-
1
-
-
33947146473
-
Optimal resource allocation for security in reliability systems
-
DOI 10.1016/j.ejor.2006.03.057, PII S0377221706004747
-
Azaiez, M. N., V. M. Bier. 2007. Optimal resource allocation for security in reliability systems. Eur. J. Oper. Res. 181 773-786. (Pubitemid 46413583)
-
(2007)
European Journal of Operational Research
, vol.181
, Issue.2
, pp. 773-786
-
-
Azaiez, M.N.1
Bier, V.M.2
-
3
-
-
55349087256
-
Shortest-path network interdiction with asymmetric information
-
Bayrak, H., M. Bailey. 2008. Shortest-path network interdiction with asymmetric information. Networks 52(3) 133-140.
-
(2008)
Networks
, vol.52
, Issue.3
, pp. 133-140
-
-
Bayrak, H.1
Bailey, M.2
-
4
-
-
0034043026
-
A game theory approach to measuring the performance reliability of transport networks
-
DOI 10.1016/S0191-2615(99)00042-9, PII S0191261599000429
-
Bell, M. G. H. 2000. A game theoretic approach to measuring the performance reliability of transport networks. Transportation Res. Part B 34 533-545. (Pubitemid 30391132)
-
(2000)
Transportation Research Part B: Methodological
, vol.34
, Issue.6
, pp. 533-545
-
-
Bell, M.G.H.1
-
5
-
-
42549104510
-
Attacker-defender models and road network vulnerability
-
DOI 10.1098/rsta.2008.0019, PII 8655771850521640
-
Bell, M. G. H., U. Kanturska, J. D. Schmocker, A. Fonzone. 2008. Attacker-defender models and road network vulnerability. Philos. Trans. Roy. Soc. A 366 1893-1906. (Pubitemid 351585434)
-
(2008)
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences
, vol.366
, Issue.1872
, pp. 1893-1906
-
-
Bell, M.G.H.1
Kanturska, U.2
Schmocker, J.-D.3
Fonzone, A.4
-
6
-
-
33847360123
-
Methodology for identifying near-optimal interdiction strategies for a power transmission system
-
DOI 10.1016/j.ress.2006.08.007, PII S0951832006001712
-
Bier, V. M., E. R. Gratz, N. J. Haphuriwat, W. Magua, K. Wierzbicki. 2007. Methodology for identifying near-optimal interdiction strategies for a power transmission system. Reliability Engrg. System Safety 92 1155-1161. (Pubitemid 46341792)
-
(2007)
Reliability Engineering and System Safety
, vol.92
, Issue.9
, pp. 1155-1161
-
-
Bier, V.M.1
Gratz, E.R.2
Haphuriwat, N.J.3
Magua, W.4
Wierzbicki, K.R.5
-
7
-
-
33845439386
-
Defending critical infrastructure
-
DOI 10.1287/inte.1060.0252
-
Brown, G., M. Carlyle, J. Salmeron, K. Wood. 2006. Defending critical infrastructure. Interfaces 36(6) 530-544. (Pubitemid 44905062)
-
(2006)
Interfaces
, vol.36
, Issue.6
, pp. 530-544
-
-
Brown, G.1
Carlyle, M.2
Salmeron, J.3
Wood, K.4
-
8
-
-
33947208987
-
Protecting critical assets: The r-interdiction median problem with fortification
-
DOI 10.1111/j.1538-4632.2007.00698.x
-
Church, R. L., M. P. Scaparra. 2006. Protecting critical assets: The r-interdiction median problem with fortification. Geographical Anal. 39 129-146. (Pubitemid 46431805)
-
(2007)
Geographical Analysis
, vol.39
, Issue.2
, pp. 129-146
-
-
Church, R.L.1
Scaparra, M.P.2
-
9
-
-
26044461304
-
Identifying critical infrastructure: The median and covering facility interdiction problems
-
DOI 10.1111/j.1467-8306.2004.00410.x
-
Church, R. L., M. P. Scaparra, R. S. Middleton. 2004. Identifying critical infrastructure: The median and covering facility interdiction problems. Ann. Assoc. Amer. Geographers 94(3) 491-502. (Pubitemid 41716604)
-
(2004)
Annals of the Association of American Geographers
, vol.94
, Issue.3
, pp. 491-502
-
-
Church, R.L.1
Scaparra, M.P.2
Middleton, R.S.3
-
10
-
-
28344448992
-
Finding the most vital nodes in a flow network
-
Corely, H. W., H. Chang. 1974. Finding the most vital nodes in a flow network. Management Sci. 21(3) 362-364.
