-
1
-
-
0003515463
-
-
Prentice-Hall Englewood Cliffs, NJ
-
Ahuja, R., Magnanti, T. and Orlin, J. (1993) Network Flows: Theory, Algorithms, andApplications, Prentice-Hall, Englewood Cliffs, NJ.
-
(1993)
Network Flows: Theory, Algorithms, AndApplications
-
-
Ahuja, R.1
Magnanti, T.2
Orlin, J.3
-
2
-
-
80052202284
-
The budget constrained r-interdiction median problem with capacity expansion
-
Aksen, D., Piyade, N. and Aras, N. (2009) 'The budget constrained r-interdiction median problem with capacity expansion', Central European Journal of Operations Research, pp.1-23.
-
(2009)
Central European Journal of Operations Research
, pp. 1-23
-
-
Aksen, D.1
Piyade, N.2
Aras, N.3
-
3
-
-
0034721164
-
Error and attack tolerance of complex networks
-
DOI 10.1038/35019019
-
Albert, R., Jeong, H. and Barabasi, A. (2000) 'Error and attack tolerance of complex networks', Nature, Vol. 406, No. 6794, pp.378-382. (Pubitemid 30625551)
-
(2000)
Nature
, vol.406
, Issue.6794
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.-L.3
-
4
-
-
61449135136
-
Catching the 'network science' bug: Insight and opportunity for the operations researcher
-
Alderson, D.L. (2008) 'Catching the 'network science' bug: insight and opportunity for the operations researcher', OperationsResearch, Vol. 56, No. 5, pp.1047-1065.
-
(2008)
OperationsResearch
, vol.56
, Issue.5
, pp. 1047-1065
-
-
Alderson, D.L.1
-
5
-
-
0040809275
-
Optimizing restoration capacity in the AT&T network
-
Ambs, K., Cwilich, S., Deng, M., Houck, D., Lynch, D. and Yan, D. (2000) 'Optimizing restoration capacity in the AT&T network', Interfaces, Vol. 30, No. 1, pp.26-44.
-
(2000)
Interfaces
, vol.30
, Issue.1
, pp. 26-44
-
-
Ambs, K.1
Cwilich, S.2
Deng, M.3
Houck, D.4
Lynch, D.5
Yan, D.6
-
6
-
-
33947146473
-
Optimal resource allocation for security in reliability systems
-
DOI 10.1016/j.ejor.2006.03.057, PII S0377221706004747
-
Azaiez, M. and Bier, V. (2007) 'Optimal resource allocation for security in reliability systems', European Journal ofOperationalResearch, Vol. 181, No. 2, pp.773-786. (Pubitemid 46413583)
-
(2007)
European Journal of Operational Research
, vol.181
, Issue.2
, pp. 773-786
-
-
Azaiez, M.N.1
Bier, V.M.2
-
7
-
-
0035563882
-
Telecommunication Link Restoration Planning with Multiple Facility Types
-
DOI 10.1023/A:1014509708610
-
Balakrishnan, A., Magnanti, T. and Sokol, J. (2001) 'Telecommunication link restoration planning with multiple facility types', Annals of Operations Research, Vol. 106, pp.127-154. (Pubitemid 33637489)
-
(2001)
Annals of Operations Research
, vol.106
, Issue.1-4
, pp. 127-154
-
-
Balakrishnan, A.1
Magnanti, T.L.2
Sokol, J.S.3
Wang, Y.4
-
8
-
-
0036656498
-
Spare-capacity assignment for line restoration using a single-facility type
-
Balakrishnan, A., Magnanti, T.L., Sokol, J.S. and Wang, Y. (2002) 'Spare-capacity assignment for line restoration using a single-facility type', Operations Research, Vol. 50, No. 4, pp.617-635.
-
(2002)
Operations Research
, vol.50
, Issue.4
, pp. 617-635
-
-
Balakrishnan, A.1
Magnanti, T.L.2
Sokol, J.S.3
Wang, Y.4
-
9
-
-
0038483826
-
Emergence of scaling in random networks
-
Barabasi, A-L. and Albert, R. (1999) 'Emergence of scaling in random networks', Science, Vol. 286, No. 5439, pp.509-612.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-612
-
-
Barabasi, A.-L.1
Albert, R.2
-
10
-
-
24644485947
-
Improving network robustness by edge modification
-
DOI 10.1016/j.physa.2005.03.040, PII S0378437105003523
-
Beygelzimer, A., Grinstein, G., Linsker, R. and Rish, I. (2005) 'Improving network robustness by edge modification', Physica A: Statistical Mechanics and its Applications, Vol. 357, Nos. 3-4, pp.593-612. (Pubitemid 41285211)
-
(2005)
Physica A: Statistical Mechanics and its Applications
, vol.357
, Issue.3-4
, pp. 593-612
-
-
Beygelzimer, A.1
Grinstein, G.2
Linsker, R.3
Rish, I.4
-
11
-
-
0242333891
-
Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries
-
Santa Barbara, California, 3-8 November
-
Bier, V. and Abhichandani, V. (2003) 'Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries', in Risk-based Decision Making in Water Resources X: Proceedings of the Tenth Conference, American Society of Civil Engineers, Santa Barbara, California, 3-8 November, p.59
-
(2003)
Risk-based Decision Making in Water Resources X: Proceedings of the Tenth Conference, American Society of Civil Engineers
, pp. 59
-
-
Bier, V.1
Abhichandani, V.2
-
12
-
-
9444279581
-
Protection of simple series and parallel systems with components of different values
-
Bier, V. M., Nagaraj, A. and Abhichandani, V. (2005) 'Protection of simple series and parallel systems with components of different values', Reliability Engineering and System Safety, Vol. 87, No. 3, pp.315-323.
