A bilevel mixed-integer program for critical infrastructure protection planning

From MaRDI portal
Publication:2462537

DOI10.1016/j.cor.2006.09.019zbMath1139.90439OpenAlexW2045540560MaRDI QIDQ2462537

Richard L. Church, Maria Paola Scaparra

Publication date: 30 November 2007

Published in: Computers \& Operations Research (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.cor.2006.09.019




Related Items

Solving the \(p\)-hub median problem under intentional disruptions using simulated annealingA generic optimization framework for resilient systemsMultilevel decision-making: a surveyOn a bi-level formulation to protect uncapacitated p-median systems with facility recovery time and frequent disruptionsCyber-physical correlation effects in defense games for large discrete infrastructuresSolving discretely-constrained Nash-Cournot games with an application to power marketsA decomposition approach to solve a bilevel capacitated facility location problem with equity constraintsNetwork resilienceA Branch-and-Cut Algorithm for Submodular Interdiction GamesA two-level approach to large mixed-integer programs with application to cogeneration in energy-efficient buildingsDesigning a model for service facility protection with a time horizon based on tri-level programmingCapacitated \(p\)-center problem with failure foresightOptimizing dynamic investment decisions for railway systems protectionA two-stage resource allocation model for lifeline systems quick response with vulnerability analysisOptimizing designs and operations of a single network or multiple interdependent infrastructures under stochastic arc disruptionA trilevel programming approach for electric grid defense planningA bilevel partial interdiction problem with capacitated facilities and demand outsourcingCharacterizing multi-event disaster resilienceProtection issues for supply systems involving random attacksEfficient automated schematic map drawing using multiobjective mixed integer programmingExact method for the capacitated competitive facility location problemA mixed-integer programming approach for locating jamming devices in a flow-jamming attackThe \(r\)-interdiction median problem with probabilistic protection and its solution algorithmApplying ranking and selection procedures to long-term mitigation for improved network restorationBilevel “Defender–Attacker” Model with Multiple Attack ScenariosA bi-level programming model for protection of hierarchical facilities under imminent attacksA General Model and Efficient Algorithms for Reliable Facility Location Problem Under Uncertain DisruptionsEfficient Solution Methods for a General r-Interdiction Median Problem with FortificationA trilevel \(r\)-interdiction selective multi-depot vehicle routing problem with depot protectionA bilevel “Attacker–Defender” model to choosing the composition of attack meansPlanning a defense that minimizes a resource deficit in the worst-case scenario of supply network destructionAn iterative security game for computing robust and adaptive network flowsA stochastic programming model with endogenous and exogenous uncertainty for reliable network design under random disruptionDesigning robust coverage networks to hedge against worst-case facility lossesAlgorithms for a risk-averse Stackelberg game with multiple adversariesA novel algorithm for area traffic capacity control with elastic travel demandsThe budget constrained \(r\)-interdiction median problem with capacity expansionA survey on mixed-integer programming techniques in bilevel optimizationAn exact method for binary fortification gamesDistributionally risk‐receptive and risk‐averse network interdiction problems with general ambiguity setThe stochastic interdiction median problem with disruption intensity levelsDecision Rule Bounds for Two-Stage Stochastic Bilevel ProgramsOn engineering game theory with its application in power systemsOptimizing system resilience: a facility protection model with recovery timeClosest assignment constraints in discrete location problemsModels of the optimal resource allocation for the critical infrastructure protectionStrategies for protecting supply chain networks against facility and transportation disruptions: an improved Benders decomposition approachRecovery strategies from major supply disruptions in single and multiple sourcing networksAlgorithm for the N-2 Security-Constrained Unit Commitment Problem with Transmission SwitchingTerrorism deterrence in a two country framework: strategic interactions between R\&D, defense and pre-emptionFuzzy interdiction/fortification location problems on p-median systemsAn exact approach for the \(r\)-interdiction covering problem with fortificationSolving the traveling salesman problem with interdiction and fortificationA Brief Overview of Interdiction and Robust OptimizationAn adaptive robust framework for the optimization of the resilience of interdependent infrastructures under natural hazardsWireless LAN transmitter location under the threat of jamming attacksOptimizing fortification plan of capacitated facilities with maximum distance limitsNew models for the location of controversial facilities: a bilevel programming approachRadio communications interdiction problem under deterministic and probabilistic jammingImproved \(x\)-space algorithm for min-max bilevel problems with an application to misinformation spread in social networksStackelberg production-protection games: defending crop production against intentional attacksA mixed-integer bilevel programming approach for a competitive prioritized set covering problemAn analytical approach to the protection planning of a rail intermodal terminal networkAn implicit enumeration algorithm for the hub interdiction median problem with fortificationMultiple allocation hub interdiction and protection problems: model formulations and solution approachesAn exact solution approach for the interdiction median problem with fortificationIncorporating the threat of terrorist attacks in the design of public service facility networksA bilevel fixed charge location model for facilities under imminent attackAnalysis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortificationThe multi-terminal maximum-flow network-interdiction problemA defensive maximal covering problem on a networkHub interdiction problem variants: models and metaheuristic solution algorithmsReliable distribution networks design with nonlinear fortification functionBilevel multi-objective construction site security planning with twofold random phenomenonA multi-objective integrated facility location-hardening model: analyzing the pre- and post-disruption tradeoffAn exact algorithm for solving the bilevel facility interdiction and fortification problemRobust Defibrillator Deployment Under Cardiac Arrest Location Uncertainty via Row-and-Column GenerationThe Watermelon Algorithm for The Bilevel Integer Linear Programming ProblemA decomposition approach for stochastic shortest-path network interdiction with goal thresholdA Game Theoretic Model for the Optimal Location of Integrated Air Defense System Missile BatteriesA facility reliability problem: Formulation, properties, and algorithmTri-level mixed-binary linear programming: solution approaches and application in defending critical infrastructureMultilevel Approaches for the Critical Node ProblemAn exact approach for the r-interdiction median problem with fortificationComputing Feasible Points of Bilevel Problems with a Penalty Alternating Direction MethodA Unified Framework for Multistage Mixed Integer Linear OptimizationBilevel Optimization: Theory, Algorithms, Applications and a BibliographyA genetic algorithm using a finite search space for solving nonlinear/linear fractional bilevel programming problemsCore Pricing in Combinatorial Exchanges with Financially Constrained Buyers: Computational Hardness and Algorithmic Solutions



Cites Work