(
2019
)
Optimal allocation of limited resources to biosecurity surveillance using a portfolio theory methodology
.
Ecol. Econ.
161
,
153
162
16
Carnegie
,
A.J.
and
Nahrung
,
H.F.
(
2019
)
Post-border forest biosecurity in Australia: response to recent exotic detections, current surveillance and ongoing needs
.
Forests
10
,
336
17
Epanchin-Niell
,
R.S.
,
Brockerhoff
,
E.G.
Kean
,
J.M.
and
Turner
,
J.A.
(
2014
)
Designing cost-efficient surveillance for early detection and control of multiple biological invaders
.
Ecol. Appl.
24
,
1258
1274
18
Kompas
,
T.
,
Chu
,
L.
,
Van Ha
,
P.
and
Spring
,
D.
(
2019
)
Budgeting and portfolio allocation for biosecurity measures
.
Aust. J. Agric. Resour. Econ.
63
,
412
438
19
Parnell
,
S.
,
Gottwald
,
T.R.
,
Cunniffe
,
N.J.
,
Alonso Chavez
,
V.
and
van den Bosch
,
F.
(
2015
)
Early detection surveillance for an emerging plant pathogen: a rule of thumb to predict prevalence at first discovery
.
Proc. R. Soc. B
282
,
20151478
20
Ewel
,
J.J.
,
O'Dowd
,
D.J.
,
Bergelson
,
J.
,
Daehler
,
C.C.
,
D'Antonio
,
C.M.
,
Gómez
,
L.D.
et al. (
1999
)
Deliberate introductions of species: research needs: benefits can be reaped, but risks are high
.
Bioscience
49
,
619
630
21
Hauser
,
C.E.
and
McCarthy
,
M.A.
(
2009
)
Streamlining ‘search and destroy’: cost-effective surveillance for invasive species management
.
Ecol. Lett.
12
,
683
692
22
Holden
,
M.H.
,
Nyrop
,
J.P.
and
Ellner
,
S.P.
(
2016
)
The economic benefit of time-varying surveillance effort for invasive species management
.
J. Appl. Ecol.
53
,
712
721
23
Horie
,
T.
,
Haight
,
R.G.
,
Homans
,
F.R.
and
Venette
,
R.C.
(
2013
)
Optimal strategies for the surveillance and control of forest pathogens: A case study with oak wilt
.
Ecol. Econ.
86
,
78
85
24
Leung
,
B.
,
Lodge
,
D.M.
,
Finnoff
,
D.
,
Shogren
,
J.F.
,
Lewis
,
M.A.
and
Lamberti
,
G.
(
2002
)
An ounce of prevention or a pound of cure: bioeconomic risk analysis of invasive species
.
Proc. R. Soc. Lond. B.
269
,
2407
2413
25
Mayo
,
J.H.
,
Straka
,
T.J.
and
Leonard
,
D.S.
(
2003
)
The cost of slowing the spread of the gypsy moth (Lepidoptera: Lymantriidae)
.
J. Econ. Entomol.
96
,
1448
1454
26
Tobin
,
P.C.
,
Kean
,
J.M.
,
Suckling
,
D.M.
,
McCullough
,
D.G.
,
Herms
,
D.A.
and
Stringer
,
L.D.
(
2014
)
Determinants of successful arthropod eradication programs
.
Biol. Invasions
16
,
401
414
27
Pepin
,
K.M.
,
Smyser
,
T.J.
,
Davis
,
A.J.
,
Miller
,
R.S.
,
McKee
,
S.
,
VerCauteren
,
K.C.
et al. (
2020
)
Optimal spatial prioritization of control resources for elimination of invasive species under demographic uncertainty
.
Ecol. Appl.
30
,
e2126
28
Leung
,
B.
,
Cacho
,
O.J.
and
Spring
,
D.
(
2010
)
Searching for non-indigenous species: rapidly delimiting the invasion boundary
.
Divers. Distrib.
16
,
451
460
29
Gust
,
N.
and
Inglis
,
G.J.
(
2006
)
Adaptive multi-scale sampling to determine an invasive crab's habitat usage and range in New Zealand
.
Biol. Invasions
8
,
339
353
30
Hauser
,
C.E.
,
Giljohann
,
K.M.