-
(2005)
Reliability Engineering and System Safety
, vol.87
, Issue.3
, pp. 315-323
-
-
Bier, V.M.1
Nagaraj, A.2
Abhichandani, V.3
-
13
-
-
55349118446
-
Why both game theory and reliability theory are important in defending infrastructure against intelligent attacks
-
Springer
-
Bier, V., Cox, L. and Azaiez, M. (2009) 'Why both game theory and reliability theory are important in defending infrastructure against intelligent attacks', in Game Theoretic RiskAnalysis of Security Threats, Springer.
-
(2009)
Game Theoretic RiskAnalysis of Security Threats
-
-
Bier, V.1
Cox, L.2
Azaiez, M.3
-
14
-
-
33847360123
-
Methodology for identifying near-optimal interdiction strategies for a power transmission system
-
DOI 10.1016/j.ress.2006.08.007, PII S0951832006001712
-
Bier, V., Gratz, E., Haphuriwat, N., Magua, W. and Wierzbicki, K. (2007a) 'Methodology for identifying near-optimal interdiction strategies for a power transmission system', Reliability Engineering andSystem Safety, Vol. 92, No. 9, pp.1155-1161. (Pubitemid 46341792)
-
(2007)
Reliability Engineering and System Safety
, vol.92
, Issue.9
, pp. 1155-1161
-
-
Bier, V.M.1
Gratz, E.R.2
Haphuriwat, N.J.3
Magua, W.4
Wierzbicki, K.R.5
-
15
-
-
34547641190
-
Choosing what to protect: Strategic defensive allocation against an unknown attacker
-
Bier, V., Oliveros, S. and Samuelson, L. (2007b) 'Choosing what to protect: strategic defensive allocation against an unknown attacker', Journal of Public Economic Theory, Vol. 9, No. 4, p.563.
-
(2007)
Journal of Public Economic Theory
, vol.9
, Issue.4
, pp. 563
-
-
Bier, V.1
Oliveros, S.2
Samuelson, L.3
-
16
-
-
34447325155
-
Choosing what to protect
-
DOI 10.1111/j.1539-6924.2007.00906.x
-
Bier, V.M. (2007) 'Choosing what to protect', Risk Analysis, Vol. 27, No. 3, pp.607-620. (Pubitemid 47063172)
-
(2007)
Risk Analysis
, vol.27
, Issue.3
, pp. 607-620
-
-
Bier, V.M.1
-
17
-
-
45349092442
-
Optimal resource allocation for defense of targets based on differing measures of attractiveness
-
DOI 10.1111/j.1539-6924.2008.01053.x
-
Bier, V.M., Haphuriwat, N., Menoyo, J., Zimmerman, R. and Culpen, A.M. (2008) 'Optimal resource allocation for defense of targets based on differing measures of attractiveness', Risk Analysis, Vol. 28, No. 3, pp.763-770. (Pubitemid 351847236)
-
(2008)
Risk Analysis
, vol.28
, Issue.3
, pp. 763-770
-
-
Bier, V.M.1
Haphuriwat, N.2
Menoyo, J.3
Zimmerman, R.4
Culpen, A.M.5
-
19
-
-
33845397295
-
Analyzing the vulnerability of critical infrastructure to attack and planning defenses
-
in J.C. Smith (Ed.) INFORMS, Baltimore, MD
-
Brown, G., Carlyle, M., Salmerffon, J. and Wood, K. (2005) 'Analyzing the vulnerability of critical infrastructure to attack and planning defenses', in J.C. Smith (Ed.): INFORMS Tutorials in OperationsResearch, pp.102-123, INFORMS, Baltimore, MD.
-
(2005)
INFORMS Tutorials in OperationsResearch
, pp. 102-123
-
-
Brown, G.1
Carlyle, M.2
Salmerffon, J.3
Wood, K.4
-
21
-
-
77951126500
-
Catastrophic cascade of failures in interdependent networks
-
Buldyrev, S., Parshani, R., Paul, G., Stanley, H. and Havlin, S. (2010) 'Catastrophic cascade of failures in interdependent networks', Nature, Vol. 464, No. 7291, pp.1025-1028.
-
(2010)
Nature
, vol.464
, Issue.7291
, pp. 1025-1028
-
-
Buldyrev, S.1
Parshani, R.2
Paul, G.3
Stanley, H.4
Havlin, S.5
-
22
-
-
79951870675
-
Optimal allocation ofprotective resources in shortest-path networks
-
to appear
-
Cappanera, P. and Scaparra, M. (to appear) 'Optimal allocation ofprotective resources in shortest-path networks', Transportation Science.
-
Transportation Science
-
-
Cappanera, P.1
Scaparra, M.2
-
23
-
-
77951108650
-
Infrastructure resilience to disasters
-
Chang, S.E. (2009) 'Infrastructure resilience to disasters', The Bridge, Vol. 39, No. 4, pp.36-41.
-
(2009)
The Bridge
, vol.39
, Issue.4
, pp. 36-41
-
-
Chang, S.E.1
-
24
-
-
23944522861
-
Building edge-failure resilient networks
-
DOI 10.1007/s00453-005-1156-z
-
Chekuri, C., Gupta, A., Kumar, A., Naor, J. and Raz, D. (2005) 'Building edge-failure resilient networks', Algorithmica, Vol. 43, Nos. 1-2, pp.17-41. (Pubitemid 41203680)
-
(2005)
Algorithmica (New York)
, vol.43
, Issue.1-2
, pp. 17-41
-
-
Chekuri, C.1
Gupta, A.2
Kumar, A.3
Naor, J.4
Raz, D.5
-
25
-
-
0347126414
-
COBRA: A New Formulation of the Classic p-Median Location Problem
-
DOI 10.1023/A:1026142406234
-
Church, R. (2003) 'COBRA: a new formulation of the classic p-median location problem', Annals of Operations Research, Vol. 122, No. 1, pp.103-120. (Pubitemid 38103393)
-
(2003)
Annals of Operations Research
, vol.122
, Issue.1-4
, pp. 103-120
-
-
Church, R.L.1
-
26
-
-
0345427032
-
The maximal covering location problem
-
Church, R. and ReVelle, C. (1974) 'The maximal covering location problem', Papers in Regional Science, Vol. 32, No. 1, pp.101-118.
