메뉴 건너뛰기




Volumn , Issue 9783540680550, 2007, Pages 243-256

Bounding network interdiction vulnerability through cutset identification

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85039429121     PISSN: 14309602     EISSN: 21979375     Source Type: Book Series    
DOI: 10.1007/978-3-540-68056-7_12     Document Type: Chapter
Times cited : (22)

References (31)
  • 1
    • 85039439476 scopus 로고    scopus 로고
    • Abilene. 2005. http://abilene.internet2.edu.
    • (2005)
    • Abilene1
  • 7
  • 9
    • 28344448992 scopus 로고
    • Finding the n most vital nodes in a flow network
    • Corley, H.W. and H. Chang. 1974. Finding the n most vital nodes in a flow network. Management Science. 21, 362-364.
    • (1974) Management Science , vol.21 , pp. 362-364
    • Corley, H.W.1    Chang, H.2
  • 10
    • 0020175509 scopus 로고
    • Most vital links and nodes in weighted networks
    • Corley, H.W. and D.Y. Sha. 1982. Most vital links and nodes in weighted networks. Operations Research Letters. 1(4), 157-160.
    • (1982) Operations Research Letters , vol.1 , Issue.4 , pp. 157-160
    • Corley, H.W.1    Sha, D.Y.2
  • 24
    • 14044252116 scopus 로고    scopus 로고
    • Methodology for determining vulnerable links in a transportation network
    • Murray-Tuite, P.M. and H.S. Mahmassani. 2004. Methodology for determining vulnerable links in a transportation network. Transportation Research Record. 1882, 88-96.
    • (2004) Transportation Research Record , vol.1882 , pp. 88-96
    • Murray-Tuite, P.M.1    Mahmassani, H.S.2
  • 25
    • 1642618985 scopus 로고    scopus 로고
    • A cutting plane algorithm for computing k-edge survivability of a network
    • Myung, Y-S. and H. Kim. 2004. A cutting plane algorithm for computing k-edge survivability of a network. European Journal of Operational Research. 156, 579-589.
    • (2004) European Journal of Operational Research , vol.156 , pp. 579-589
    • Myung, Y.-S.1    Kim, H.2
  • 27
    • 0009026612 scopus 로고
    • Finding the n most vital links in flow networks
    • Ratliff, H.D., G.T. Sicilia, and S.H. Lubore. 1975. Finding the n most vital links in flow networks. Management Science. 21(5), 531-539.
    • (1975) Management Science , vol.21 , Issue.5 , pp. 531-539
    • Ratliff, H.D.1    Sicilia, G.T.2    Lubore, S.H.3
  • 28
    • 0009075090 scopus 로고
    • Removing arcs from a network
    • Wollmer, R. 1964. Removing arcs from a network. Operations Research. 12, 934-40.
    • (1964) Operations Research , vol.12 , pp. 934-940
    • Wollmer, R.1
  • 29
    • 38249007197 scopus 로고
    • Deterministic network interdiction
    • Wood, R. K. 1993. Deterministic network interdiction. Mathematical Computer Modelling. 17(2), 1-18.
    • (1993) Mathematical Computer Modelling , vol.17 , Issue.2 , pp. 1-18
    • Wood, R.K.1
  • 31
    • 0024107887 scopus 로고
    • Survivable network architectures for broad-band fiber optic networks: Model and performance comparison
    • Wu, T-H., D.J. Kolar, and R.H. Cardwell. 1988. Survivable network architectures for broad-band fiber optic networks: model and performance comparison. Journal of Lightwave Technology. 6(11), 1698-1709.
    • (1988) Journal of Lightwave Technology , vol.6 , Issue.11 , pp. 1698-1709
    • Wu, T.-H.1    Kolar, D.J.2    Cardwell, R.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.