,
Rigby
,
M.
,
Herbert
,
K.
,
Curran
,
I.
,
Pascoe
,
C.
et al. (
2016
)
Practicable methods for delimiting a plant invasion
.
Divers. Distrib.
22
,
136
147
31
Mangel
,
M.
,
Plant
,
R.E.
and
Carey
,
J.R.
(
1984
)
Rapid delimiting of pest infestations: a case study of the Mediterranean fruit fly
.
J. Appl. Ecol.
21
,
563
579
32
Hester
,
S.M.
,
Hauser
,
C.E.
and
Kean
,
J.M.
(
2017
) Tools for designing and evaluating post-border surveillance systems. In
Invasive Species: Risk Assessment and Management
(
Robinson
,
A.P.
,
Walshe
,
T.
,
Burgman
,
M.A.
and
Nunn
,
M.
, eds), pp.
17
52
,
Cambridge University Press
,
Cambridge, UK
33
Coulston
,
J.W.
,
Koch
,
F.H.
,
Smith
,
W.D.
and
Sapio
,
F.J.
(
2008
)
Invasive forest pest surveillance: survey development and reliability
.
Can. J. For. Res.
38
,
2422
2433
34
Parnell
,
S.
,
Gottwald
,
T.R.
,
Riley
,
T.
and
van den Bosch
,
F.
(
2014
)
A generic risk-based surveying method for invading plant pathogens
.
Ecol. Appl.
24
,
779
790
35
Perry
,
G.L.W.
,
Moloney
,
K.A.
and
Etherington
,
T.R.
(
2017
)
Using network connectivity to prioritise sites for the control of invasive species
.
J. Appl. Ecol.
54
,
1238
1250
36
Cook
,
G.
,
Jarnevich
,
C.
,
Warden
,
M.
,
Downing
,
M.
,
Withrow
,
J.
and
Leinwand
,
I.
(
2019
)
Iterative models for early detection of invasive species across spread pathways
.
Forests
10
,
108
37
Chadès
,
I.
,
Martin
,
T.G.
,
Nicol
,
S.
,
Burgman
,
M.A.
,
Possingham
,
H.P.
and
Buckley
,
Y.M.
(
2011
)
General rules for managing and surveying networks of pests, diseases, and endangered species
.
Proc. Natl Acad. Sci. U.S.A.
108
,
8323
8328
38
Mastin
,
A.J.
,
van den Bosch
,
F.
,
van den Berg
,
F.
and
Parnell
,
S.R.
(
2019
)
Quantifying the hidden costs of imperfect detection for early detection surveillance
.
Phil. Trans. R. Soc. B
374
,
20180261
39
Regan
,
T.J.
,
Chadès
,
I.
and
Possingham
,
H.P.
(
2011
)
Optimally managing under imperfect detection: a method for plant invasions
.
J. Appl. Ecol.
48
,
76
85
40
Yemshanov
,
D.
,
Koch
,
F.H.
,
Lu
,
B.
,
Lyons
,
D.B.
,
Prestemon
,
J.P.
,
Scarr
,
T.
et al. (
2014
)
There is no silver bullet: The value of diversification in planning invasive species surveillance
.
Ecol. Econ.
104
,
61
72
41
Berec
,
L.
,
Kean
,
J.M.
,
Epanchin-Niell
,
R.
,
Liebhold
,
A.M.
and
Haight
,
R.G.
(
2015
)
Designing efficient surveys: spatial arrangement of sample points for detection of invasive species
.
Biol. Invasions
17
,
445
459
42
Whittle
,
P.J.L.
,
Stoklosa
,
R.
,
Barrett
,
S.
,
Jarrad
,
F.C.
,
Majer
,
J.D.
,
Martin
,
P.A.J.
et al. (
2013
)
A method for designing complex biosecurity surveillance systems: detecting non-indigenous species of invertebrates on barrow island
.
Divers. Distrib.
19
,
629
639
43
Büyüktahtakın
,
İ.E
and
Haight
,
R.G.
(
2018
)
A review of operations research models in invasive species management: state of the art, challenges, and future directions
.
Ann. Oper. Res.
271
,
357
403
44
Mehta
,
S.V.
,
Haight
,
R.G.
,
Homans
,
F.R.