-
(1974)
Papers in Regional Science
, vol.32
, Issue.1
, pp. 101-118
-
-
Church, R.1
Revelle, C.2
-
27
-
-
33947208987
-
Protecting critical assets: The r-interdiction median problem with fortification
-
DOI 10.1111/j.1538-4632.2007.00698.x
-
Church, R. and Scaparra, M. (2007) 'Protecting critical assets: the r-interdiction median problem with fortification', Geographical Analysis, Vol. 39, No. 2, pp.129-146. (Pubitemid 46431805)
-
(2007)
Geographical Analysis
, vol.39
, Issue.2
, pp. 129-146
-
-
Church, R.L.1
Scaparra, M.P.2
-
28
-
-
37349126379
-
Analysis of facility systems reliability when subject to attack or a natural disaster
-
in A.T. Murray and T.H. Grubesic (Eds.) Chapter 11, Springer-Verlag, Berlin, Germany
-
Church, R.L. and Scaparra, M.P. (2006) 'Analysis of facility systems reliability when subject to attack or a natural disaster', in A.T. Murray and T.H. Grubesic (Eds.): Critical Infrastructure: Reliability and Vulnerability, pp.221-241, Chapter 11, Springer-Verlag, Berlin, Germany
-
(2006)
Critical Infrastructure: Reliability and Vulnerability
, pp. 221-241
-
-
Church, R.L.1
Scaparra, M.P.2
-
29
-
-
26044461304
-
Identifying critical infrastructure: The median and covering facility interdiction problems
-
DOI 10.1111/j.1467-8306.2004.00410.x
-
Church, R., Scaparra, M. and Middleton, R. (2004) 'Identifying critical infrastructure: the median and covering facility interdiction problems', Annals of the Association of American Geographers, Vol. 94, No. 3, pp.491-502. (Pubitemid 41716604)
-
(2004)
Annals of the Association of American Geographers
, vol.94
, Issue.3
, pp. 491-502
-
-
Church, R.L.1
Scaparra, M.P.2
Middleton, R.S.3
-
30
-
-
28344448992
-
Finding the n most vital nodes in a flow network
-
Corley H.W., Jr. and Chang, H. (1974) 'Finding the n most vital nodes in a flow network', Management Science, Vol. 21, No. 3, pp.362-364.
-
(1974)
Management Science
, vol.21
, Issue.3
, pp. 362-364
-
-
Corley Jr., H.W.1
Chang, H.2
-
31
-
-
42749099510
-
Reinforcing the resilience of complex networks
-
Costa, L.D. (2004) 'Reinforcing the resilience of complex networks', Phys. Rev. E, Vol. 69, No. 6, pp.066127-1-066127-7.
-
(2004)
Phys. Rev. e
, vol.69
, Issue.6
, pp. 0661271-0661277
-
-
Costa, L.D.1
-
32
-
-
77955879952
-
Reliable facility location under the risk of disruptions
-
Cui, T., Ouyang, Y. and Shen, Z. (to appear) 'Reliable facility location under the risk of disruptions', Operations Research.
-
Operations Research
-
-
Cui, T.1
Ouyang, Y.2
Shen, Z.3
-
34
-
-
33646417635
-
Vulnerability of weighted networks
-
DallAsta, L., Barrat, A., Barthelemy, M. and Vespignani, A. (2006) 'Vulnerability of weighted networks', Journal of Statistical Mechanics: Theory and Experiment, Vol. 2006, No. 4, p.04006.
-
(2006)
Journal of Statistical Mechanics: Theory and Experiment
, vol.2006
, Issue.4
, pp. 04006
-
-
Dallasta, L.1
Barrat, A.2
Barthelemy, M.3
Vespignani, A.4
-
35
-
-
0020707868
-
A maximum expected covering location model: Formulation, properties and heuristic solution
-
Daskin, M. (1983) 'A maximum expected covering location model: formulation, properties and heuristic solution', Transportation Science, Vol. 17, No. 1, pp.48-70. (Pubitemid 13509846)
-
(1983)
Transportation Science
, vol.17
, Issue.1
, pp. 48-70
-
-
Daskin Mark, S.1
-
37
-
-
64549092443
-
Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence
-
Dighe, N., Zhuang, J. and Bier, V. (2009) 'Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence', International Journal ofPerformability Engineering, Vol. 5, No. 1, pp.31-43.
-
(2009)
International Journal OfPerformability Engineering
, vol.5
, Issue.1
, pp. 31-43
-
-
Dighe, N.1
Zhuang, J.2
Bier, V.3
-
38
-
-
72049099088
-
A model for supply chain critical facility protection planning based on time satisfaction
-
Dong, L., Xing-hua, K. and Xiang-tao, Y. (2009) 'A model for supply chain critical facility protection planning based on time satisfaction', in Proceedings of the 2009 Second International Conference on Intelligent Computation Technology and Automation, EEE Computer Society Vol. 3, pp.903-906.
-
(2009)
Proceedings of the 2009 Second International Conference on Intelligent Computation Technology and Automation, EEE Computer Society
, vol.3
, pp. 903-906
-
-
Dong, L.1
Xing-Hua, K.2
Xiang-Tao, Y.3
-
39
-
-
0001540595
-
On random graphs
-
Erdos, P. and Renyi, A. (1959) On random graphs', Publicationes Mathematicae Debrecen, Vol. 6, Nos. 290-297, p.156.
