Deterministic network interdiction

From MaRDI portal
Publication:1804095

DOI10.1016/0895-7177(93)90236-RzbMath0800.90772MaRDI QIDQ1804095

R. Kevin Wood

Publication date: 29 June 1993

Published in: Mathematical and Computer Modelling (Search for Journal in Brave)




Related Items (only showing first 100 items - show all)

Maximizing Convergence Time in Network Averaging Dynamics Subject to Edge RemovalA Branch-and-Cut Algorithm for Submodular Interdiction GamesMinimizing a stochastic maximum-reliability pathShortest path network interdiction with asymmetric informationProbability Distributions on Partially Ordered Sets and Network Interdiction GamesInteger Programming Formulations for Minimum Spanning Tree InterdictionModeling Defender-Attacker Problems as Robust Linear Programs with Mixed-Integer Uncertainty SetsBilevel Integer Programs with Stochastic Right-Hand SidesA Progressive Approximation Approach for the Exact Solution of Sparse Large-Scale Binary Interdiction GamesPlanning a defense that minimizes a resource deficit in the worst-case scenario of supply network destructionVertex downgrading to minimize connectivitySimultaneous Convexification of Bilinear Functions over Polytopes with Application to Network InterdictionHow vulnerable is an undirected planar graph with respect to max flowA hybrid modified-NSGA-II VNS algorithm for the multi-objective critical disruption path problemThe stochastic critical node problem over treesOn designing networks resilient to clique blockersInterdicting restructuring networks with applications in illicit traffickingRobust flows with adaptive mitigationA survey on mixed-integer programming techniques in bilevel optimizationUnnamed ItemA two‐stage network interdiction‐monitoring gameDistributionally risk‐receptive and risk‐averse network interdiction problems with general ambiguity setRobust capacitated Steiner trees and networks with uniform demandsAttack and interception in networksHow vulnerable is an undirected planar graph with respect to max flowA Value-Function-Based Exact Approach for the Bilevel Mixed-Integer Programming ProblemOn Bilevel Optimization with Inexact FollowerInterdicting Structured Combinatorial Optimization Problems with {0, 1}-ObjectivesStudy of the Matching Interdiction Problem in Some Molecular Graphs of DendrimersMitigating Interdiction Risk with FortificationSubmodularity in Conic Quadratic Mixed 0–1 OptimizationA more fine‐grained complexity analysis of finding the most vital edges for undirected shortest pathsDetecting critical node structures on graphs: A mathematical programming approachAmbulance Emergency Response Optimization in Developing CountriesA Brief Overview of Interdiction and Robust OptimizationComplexity of Most Vital Nodes for Independent Set in Graphs Related to Tree StructuresDeception tactics for network interdiction: A multiobjective approachPolynomial‐time algorithms for solving a class of critical node problems on trees and series‐parallel graphsA defensive maximal covering problem on a networkMaximum Capacity Path Interdiction Problem with Fixed CostsSequential Shortest Path Interdiction with Incomplete InformationApproximation Algorithms for k-Hurdle ProblemsSequential Interdiction with Incomplete Information and LearningSuccessive Quadratic Upper-Bounding for Discrete Mean-Risk Minimization and Network InterdictionThe Shortest Path Interdiction Problem with Randomized Interdiction Strategies: Complexity and AlgorithmsMultilevel Approaches for the Critical Node ProblemBi-objective optimization models for network interdictionA Unified Framework for Multistage Mixed Integer Linear OptimizationBilevel Optimization: Theory, Algorithms, Applications and a BibliographySelected Topics in Critical Element DetectionDetermining the most vital arcs on the shortest path for fire trucks in terrorist actions that will cause fireComplexity of the multilevel critical node problemInterdicting facilities in tree networksHybrid constructive heuristics for the critical node problemCircular and radial design comparison of survivability in asymmetrical hierarchical networksA cutting plane algorithm for computing \(k\)-edge survivability of a networkMinimum cost edge blocker clique problemInfrastructure security gamesExact algorithms for the minimum cost vertex blocker clique problemPolynomial and pseudo-polynomial time algorithms for different classes of the distance critical node problemVNS solutions for the critical node problemExact and approximation algorithms for sensor placement against DDoS attacksMinimum edge blocker dominating set problemOptimizing dynamic investment decisions for railway systems protectionA bilevel formulation of the pediatric vaccine pricing problemThe \(q\)-ad hoc hub location problem for multi-modal networksA genetic algorithm for a class of critical node problemsA class of algorithms for mixed-integer bilevel min-max optimizationOptimizing designs and operations of a single network or multiple interdependent infrastructures under stochastic arc disruptionNetwork interdiction via a critical disruption path: branch-and-price algorithmsA bilevel partial interdiction problem with capacitated facilities and demand outsourcingProtection issues for supply systems involving random attacksA bilevel exposure-oriented sensor location problem for border securityA mixed-integer programming approach for locating jamming devices in a flow-jamming attackThe \(r\)-interdiction median problem with probabilistic protection and its solution algorithmApplying ranking and selection procedures to long-term mitigation for improved network restorationA bi-level programming model for protection of hierarchical facilities under imminent attacksInterdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker modelCritical edges/nodes for the minimum spanning tree problem: complexity and approximationSolving multi-period interdiction via generalized Bender's decompositionFlow location (FlowLoc) problems: dynamic network flows and location models for evacuation planningMatching interdictionExact interdiction models and algorithms for disconnecting networks via node deletionsAn iterative security game for computing robust and adaptive network flowsA Refined Complexity Analysis of Finding the Most Vital Edges for Undirected Shortest PathsPreventing small \(\mathbf{(s,t)} \)-cuts by protecting edgesThe connected critical node problemDesigning robust coverage networks to hedge against worst-case facility lossesOptimal deployment of virtual network functions for securing telecommunication networks against distributed denial of service attacks: a robust optimization approachBranch and cut algorithms for detecting critical nodes in undirected graphsNodal interdictionThe most vital nodes with respect to independent set and vertex coverInterdiction problems on planar graphsApproximation algorithms for \(k\)-hurdle problemsComplexity of determining the most vital elements for the \(p\)-median and \(p\)-center location problemsThe stochastic interdiction median problem with disruption intensity levelsAlgorithms and complexity analysis for robust single-machine scheduling problemsA cutting-plane algorithm for solving a weighted influence interdiction problemAttack and defense in the layered cyber-security model and their \((1 \pm \varepsilon)\)-approximation schemesIdentifying critical nodes in undirected graphs: complexity results and polynomial algorithms for the case of bounded treewidth


Uses Software


Cites Work


This page was built for publication: Deterministic network interdiction