,
Polasky
,
S.
and
Venette
,
R.C.
(
2007
)
Optimal detection and control strategies for invasive species management
.
Ecol. Econ.
61
,
237
245
45
Moore
,
A.L.
and
McCarthy
,
M.A.
(
2016
)
Optimizing ecological survey effort over space and time
.
Methods Ecol. Evol.
7
,
891
899
46
Yemshanov
,
D.
,
Haight
,
R.G.
,
Liu
,
N.
,
Chen
,
C.
,
MacQuarrie
,
C.J.K.
,
Ryall
,
K.
et al. (
2019
)
Acceptance sampling for cost-effective surveillance of emerald ash borer in urban environments
.
Forestry
93
,
280
296
47
Epanchin-Niell
,
R.S.
,
Haight
,
R.G.
,
Berec
,
L.
,
Kean
,
J.M.
and
Liebhold
,
A.M.
(
2012
)
Optimal surveillance and eradication of invasive species in heterogeneous landscapes
.
Ecol. Lett.
15
,
803
812
48
Davis
,
A.J.
,
McCreary
,
R.
,
Psiropoulos
,
J.
,
Brennan
,
G.
,
Cox
,
T.
,
Partin
,
A.
et al. (
2018
)
Quantifying site-level usage and certainty of absence for an invasive species through occupancy analysis of camera-trap data
.
Biol. Invasions
20
,
877
890
49
Rout
,
T.M.
,
Moore
,
J.L.
and
McCarthy
,
M.A.
(
2014
)
Prevent, search or destroy? A partially observable model for invasive species management
.
J. Appl. Ecol.
51
,
804
813
50
Yemshanov
,
D.
,
Haight
,
R.G.
,
Koch
,
F.H.
,
Lu
,
B.
,
Venette
,
R.
,
Fournier
,
R.E.
et al. (
2017
)
Robust surveillance and control of invasive species using a scenario optimization approach
.
Ecol. Econ.
133
,
86
98
51
Blackburn
,
L.
,
Epanchin-Niell
,
R.
,
Thompson
,
A.
and
Liebhold
,
A.
(
2017
)
Predicting costs of alien species surveillance across varying transportation networks
.
J. Appl. Ecol.
54
,
225
233
52
Homans
,
F.
and
Horie
,
T.
(
2011
)
Optimal detection strategies for an established invasive pest
.
Ecol. Econ.
70
,
1129
1138
53
Hester
,
S.
and
Cacho
,
O.
(
2012
)
Optimization of search strategies in managing biological invasions: a simulation approach
.
Hum. Ecol. Risk Assess.
18
,
181
199
54
Yemshanov
,
D.
,
Haight
,
R.G.
,
Koch
,
F.H.
,
Lu
,
B.
,
Venette
,
R.
,
Lyons
,
D.B.
et al. (
2015
)
Optimal allocation of invasive species surveillance with the maximum expected coverage concept
.
Divers. Distrib.
21
,
1349
1359
55
Bushaj
,
S.
,
Büyüktahtakın
,
İ.E
,
Yemshanov
,
D.
and
Haight
,
R.G.
(
2020
)
Optimizing surveillance and management of emerald ash borer in urban environments
.
Nat. Resour. Model.
00
,
e12267
56
Yemshanov
,
D.
,
Haight
,
R.G.
,
Chen
,
C.
,
Liu
,
N.
,
MacQuarrie
,
C.J.K.
,
Koch
,
F.H.
et al. (
2019
)
Managing biological invasions in urban environments with the acceptance sampling approach
.
PLoS ONE
14
,
e0220687
57
Yemshanov
,
D.
,
Haight
,
R.G.
,
Koch
,
F.H.
,
Venette
,
R.C.
,
Swystun
,
T.
,
Fournier
,
R.E.
et al. (
2019
)
Optimizing surveillance strategies for early detection of invasive alien species
.
Ecol. Econ.
162
,
87
99
58
Markowitz
,
H.
(
1952
)
Portfolio selection
.
J. Finance
7
,
77
91
59
Prattley
,
D.J.
,
Morris
,
R.S.
,
Stevenson
,
M.A.
and
Thornton
,
R.
(
2007
)
Application of portfolio theory to risk-based allocation of surveillance resources in animal populations
.