-
(1959)
Publicationes Mathematicae Debrecen
, vol.6
, Issue.290-297
, pp. 156
-
-
Erdos, P.1
Renyi, A.2
-
40
-
-
50849106725
-
Nature plays with dice-terrorists do not: Allocating resources to counter strategic versus probabilistic risks
-
Golany, B., Kaplan, E., Marmur, A. and Rothblum, U. (2009) 'Nature plays with dice-terrorists do not: allocating resources to counter strategic versus probabilistic risks', European Journal of Operational Research, Vol. 192, No. 1, pp.198-208.
-
(2009)
European Journal of Operational Research
, vol.192
, Issue.1
, pp. 198-208
-
-
Golany, B.1
Kaplan, E.2
Marmur, A.3
Rothblum, U.4
-
41
-
-
0032592961
-
The IEEE reliability test system-1996 A report prepared by the reliability test system task force of the application ofprobability methods subcommittee
-
Grigg, C., Wong, P., Albrecht, P., Allan, R., Bhavaraju, M., Billinton, R., Chen, Q., Fong, C., Haddad, S., Kuruganty S. et al. (1999) 'The IEEE reliability test system-1996. A report prepared by the reliability test system task force of the application ofprobability methods subcommittee', IEEE Transactions on Power Systems, Vol. 14, No. 3, pp.1010-1020.
-
(1999)
IEEE Transactions on Power Systems
, vol.14
, Issue.3
, pp. 1010-1020
-
-
Grigg, C.1
Wong, P.2
Albrecht, P.3
Allan, R.4
Bhavaraju, M.5
Billinton, R.6
Chen, Q.7
Fong, C.8
Haddad, S.9
Kuruganty, S.10
-
42
-
-
37349097109
-
Comparative approaches for assessing network vulnerability
-
Grubesic, T., Matisziw, T., Murray A. and Snediker, D. (2008) 'Comparative approaches for assessing network vulnerability', International Regional Science Review, Vol. 31, No. 1, p.88.
-
(2008)
International Regional Science Review
, vol.31
, Issue.1
, pp. 88
-
-
Grubesic, T.1
Matisziw, T.2
Murray, A.3
Snediker, D.4
-
43
-
-
0036202354
-
Probabilistic Risk Analysis and game theory
-
DOI 10.1111/0272-4332.t01-1-00002
-
Hausken, K. (2002) 'Probabilistic risk analysis and game theory', Risk Analysis, Vol. 22, No. 1, pp.17-27. (Pubitemid 34262684)
-
(2002)
Risk Analysis
, vol.22
, Issue.1
, pp. 17-27
-
-
Hausken, K.1
-
45
-
-
35348950536
-
Strategic defense and attack for series and parallel reliability systems
-
DOI 10.1016/j.ejor.2007.02.013, PII S0377221707002214
-
Hausken, K. (2008a) 'Strategic defense and attack for series and parallel reliability systems', European Journal ofOperational Research, Vol. 186, No. 2, pp.856-881. (Pubitemid 47615325)
-
(2008)
European Journal of Operational Research
, vol.186
, Issue.2
, pp. 856-881
-
-
Hausken, K.1
-
46
-
-
44349153674
-
Strategic defense and attack for reliability systems
-
Hausken, K. (2008b) 'Strategic defense and attack for reliability systems', Reliability Engineering andSystem Safety, Vol. 93, No. 11, pp.1740-1750.
-
(2008)
Reliability Engineering AndSystem Safety
, vol.93
, Issue.11
, pp. 1740-1750
-
-
Hausken, K.1
-
47
-
-
60249102243
-
Protection vs. false targets in series systems
-
Hausken, K. and Levitin, G. (2009a) 'Protection vs. false targets in series systems', Reliability Engineering andSystem Safety, Vol. 94, No. 59, pp.73-81.
-
(2009)
Reliability Engineering AndSystem Safety
, vol.94
, Issue.59
, pp. 73-81
-
-
Hausken, K.1
Levitin, G.2
-
48
-
-
84954516300
-
Defending against terrorism, natural disaster, and all hazards
-
Springer, New York
-
Hausken, K., Bier, V. and Zhuang, J. (2009) 'Defending against terrorism, natural disaster, and all hazards', Game Theoretic Risk Analysis of Security Threats, Springer, New York, pp.65-97.
-
(2009)
Game Theoretic Risk Analysis of Security Threats
, pp. 65-97
-
-
Hausken, K.1
Bier, V.2
Zhuang, J.3
-
49
-
-
33947365606
-
Evaluating strategies for defending electric power networks against antagonistic attacks
-
DOI 10.1109/TPWRS.2006.889080
-
Holmgren, A.J., Jenelius, E. and Westin, J. (2007) 'Evaluating strategies for defending electric power networks against antagonistic attacks', IEEE Transactions on Power Systems, Vol. 22, No. 1, pp.76-84. (Pubitemid 46442139)
-
(2007)
IEEE Transactions on Power Systems
, vol.22
, Issue.1
, pp. 76-84
-
-
Holmgren, A.J.1
Jenelius, E.2
Westin, J.3
-
51
-
-
0141764679
-
Shortest-Path Network Interdiction
-
DOI 10.1002/net.10039
-
Israeli, E. and Wood, R. (2002) 'Shortest-path network interdiction', Networks, Vol. 40, No. 2, pp.97-111. (Pubitemid 37218345)
-
(2002)
Networks
, vol.40
, Issue.2
, pp. 97-111
-
-
Israeli, E.1
Wood, R.K.2
-
52
-
-
77950923705
-
Critical infrastructure protection under imperfect attacker perception
-
Jenelius, E., Westin, J. and Holmgren, J. (2010) 'Critical infrastructure protection under imperfect attacker perception', International Journal of Critical Infrastructure Protection, Vol. 3, No. 1, pp.16-26.
-
(2010)
International Journal of Critical Infrastructure Protection
, vol.3
, Issue.1
, pp. 16-26
-
-
Jenelius, E.1
Westin, J.2
Holmgren, J.3
-
53
-
-
34250197515
-
A decomposition approach for spare capacity assignment for path restorable mesh networks
-
Kennington, J., Nair, V. and Spiride, G. (2007a) 'A decomposition approach for spare capacity assignment for path restorable mesh networks', International Journal of Computers and Applications, Vol. 29, No. 2, pp.170-179.
