“…Analysing scientific articles describing the r-Interdiction Median Problem with the Fortification method, one can notice that the theory described in the publication by Church, Scaparra and Middlenton (2004) is taken as the basis for all calculations. Therefore, from all the studied articles (Higle, 2005;Berman, Krass, & Menezes, 2007;Liu, Fan, & Ordonez, 2009;Aksen, Piyade, & Aras, 2010;Jenelius, Westin & Holmgren, 2010;Akbari-Jafarabadi et al, 2017;Li, X., Kizito, & Paula, 2018;Roboredo, Pessoa, & Aizemberg, 2019) one was chosen for further research, which deals with attacks on critical objects. Only some scientific articles consider the possibility of using the method to integrate it into cyber strategy.…”