2018
DOI: 10.1016/j.future.2017.08.056
|View full text |Cite
|
Sign up to set email alerts
|

Data envelopment analysis and interdiction median problem with fortification for enabling IoT technologies to relieve potential attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 47 publications
0
7
0
Order By: Relevance
“…The remaining problems, which are combinations of the above six MOCOPs, are considered under the category of miscellaneous problems. The problems included in this category are resource allocation supply chain scheduling and VRP [194], resource allocation and activity scheduling for fourth-party logistics [195], sustainable hub locationscheduling problem for perishable food supply chain [196], routing and scheduling of ships [197], location-routing problem [198], [199], [118], [200], [201], [202], integrated maintenance scheduling and VRP [203], travelling thief problem [204], lock scheduling and berth allocation [205], assignment-allocation [206], nursing home location-allocation problem [207], location-allocation problem [208], high-level synthesis problem [209], industrial hazardous waste locationrouting problem [210], and multi-objective RWA network design problem [211].…”
Section: Knapsack Problemmentioning
confidence: 99%
See 2 more Smart Citations
“…The remaining problems, which are combinations of the above six MOCOPs, are considered under the category of miscellaneous problems. The problems included in this category are resource allocation supply chain scheduling and VRP [194], resource allocation and activity scheduling for fourth-party logistics [195], sustainable hub locationscheduling problem for perishable food supply chain [196], routing and scheduling of ships [197], location-routing problem [198], [199], [118], [200], [201], [202], integrated maintenance scheduling and VRP [203], travelling thief problem [204], lock scheduling and berth allocation [205], assignment-allocation [206], nursing home location-allocation problem [207], location-allocation problem [208], high-level synthesis problem [209], industrial hazardous waste locationrouting problem [210], and multi-objective RWA network design problem [211].…”
Section: Knapsack Problemmentioning
confidence: 99%
“…The proposed approach has better convergence and solution quality as compared to the classical NSGA-II. Real-world TTSP Experiment & a TTSP for 2 units under test UUTs GA, Genetic simulated annealing algorithm (GASA) [141] iMOPSE Benchmark Dataset 5 DEGR, NSGA-II [136] Standard benchmark instances 6 NSGA-II [139] Problem instances from (PSPLIB) 7 AUGMECON2, MOPSO [151] Experiment NSGA-II, NSPSO [177] Test Instances generated through RaGEN software ECM [126] Randomly Generated AUGMECON [181] -NSGA-II [155] Experiment conducted through randomly generated data NSGA-II & SPEA-II [184] Simulation Scenario RANDOM, FIRMM [189] Experimental test NSGA-II [144] -- [127] Modified Deterministic FJSPs into Stochastic Problems NRGA [188] Randomly Generated Controlled elitist NSGA, NSGA-II [125] Test [193] -- [147] Randomly Generated Numerical example MOPSO [191] Randomly Generated - [183] -GA [161] Randomly generated instances for unrelated parallel machine - [195] -- [212] Randomly Generated SPEA [203] Sample test problems ECM [202] Sample test problems MOPSO [200] Randomly Generated NSDE [204] Randomly Generated Greedy Method, ISA, ISA-LOCAL [196] CAB & AP datasets 10 AUGMECON [209] -- [206] Randomly Generated Weighted Metric Approach [207] -ECM, Multi-objective simulated annealing (MOSA) [198] Randomly Generated SSPMO, WSM & ECM…”
Section: E) Scheduling Problemmentioning
confidence: 99%
See 1 more Smart Citation
“…Possible malicious use is easily foreseeable and a rise throughout the coming years in cybercrime activities is already predicted . However, it should be pointed out that extensive research is done toward the protection of infrastructure elements and toward IoT-based systems …”
Section: Sensor Solutions For Point-of-care and In Vivo Detectionmentioning
confidence: 99%
“…Technicians, vehicles, poles, consumers, and wind turbines, are 'things' in the broader view of IoT [81]. In short energy and utilities IoT 'to do' list: 1) focus on security [82], 2) implement cloud computing and big data and analytics pilot projects [83], 3) re-invent the end-user experience (customer or technician), 4) plan holistically and 5) pilot, learn, adapt. There exists research on employing IoT data for every analysis, with the innovative usage of new data discovery tools that can provide a high return on investment, as well as shorter paths to fault resolution and optimal operation.…”
Section: Role Of Information Technology In Terms Of the Internet Of Tmentioning
confidence: 99%