-
(2007)
International Journal of Computers and Applications
, vol.29
, Issue.2
, pp. 170-179
-
-
Kennington, J.1
Nair, V.2
Spiride, G.3
-
54
-
-
33847049932
-
Basic mathematical programming models for capacity allocation in mesh-based survivable networks
-
Kennington, J., Olinick, E. and Spiride, G. (2007b) 'Basic mathematical programming models for capacity allocation in mesh-based survivable networks', Omega, Vol. 35, No. 6, pp.629-644.
-
(2007)
Omega
, vol.35
, Issue.6
, pp. 629-644
-
-
Kennington, J.1
Olinick, E.2
Spiride, G.3
-
55
-
-
0032189392
-
Economic spare capacity planning for DCS mesh-restorable networks
-
PII S0377221797001999
-
Lee, K., Park, K., Park, S. and Lee, H. (1998) 'Economic spare capacity planning for DCS mesh-restorable networks', European Journal of Operational Research, Vol. 110, No. 1, pp.63-75. (Pubitemid 128401884)
-
(1998)
European Journal of Operational Research
, vol.110
, Issue.1
, pp. 63-75
-
-
Lee, K.1
Park, K.2
Park, S.3
Heesang, L.4
-
56
-
-
43249094557
-
Protection vs. redundancy in homogeneous parallel systems
-
Levitin, G. and Hausken, K. (2008) 'Protection vs. redundancy in homogeneous parallel systems', Reliability Engineering and System Safety, Vol. 93, No. 10, pp.1444-1451.
-
(2008)
Reliability Engineering and System Safety
, vol.93
, Issue.10
, pp. 1444-1451
-
-
Levitin, G.1
Hausken, K.2
-
57
-
-
67949103527
-
Meeting a demand vs. enhancing protections in homogeneous parallel systems
-
Levitin, G. and Hausken, K. (2009a) 'Meeting a demand vs. enhancing protections in homogeneous parallel systems', Reliability Engineering and System Safety, Vol. 94, No. 11, pp.1711-1717.
-
(2009)
Reliability Engineering and System Safety
, vol.94
, Issue.11
, pp. 1711-1717
-
-
Levitin, G.1
Hausken, K.2
-
58
-
-
54049120572
-
False targets vs. redundancy in homogeneous parallel systems
-
Levitin, G. and Hausken, K. (2009b) 'False targets vs. redundancy in homogeneous parallel systems', Reliability Engineering and System Safety, Vol. 94, No. 2, pp.588-595.
-
(2009)
Reliability Engineering and System Safety
, vol.94
, Issue.2
, pp. 588-595
-
-
Levitin, G.1
Hausken, K.2
-
59
-
-
63149134856
-
Redundancy vs. protection vs. false targets for systems under attack
-
Levitin, G. and Hausken, K. (2009c) 'Redundancy vs. protection vs. false targets for systems under attack', IEEE Transactions on Reliability, Vol. 58, No. 1, pp.58-68.
-
(2009)
IEEE Transactions on Reliability
, vol.58
, Issue.1
, pp. 58-68
-
-
Levitin, G.1
Hausken, K.2
-
60
-
-
78049418283
-
Analysis offacility protection strategies against uncertain numbers of attacks: The stochastic r-interdiction median problem with fortification
-
Liberatore, F., Scaparra, M. and Daskin, M. (2011) 'Analysis offacility protection strategies against uncertain numbers of attacks: the stochastic r-interdiction median problem with fortification', Computers andOperations Research, Vol. 38, No. 1, pp.357-366.
-
(2011)
Computers AndOperations Research
, vol.38
, Issue.1
, pp. 357-366
-
-
Liberatore, F.1
Scaparra, M.2
Daskin, M.3
-
61
-
-
75149122009
-
A facility reliability problem: Formulation, properties, and algorithm
-
Lim, M., Daskin, M., Chopra, S. and Bassamboo, A. (2010a) 'A facility reliability problem: formulation, properties, and algorithm', Naval Research Logistics, Vol. 57, No. 1, pp.8-70.
-
(2010)
Naval Research Logistics
, vol.57
, Issue.1
, pp. 8-70
-
-
Lim, M.1
Daskin, M.2
Chopra, S.3
Bassamboo, A.4
-
62
-
-
80052233616
-
-
Technical report, University of Illinois
-
Lim, M., Daskin, M., Chopra, S. and Bassamboo, A. (2010b) 'Solving interdictor-defender bilevel optimization: a two population genetic algorithm approach', Technical report, University of Illinois.
-
(2010)
Solving Interdictor-defender Bilevel Optimization: A Two Population Genetic Algorithm Approach
-
-
Lim, M.1
Daskin, M.2
Chopra, S.3
Bassamboo, A.4
-
63
-
-
55749085781
-
A two-stage stochastic programming model for transportation network protection
-
Liu, C., Fan, Y. and Ordonez, F. (2009) 'A two-stage stochastic programming model for transportation network protection', Computers and Operations Research , Vol. 36, No. 5, pp.1582-1590.
-
(2009)
Computers and Operations Research
, vol.36
, Issue.5
, pp. 1582-1590
-
-
Liu, C.1
Fan, Y.2
Ordonez, F.3
-
64
-
-
43549105685
-
Definitions and curve fitting of time satisfaction functions in facility location problems
-
Piscataway NJ, USA
-
Ma, Y. and Wu, H. (2006) 'Definitions and curve fitting of time satisfaction functions in facility location problems', in Proceedings of the 2006 International Conference on Management Science and Engineering, Piscataway NJ, USA, Vol. 1, pp.429-433.
