Methods for removing links in a network to minimize the spread of infections

From MaRDI portal
Revision as of 03:39, 30 January 2024 by Import240129110155 (talk | contribs) (Created automatically from import240129110155)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:342308

DOI10.1016/J.COR.2015.11.001zbMath1349.92145OpenAlexW2184215007MaRDI QIDQ342308

Hugh R. Medal, Apurba K. Nandi

Publication date: 17 November 2016

Published in: Computers \& Operations Research (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.cor.2015.11.001






Related Items (19)

A mixed-integer programming approach for locating jamming devices in a flow-jamming attackInterdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker modelFortification Against Cascade Propagation Under UncertaintyEfficient methods for the distance-based critical node detection problem in complex networksFair allocation of personal protective equipment to health centers during early phases of a pandemicContent placement in 5G‐enabled edge/core data center networks resilient to link cut attacksLogic-based Benders decomposition for wildfire suppressionEfficient approaches for attaining epidemic-free networks with minimum edge removal setA game theoretic approach to discuss the positive secondary effect of vaccination scheme in an infinite and well-mixed populationOnline self-organizing network control with time averaged weighted throughput objectiveLiterature review: the vaccine supply chainAn integer linear programming formulation for removing nodes in a network to minimize the spread of influenza virus infectionsScalable min-max multi-objective cyber-security optimisation over probabilistic attack graphsOptimizing node infiltrations in complex networks by a local search based heuristicEIA-CNDP: an exact iterative algorithm for critical node detection problemShortest path network interdiction with incomplete information: a robust optimization approachThe costs of overcrowding (and release): strategic discharges for isolated facilities during epidemiological outbreaksBenders decomposition algorithms for minimizing the spread of harmful contagions in networksSoft rumor control in mobile instant messengers


Uses Software



Cites Work




This page was built for publication: Methods for removing links in a network to minimize the spread of infections