Pages that link to "Item:Q4632821"
From MaRDI portal
The following pages link to Securing a border under asymmetric information (Q4632821):
Displaying 10 items.
- Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model (Q342516) (← links)
- Prioritized interdiction of nuclear smuggling via tabu search (Q895756) (← links)
- Network interdiction with asymmetric cost uncertainty (Q2242212) (← links)
- Convex hull representation of the deterministic bipartite network interdiction problem (Q2248756) (← links)
- A survey of network interdiction models and algorithms (Q2294622) (← links)
- Modeling interdependencies in infrastructure systems using multi-layered network flows (Q2297565) (← links)
- Integer programming methods for solving binary interdiction games (Q2672065) (← links)
- The Shortest Path Interdiction Problem with Randomized Interdiction Strategies: Complexity and Algorithms (Q4994144) (← links)
- A two‐stage network interdiction‐monitoring game (Q6179685) (← links)
- Shortest path network interdiction with asymmetric uncertainty (Q6196902) (← links)