-
(2006)
Proceedings of the 2006 International Conference on Management Science and Engineering
, vol.1
, pp. 429-433
-
-
Ma, Y.1
Wu, H.2
-
65
-
-
80052229375
-
Airports reopen, safety debate lingers
-
available at
-
Michaels, D., McGrath, S. and Pasztor, A. (2010) 'Airports reopen, safety debate lingers', WallStreet Journal, available at http://online.wsj.com.
-
(2010)
WallStreet Journal
-
-
Michaels, D.1
McGrath, S.2
Pasztor, A.3
-
66
-
-
33847792388
-
Novel hybrid mitigation strategy for improving the resiliency of hierarchical networks subjected to attacks
-
DOI 10.1016/j.physa.2006.12.018, PII S0378437106013719
-
Morehead, R. and Noore, A. (2007) 'Novel hybrid mitigation strategy for improving the resiliency of hierarchical networks subjected to attacks', Physica A, Vol. 378, No. 2, pp.603-612. (Pubitemid 46389558)
-
(2007)
Physica A: Statistical Mechanics and its Applications
, vol.378
, Issue.2
, pp. 603-612
-
-
Morehead, R.1
Noore, A.2
-
67
-
-
56349137799
-
A methodological overview ofnetwork vulnerability analysis
-
Murray A., Matisziw, T. and Grubesic, T. (2008) 'A methodological overview ofnetwork vulnerability analysis', Growth and Change, Vol. 39, No. 4, pp.573-592.
-
(2008)
Growth and Change
, vol.39
, Issue.4
, pp. 573-592
-
-
Murray, A.1
Matisziw, T.2
Grubesic, T.3
-
68
-
-
33751024126
-
Locating and protecting critical reserve sites to minimize expected and worst-case losses
-
DOI 10.1016/j.biocon.2006.08.009, PII S0006320706003375
-
O'Hanley J.R., Church, R.L. and Gilless, J.K. (2007) 'Locating and protecting critical reserve sites to minimize expected and worst-case losses', Biological Conservation, Vol. 134, No. 1, pp.130-141. (Pubitemid 44754764)
-
(2007)
Biological Conservation
, vol.134
, Issue.1
, pp. 130-141
-
-
O'Hanley, J.R.1
Church, R.L.2
Keith Gilless, J.3
-
69
-
-
77349115442
-
Pre-disaster investment decisions for strengthening a highway network
-
Peeta, S., Salman, F.S., Gunnec, D. and Viswanath, K. (2010) 'Pre-disaster investment decisions for strengthening a highway network', Computers & Operations Research, Vol. 37, No. 10, pp.1708-1719.
-
(2010)
Computers & Operations Research
, vol.37
, Issue.10
, pp. 1708-1719
-
-
Peeta, S.1
Salman, F.S.2
Gunnec, D.3
Viswanath, K.4
-
70
-
-
77949659051
-
Defending simple series and parallel systems with imperfect false targets
-
Peng, R., Levitin, G., Xie, M. and Ng, S. (2010) 'Defending simple series and parallel systems with imperfect false targets', Reliability Engineering and System Safety, Vol. 95, No. 6, pp.679-688.
-
(2010)
Reliability Engineering and System Safety
, vol.95
, Issue.6
, pp. 679-688
-
-
Peng, R.1
Levitin, G.2
Xie, M.3
Ng, S.4
-
71
-
-
36049023055
-
Allocating defensive resources with private information about vulnerability
-
Powell, R. (2007a) 'Allocating defensive resources with private information about vulnerability', American Political Science Review, Vol. 101, No. 4, pp.799-809.
-
(2007)
American Political Science Review
, vol.101
, Issue.4
, pp. 799-809
-
-
Powell, R.1
-
72
-
-
34547479862
-
Defending against terrorist attacks with limited resources
-
Powell, R. (2007b) 'Defending against terrorist attacks with limited resources', American Political Science Review, Vol. 101, No. 3, pp.527-541.
-
(2007)
American Political Science Review
, vol.101
, Issue.3
, pp. 527-541
-
-
Powell, R.1
-
73
-
-
33750633005
-
Allocating security resources to a water supply network
-
DOI 10.1080/07408170600865400, PII P7342128217V225L
-
Qiao, J., Jeong, D., Lawley M., Richard, J-P., Abraham, D. and Yih, Y. (2007) 'Allocating security resources to a water supply network', IIE Transactions, Vol. 39, No. 1, pp.95-109. (Pubitemid 44688394)
-
(2007)
IIE Transactions (Institute of Industrial Engineers)
, vol.39
, Issue.1
, pp. 95-109
-
-
Qiao, J.1
Jeong, D.2
Lawley, M.3
Richard, J.-P.P.4
Abraham, D.M.5
Yih, Y.6
-
74
-
-
80052234337
-
-
Rail Report: Rail Customer News and Information available at accessed on 8 October 2010
-
Rail Report: Rail Customer News and Information (2005) 'Rails cause utility fuel shortages, electricity rate hikes', available at http://www.railcure.org/pdf/newsletter0805.pdf (accessed on 8 October 2010).
-
(2005)
Rails Cause Utility Fuel Shortages, Electricity Rate Hikes
-
-
-
75
-
-
67649446257
-
Optimal protection ofgeneral source-sink networks via evolutionary techniques
-
Ramirez-Marquez, J.E., Rocco, C.M. and Levitin, G. (2009) 'Optimal protection ofgeneral source-sink networks via evolutionary techniques', Reliability Engineering and System Safety, Vol. 94, No. 10, pp.1676-1684.
-
(2009)
Reliability Engineering and System Safety
, vol.94
, Issue.10
, pp. 1676-1684
-
-
Ramirez-Marquez, J.E.1
Rocco, C.M.2
Levitin, G.3
-
76
-
-
0042307359
-
Global optimization of multiplicative programs
-
Ryoo, H-S. and Sahinidis, N.V. (2003) 'Global optimization of multiplicative programs', Journal of Global Optimization, Vol. 26, No. 4, pp.387-418.