-
(1974)
Management Sci.
, vol.21
, Issue.3
, pp. 362-364
-
-
Corely, H.W.1
Chang, H.2
-
11
-
-
0020175509
-
Most vital links and nodes in weighted networks
-
Corely, H. W., D. Y. Sha. 1982. Most vital links and nodes in weighted networks. Oper. Res. Lett. 1(4) 157-160.
-
(1982)
Oper. Res. Lett.
, vol.1
, Issue.4
, pp. 157-160
-
-
Corely, H.W.1
Sha, D.Y.2
-
13
-
-
0042637230
-
-
Kluwer Academic Publishers, Dordrecht, The Netherlands
-
Dempe, S. 2002. Foundations of Bilevel Programming. Kluwer Academic Publishers, Dordrecht, The Netherlands.
-
(2002)
Foundations of Bilevel Programming
-
-
Dempe, S.1
-
14
-
-
36348981523
-
Solving the hazmat transport network design problem
-
DOI 10.1016/j.cor.2006.10.022, PII S0305054806002796, Selected Papers Presented at the ECCO'04 European Conference on Combinatorial Optimization
-
Erkut, E., F. Gzara. 2008. Solving the hazmat transport network design problem. Comput. Oper. Res. 35 2234-2247. (Pubitemid 350161136)
-
(2008)
Computers and Operations Research
, vol.35
, Issue.7
, pp. 2234-2247
-
-
Erkut, E.1
Gzara, F.2
-
15
-
-
0000096090
-
Maximizing the minimum source-sink path subject to a budget constraint
-
Fulkerson, D. R., G. C. Harding. 1977. Maximizing the minimum source-sink path subject to a budget constraint. Math. Programming 13 116-118.
-
(1977)
Math. Programming
, vol.13
, pp. 116-118
-
-
Fulkerson, D.R.1
Harding, G.C.2
-
16
-
-
50849106725
-
Nature plays with dice-Terrorists do not: Allocating resources to counter strategic versus probabilistic risks
-
Golany, B., E. H. Kaplan, A. Marmur, U. G. Rothblum. 2009. Nature plays with dice-Terrorists do not: Allocating resources to counter strategic versus probabilistic risks. Eur. J. Oper. Res. 192 198-208.
-
(2009)
Eur. J. Oper. Res.
, vol.192
, pp. 198-208
-
-
Golany, B.1
Kaplan, E.H.2
Marmur, A.3
Rothblum, U.G.4
-
17
-
-
0141444514
-
A problem of network interdiction
-
Golden, B. 1978. A problem of network interdiction. Naval Res. Logist. Quart. 25 711-713.
-
(1978)
Naval Res. Logist. Quart.
, vol.25
, pp. 711-713
-
-
Golden, B.1
-
18
-
-
35348950536
-
Strategic defense and attack for series and parallel reliability systems
-
DOI 10.1016/j.ejor.2007.02.013, PII S0377221707002214
-
Hausken, K. 2008. Strategic defense and attack for series and parallel reliability systems. Eur. J. Oper. Res. 186 856-881. (Pubitemid 47615325)
-
(2008)
European Journal of Operational Research
, vol.186
, Issue.2
, pp. 856-881
-
-
Hausken, K.1
-
19
-
-
18744366655
-
A decomposition algorithm applied to planning the interdiction of stochastic networks
-
DOI 10.1002/nav.20079
-
Held, H., R. Hemmecke, D. L. Woodruff. 2005. A decomposition algorithm applied to planning the interdiction of stochastic networks. Naval Res. Logist. 52 321-328. (Pubitemid 40666210)
-
(2005)
Naval Research Logistics
, vol.52
, Issue.4
, pp. 321-328
-
-
Held, H.1
Hemmecke, R.2
Woodruff, D.L.3
-
20
-
-
84888816149
-
Interdicting stochastic networks with binary interdiction effort
-
D. L. Woodruff, ed, Kluwer, Boston
-
Hemmecke, R., R. Schultz, D. L. Woodruff. 2003. Interdicting stochastic networks with binary interdiction effort. D. L. Woodruff, ed. Network Interdiction and Stochastic Integer Programming. Kluwer, Boston, 69-84.