Prev. Vet. Med.
81
,
56
69
60
Kıbış
,
E.Y.
and
Büyüktahtakın
,
İ.E
. (
2017
)
Optimizing invasive species management: a mixed-integer linear programming approach
.
Eur. J. Oper. Res.
259
,
308
321
61
Onal
,
S.
,
Akhundov
,
N.
,
Büyüktahtakın
,
İ.E
,
Smith
,
J.
and
Houseman
,
G.R.
(
2020
)
An integrated simulation-optimization framework to optimize search and treatment path for controlling a biological invader
.
Int. J. Prod. Econ.
222
,
107507
62
Bogich
,
T.L.
,
Liebhold
,
A.M.
and
Shea
,
K.
(
2008
)
To sample or eradicate? A cost minimization model for monitoring and managing an invasive species
.
J. Appl. Ecol.
45
,
1134
1142
63
Schilling
,
E.
and
Neubauer
,
D.
(
2017
)
Acceptance Sampling in Quality Control
, 3rd edn,
Chapman and Hall/CRC
,
New York
64
Yamamura
,
K.
,
Katsumata
,
H.
,
Yoshioka
,
J.
,
Yuda
,
T.
and
Kasugai
,
K.
(
2016
)
Sampling inspection to prevent the invasion of alien pests: statistical theory of import plant quarantine systems in Japan
.
Popul. Ecol.
58
,
63
80
65
Martinetti
,
D.
and
Soubeyrand
,
S.
(
2019
)
Identifying lookouts for epidemio-surveillance: Application to the emergence of xylella fastidiosa in France
.
Phytopathology
109
,
265
276
66
Mastin
,
A.J.
,
Gottwald
,
T.R.
,
van den Bosch
,
F.
,
Cunniffe
,
N.J.
and
Parnell
,
S.
(
2020
)
Optimising risk-based surveillance for early detection of invasive plant pathogens
.
PLoS Biol.
18
,
e3000863
67
Moore
,
A.L.
,
McCarthy
,
M.A.
,
Parris
,
K.M.
and
Moore
,
J.L.
(
2014
)
The optimal number of surveys when detectability varies
.
PLoS ONE
9
,
e115345
68
Butt
,
S.E.
and
Cavalier
,
T.M.
(
1994
)
A heuristic for the multiple tour maximum collection problem
.
Comput. Oper. Res.
21
,
101
111
69
Ghose
,
M.K.
,
Dikshit
,
A.K.
and
Sharma
,
S.K.
(
2006
)
A GIS based transportation model for solid waste disposal: a case study on Asansol municipality
.
Waste Manag.
26
,
1287
1293
70
Solomon
,
M.M.
(
1987
)
Algorithms for the vehicle routing and scheduling problems with time window constraints
.
Oper. Res.
35
,
254
265
71
Tavares
,
G.
,
Zsigraiova
,
Z.
,
Semiao
,
V.
and
Carvalho
,
M.G.
(
2009
)
Optimisation of MSW collection routes for minimum fuel consumption using 3D GIS modelling
.
Waste Manag.
29
,
1176
1185
72
Weigel
,
D.
and
Cao
,
B.
(
1999
)
Applying GIS and OR techniques to solve Sears technician-dispatching and home-delivery problems
.
Interfaces
29
,
112
130
73
Balas
,
E.
(
1989
)
The prize collecting traveling salesman problem
.
Networks
19
,
621
636
74
Chopra
,
S.
and
Rao
,
M.R.
(
1994
)
The Steiner tree problem I: formulations, compositions and extension of facets
.
Math. Program.
64
,
209
229
75
Vansteenwegen
,
P.
,
Souffriau
,
W.
and
Van Oudheusden
,
D.
(
2011
)
The orienteering problem: a survey
.
Eur. J. Oper. Res.
209
,
1
10
76
Gunawan
,
A.
,
Lau
,
H.C.
and
Vansteenwegen
,
P.
(
2016
)
Orienteering problem: a survey of recent variants, solution approaches and applications
.
Eur. J. Oper. Res.
255
,
315
332
This is an open access article published by Portland Press Limited on behalf of the Biochemical Society and the Royal Society of Biology and distributed under the Creative Commons Attribution License 4.0 (CC BY-NC-ND).