-
(2003)
Journal of Global Optimization
, vol.26
, Issue.4
, pp. 387-418
-
-
Ryoo, H.-S.1
Sahinidis, N.V.2
-
78
-
-
33644665618
-
Inoperability input-output modeling of disruptions to interdependent economic systems
-
DOI 10.1002/sys.20040
-
Santos, J. (2006) 'Inoperability input-output modeling of disruptions to interdependent economic systems', Systems Engineering, Vol. 9, No. 1, pp.20-34. (Pubitemid 43331714)
-
(2006)
Systems Engineering
, vol.9
, Issue.1
, pp. 20-34
-
-
Santos, J.R.1
-
79
-
-
38949181266
-
An exact solution approach for the interdiction median problem with fortification
-
DOI 10.1016/j.ejor.2007.05.027, PII S037722170700505X
-
Scaparra, M. and Church, R. (2008a) 'An exact solution approach for the interdiction median problem with fortification', European Journal of Operational Research, Vol. 189, No. 1, pp.76-92. (Pubitemid 351232143)
-
(2008)
European Journal of Operational Research
, vol.189
, Issue.1
, pp. 76-92
-
-
Scaparra, M.P.1
Church, R.L.2
-
80
-
-
35348951490
-
A bilevel mixed-integer program for critical infrastructure protection planning
-
DOI 10.1016/j.cor.2006.09.019, PII S0305054806002395
-
Scaparra, M.P. and Church, R.L. (2008b) 'A bilevel mixed-integer program for critical infrastructure protection planning', Computers and Operations Research, Vol. 35, No. 6, pp.1905-1923. (Pubitemid 47615235)
-
(2008)
Computers and Operations Research
, vol.35
, Issue.6
, pp. 1905-1923
-
-
Scaparra, M.P.1
Church, R.L.2
-
81
-
-
70349592142
-
Information security: Designing a stochastic-network for throughput and reliability
-
Schavland, J., Chan, Y. and Raines, R.A. (2009) 'Information security: designing a stochastic-network for throughput and reliability', Naval Research Logistics, Vol. 56, pp.625-641.
-
(2009)
Naval Research Logistics
, vol.56
, pp. 625-641
-
-
Schavland, J.1
Chan, Y.2
Raines, R.A.3
-
82
-
-
80052216421
-
Capacity expansion in contemporary telecommunication networks
-
PhD thesis, MassachusettsInstituteofTechnology Skaperdas, S. 1996 Contest success functions
-
Sivaraman, R. (2007) 'Capacity expansion in contemporary telecommunication networks', PhD thesis, MassachusettsInstituteofTechnology Skaperdas, S. (1996) 'Contest success functions', Economic Theory, Vol. 7, No. 2, pp.283-290.
-
(2007)
Economic Theory
, vol.7
, Issue.2
, pp. 283-290
-
-
Sivaraman, R.1
-
84
-
-
84976488395
-
-
Springer New York
-
Smith, J.C. and Lim, C. (2008) Pareto Optimality, Game Theory and Equilibria, chapter Algorithms for Network Interdiction and Fortification Games, Springer New York, pp.609-644.
-
(2008)
Pareto Optimality, Game Theory and Equilibria, Chapter Algorithms for Network Interdiction and Fortification Games
, pp. 609-644
-
-
Smith, J.C.1
Lim, C.2
-
85
-
-
84991906331
-
Models for reliable supply chain network design
-
in A.T. Murray and T.H. Grubesic, (Eds.) Chapter 13, Springer-Verlag, Berlin, Germany
-
Snyder, L. and Daskin, M. (2007) 'Models for reliable supply chain network design', in A.T. Murray and T.H. Grubesic, (Eds.): Critical Infrastructure: Reliability and Vulnerability, pp.257-289, Chapter 13, Springer-Verlag, Berlin, Germany
-
(2007)
Critical Infrastructure: Reliability and Vulnerability
, pp. 257-289
-
-
Snyder, L.1
Daskin, M.2
-
86
-
-
25144463125
-
Reliability models for facility location: The expected failure cost case
-
DOI 10.1287/trsc.1040.0107
-
Snyder, L. and Daskin, M. (2005) 'Reliability models for facility location: the expected failure cost case', Transportation Science, Vol. 39, No. 3, pp.400-416. (Pubitemid 41344665)
-
(2005)
Transportation Science
, vol.39
, Issue.3
, pp. 400-416
-
-
Snyder, L.V.1
Daskin, M.S.2
-
87
-
-
72349098607
-
-
Baltimore, MD
-
Snyder, L., Scaparra, M., Daskin, M. and Church, R. (2006) Planning for Disruptions in Supply Chain Networks, Baltimore, MD.
-
(2006)
Planning for Disruptions in Supply Chain Networks
-
-
Snyder, L.1
Scaparra, M.2
Daskin, M.3
Church, R.4
-
88
-
-
33748497383
-
Stochastic p-robust location problems
-
DOI 10.1080/07408170500469113, PII X3K1186VX87T38G6
-
Snyder, L.V. and Daskin, M.S. (2006) 'Stochastic p-robust location problems', IIE Transactions, Vol. 38, No. 11, pp.971-985. (Pubitemid 44355861)
-
(2006)
IIE Transactions (Institute of Industrial Engineers)
, vol.38
, Issue.11
, pp. 971-985
-
-
Snyder, L.V.1
Daskin, M.S.2
-
89
-
-
80052234336
-
-
Submitted draft, Lehigh University. available at
-
Snyder, L.V., Atan, Z., Peng, P., Rong, Y., Schmitt, A.J. and Sinsoysalk, B. (2010) 'OR/MS models for supply chain disruptions: a review', Submitted draft, Lehigh University available at http://papers.ssrn.com/sol3/papers.cfm? abstractid=1689882.