-
(2003)
Network Interdiction and Stochastic Integer Programming
, pp. 69-84
-
-
Hemmecke, R.1
Schultz, R.2
Woodruff, D.L.3
-
21
-
-
33947365606
-
Evaluating strategies for defending electric power networks against antagonistic attacks
-
DOI 10.1109/TPWRS.2006.889080
-
Holmgren, A. J., E. Jenelius, J. Westin. 2007. Evaluating strategies for defending electric power networks against antagonistic attacks. IEEE Trans. Power Systems 22(1) 76-84. (Pubitemid 46442139)
-
(2007)
IEEE Transactions on Power Systems
, vol.22
, Issue.1
, pp. 76-84
-
-
Holmgren, A.J.1
Jenelius, E.2
Westin, J.3
-
22
-
-
0141764679
-
Shortest-Path Network Interdiction
-
DOI 10.1002/net.10039
-
Israeli, E., R. K. Wood. 2002. Shortest-path network interdiction. Networks 40(2) 97-111. (Pubitemid 37218345)
-
(2002)
Networks
, vol.40
, Issue.2
, pp. 97-111
-
-
Israeli, E.1
Wood, R.K.2
-
24
-
-
3042532168
-
Designing a road network for hazardous materials transportation
-
Kara, B. Y., V. Verter. 2004. Designing a road network for hazardous materials transportation. Transportation Sci. 38 188-196.
-
(2004)
Transportation Sci.
, vol.38
, pp. 188-196
-
-
Kara, B.Y.1
Verter, V.2
-
25
-
-
0032295962
-
A bilevel model of taxation and its application to optimal highway pricing
-
Labbé, M., P. Marcotte, G. Savard. 1998. A bilevel model of taxation and its application to optimal highway pricing. Management Sci. 44(12) 1608-1622. (Pubitemid 128617774)
-
(1998)
Management Science
, vol.44
, Issue.12 PART 1
, pp. 1608-1622
-
-
Labbe, M.1
Marcotte, P.2
Savard, G.3
-
26
-
-
78049418283
-
Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification
-
Liberatore, F., M. P. Scaparra, M. Daskin. 2011. Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification. Comput. Oper. Res. 38 351-366.
-
(2011)
Comput. Oper. Res.
, vol.38
, pp. 351-366
-
-
Liberatore, F.1
Scaparra, M.P.2
Daskin, M.3
-
27
-
-
33750618042
-
Algorithms for discrete and continuous multicommodity flow network interdiction problems
-
DOI 10.1080/07408170600729192, PII P293574058K08142
-
Lim, C., J. C. Smith. 2007. Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans. 39(1) 15-26. (Pubitemid 44688388)
-
(2007)
IIE Transactions (Institute of Industrial Engineers)
, vol.39
, Issue.1
, pp. 15-26
-
-
Lim, C.1
Smith, J.C.2
-
28
-
-
0024716461
-
The k most vital arcs in the shortest path problem
-
Malik, K., A. K. Mittal, S. K. Gupta. 1989. The k most vital arcs in the shortest path problem. Oper. Res. Lett. 8 223-227.
-
(1989)
Oper. Res. Lett.
, vol.8
, pp. 223-227
-
-
Malik, K.1
Mittal, A.K.2
Gupta, S.K.3
-
29
-
-
0042639544
-
A new shortest path ranking algorithm
-
Martins, E. Q. V., J. L. E. Santos. 2000. A new shortest path ranking algorithm. Investigação Oper. 20(1) 47-62.
-
(2000)
Investigação Oper.
, vol.20
, Issue.1
, pp. 47-62
-
-
Martins, E.Q.V.1
Santos, J.L.E.2
-
30
-
-
33751078297
-
Methodology for ranking the elements of water-supply networks
-
DOI 10.1061/(ASCE)1076-0342(2006)12:4(230)
-
Michaud, D. E., G. E. Apostolakis. 2006. A methodology for ranking the elements of water-supply networks. J. Infrastructure Systems 12 230-242. (Pubitemid 44768337)
-
(2006)
Journal of Infrastructure Systems
, vol.12
, Issue.4
, pp. 230-242
-
-
Michaud, D.1
Apostolakis, G.E.2
-
31
-
-
0025488373
-
The mixed-integer linear bilevel programming problem
-
Moore, J. T., J. F. Bard. 1990. The mixed-integer linear bilevel programming problem. Oper. Res. 38 911-921.
-
(1990)
Oper. Res.