-
(2010)
OR/MS Models for Supply Chain Disruptions: A Review
-
-
Snyder, L.V.1
Atan, Z.2
Peng, P.3
Rong, Y.4
Schmitt, A.J.5
Sinsoysalk, B.6
-
90
-
-
77952091086
-
A review of current practice in network disruption analysis and an assessment of the ability to account for isolating links in transportation networks
-
Sullivan, J.L., Aultman-Hall, L. and Novak, D.C. (2009) 'A review of current practice in network disruption analysis and an assessment of the ability to account for isolating links in transportation networks', Transportation Letters, Vol. 1, pp.271-280
-
(2009)
Transportation Letters
, vol.1
, pp. 271-280
-
-
Sullivan, J.L.1
Aultman-Hall, L.2
Novak, D.C.3
-
91
-
-
84871215481
-
-
The Department of Homeland Security Risk Steering Committee Technical report, Department ofHomeland Security, Washington, DC United States-Canada Power System
-
The Department of Homeland Security Risk Steering Committee (2008) 'DHS risk Lexicon', Technical report, Department ofHomeland Security, Washington, DC United States-Canada Power System
-
(2008)
DHS Risk Lexicon
-
-
-
93
-
-
0033121517
-
Spare capacity assignment in telecom networks using path restoration and further improvement using traffic splitting
-
Veerasamy J., Venkatesan, S. and Shah, J.C. (1999) 'Spare capacity assignment in telecom networks using path restoration and further improvement using traffic splitting', Journal of Systems and Software, Vol. 47, No. 1, pp.27-33.
-
(1999)
Journal of Systems and Software
, vol.47
, Issue.1
, pp. 27-33
-
-
Veerasamy, J.1
Venkatesan, S.2
Shah, J.C.3
-
94
-
-
77951142879
-
The fragility of interdependency
-
Vespignani, A. (2010) 'The fragility of interdependency', Nature, Vol. 464, No. 7291, pp.984-985.
-
(2010)
Nature
, vol.464
, Issue.7291
, pp. 984-985
-
-
Vespignani, A.1
-
95
-
-
84987041118
-
Investing in arcs in a network to maximize the expected max flow
-
Wallace, S. (1987) 'Investing in arcs in a network to maximize the expected max flow', Networks, Vol. 17, No. 1, pp.87-103.
-
(1987)
Networks
, vol.17
, Issue.1
, pp. 87-103
-
-
Wallace, S.1
-
96
-
-
0032482432
-
Collective dynamics of 'small-world' networks
-
DOI 10.1038/30918
-
Watts, D. and Strogatz, S. (1998) 'Collective dynamics of 'small-world' networks', Nature, Vol. 393, No. 6684, pp.440-442. (Pubitemid 28292183)
-
(1998)
Nature
, vol.393
, Issue.6684
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
97
-
-
38249007197
-
Deterministic networkinterdiction
-
Wood, R. (1993) 'Deterministic networkinterdiction', Mathematical and Computer Modelling, Vol. 17, No. 2, pp.1-18.
-
(1993)
Mathematical and Computer Modelling
, vol.17
, Issue.2
, pp. 1-18
-
-
Wood, R.1
-
98
-
-
34447298615
-
Trilevel optimization in power network defense
-
Yao, Y., Edmunds, T., Papageorgiou, D. and Alvarez, R. (2007) 'Trilevel optimization in power network defense', IEEE Transactions on Systems Man and Cybernetics Part C, Vol. 37, No. 4, p.712.
-
(2007)
IEEE Transactions on Systems Man and Cybernetics Part C
, vol.37
, Issue.4
, pp. 712
-
-
Yao, Y.1
Edmunds, T.2
Papageorgiou, D.3
Alvarez, R.4
-
101
-
-
80052216027
-
Katrina vs. 9/11 how should we optimally protect against both?
-
in H. Richardson, P. Gordon and J. Moore II (Eds.) Chapter 4 Edward Elgar Publishing
-
Zhuang, J. and Bier, V. (2008) 'Katrina vs. 9/11 how should we optimally protect against both? in H. Richardson, P. Gordon and J. Moore II (Eds.): Post-Katrina: Economics, SocialAspects, and Risk, pp.71-83, Chapter 4, Edward Elgar Publishing.
-
(2008)
Post-Katrina: Economics, SocialAspects, and Risk
, pp. 71-83
-
-
Zhuang, J.1
Bier, V.2
-
102
-
-
79251511489
-
Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation
-
to appear
-
Zhuang, J. and Bier, V. (to appear) 'Secrecy and deception at equilibrium, with applications to anti-terrorism resource allocation', Defence and Peace Economics.
-
Defence and Peace Economics
-
-
Zhuang, J.1
Bier, V.2
-
103
-
-
38549098290
-
Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
-
DOI 10.1287/opre.1070.0434
-
Zhuang, J. and Bier, V.M. (2007) 'Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort', Operations Research, Vol. 55, No. 5, pp.976-991. (Pubitemid 351159542)
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
104
-
-
15744386147
-
Decision-making and the vulnerability of interdependent critical infrastructure
-
2004 IEEE International Conference on Systems, Man and Cybernetics, SMC 2004
-
Zimmerman, R. (2004) 'Decision-making and the vulnerability of interdependent critical infrastructure', in Proceedings of the 2004 IEEE International Conference on Systems, Man and Cybernetics, IEEE, Vol. 5, pp.4059-4063. (Pubitemid 40415663)
-
(2004)
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
, vol.5
, pp. 4059-4063
-
-
Zimmerman, R.1
-
105
-
-
33646256588
-
The next step: Quantifying infrastructure independencies to improve security
-
Zimmerman, R. and Restrepo, C. (2006) 'The next step: quantifying infrastructure independencies to improve security', International Journal of Critical Infrastructures, Vol. 2, No. 2, pp.215-230.
-
(2006)
International Journal of Critical Infrastructures
, vol.2
, Issue.2
, pp. 215-230
-
-
Zimmerman, R.1
Restrepo, C.2
|