, vol.38
, pp. 911-921
-
-
Moore, J.T.1
Bard, J.F.2
-
32
-
-
33750633005
-
Allocating security resources to a water supply network
-
DOI 10.1080/07408170600865400, PII P7342128217V225L
-
Qiao, J., D. Jeong, M. Lawley, J. P. Richard, D. M. Abraham, Y. Yih. 2007. Allocating security resources to a water supply network. IIE Trans. 39 95-109. (Pubitemid 44688394)
-
(2007)
IIE Transactions (Institute of Industrial Engineers)
, vol.39
, Issue.1
, pp. 95-109
-
-
Qiao, J.1
Jeong, D.2
Lawley, M.3
Richard, J.-P.P.4
Abraham, D.M.5
Yih, Y.6
-
33
-
-
2542628960
-
Analysis of electric grid security under terrorist threat
-
Salmeron, J., R. K. Wood, R. Baldick. 2004. Analysis of electric grid security under terrorist threat. IEEE Trans. Power Systems 19(2) 905-912.
-
(2004)
IEEE Trans. Power Systems
, vol.19
, Issue.2
, pp. 905-912
-
-
Salmeron, J.1
Wood, R.K.2
Baldick, R.3
-
34
-
-
60149091834
-
Worst-case interdiction analysis of large-scale electric power grids
-
Salmeron, J., K. Wood, R. Baldick. 2009. Worst-case interdiction analysis of large-scale electric power grids. IEEE Trans. Power Systems 24 96-104.
-
(2009)
IEEE Trans. Power Systems
, vol.24
, pp. 96-104
-
-
Salmeron, J.1
Wood, K.2
Baldick, R.3
-
35
-
-
35348951490
-
A bilevel mixed-integer program for critical infrastructure protection planning
-
DOI 10.1016/j.cor.2006.09.019, PII S0305054806002395
-
Scaparra, M. P., R. L. Church. 2008a. A bilevel mixed integer program for critical infrastructure protection planning. Comput. Oper. Res. 35 1905-1923. (Pubitemid 47615235)
-
(2008)
Computers and Operations Research
, vol.35
, Issue.6
, pp. 1905-1923
-
-
Scaparra, M.P.1
Church, R.L.2
-
36
-
-
38949181266
-
An exact solution approach for the interdiction median problem with fortification
-
DOI 10.1016/j.ejor.2007.05.027, PII S037722170700505X
-
Scaparra, M. P., R. L. Church. 2008b. An exact solution approach for the interdiction median problem with fortification. Eur. J. Oper. Res. 189 76-92. (Pubitemid 351232143)
-
(2008)
European Journal of Operational Research
, vol.189
, Issue.1
, pp. 76-92
-
-
Scaparra, M.P.1
Church, R.L.2
-
37
-
-
33646550868
-
Network robustness index: A new method for identifying critical links and evaluating the performance of transportation networks
-
Scott, D. M., D. C. Novak, L. Aultman-Hall, F. Guo. 2006. Network robustness index: A new method for identifying critical links and evaluating the performance of transportation networks. J. Transport Geography 14 215-227.
-
(2006)
J. Transport Geography
, vol.14
, pp. 215-227
-
-
Scott, D.M.1
Novak, D.C.2
Aultman-Hall, L.3
Guo, F.4
-
38
-
-
34247625594
-
Survivable network design under optimal and heuristic interdiction scenarios
-
DOI 10.1007/s10898-006-9067-3, Special Issue Go05, Proceedings from the Workshop on Global Optimization, San Jose, Almeria, Spain, 18-22 September 2005
-
Smith, J. C., C. Lim, F. Sudargho. 2007. Survivable network design under optimal and heuristic interdiction scenarios. J. Global Optim. 38 181-199. (Pubitemid 46686127)
-
(2007)
Journal of Global Optimization
, vol.38
, Issue.2
, pp. 181-199
-
-
Smith, J.C.1
Lim, C.2
Sudargho, F.3
-
39
-
-
70350362609
-
Meeting the challenge of facility protection for homeland security
-
Sternberg, E., G. Lee. 2006. Meeting the challenge of facility protection for homeland security. J. Homeland Security Emergency Management 3(1) 1-19.
-
(2006)
J. Homeland Security Emergency Management
, vol.3
, Issue.1
, pp. 1-19
-
-
Sternberg, E.1
Lee, G.2
-
40
-
-
0009075090
-
Removing arcs from a network
-
Wollmer, R. 1964. Removing arcs from a network. Oper. Res. 12(6) 934-940.
-
(1964)
Oper. Res.
, vol.12
, Issue.6
, pp. 934-940
-
-
Wollmer, R.1
-
41
-
-
38549098290
-
Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
-
DOI 10.1287/opre.1070.0434
-
Zhuang, J., V. M. Bier. 2007. Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort. Oper. Res. 55(5) 976-991. (Pubitemid 351159542)
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
|