2011
DOI: 10.1002/net.20458
|View full text |Cite
|
Sign up to set email alerts
|

Deception tactics for network interdiction: A multiobjective approach

Abstract: This article develops defender-attacker network interdiction models with deception. Here, deception refers to a preemptive and intelligent use of concealed interdiction assets and decoys by the defender, in addition to transparent assets commonly employed in modeling defender-attacker problems. These models can help security planners to locate a limited number of checkpoints and sensors of various types to, for example, detect the smuggling of illegal products. The problem is complex, in part, because the obje… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 44 publications
(21 citation statements)
references
References 15 publications
0
21
0
Order By: Relevance
“…Hidden sensors, or sensors using undisclosed technology, may improve pω but not alter truep¯ω. Following Salmerón , we refer to these as decoys and traps, respectively. Depending on which dominates a given checkpoint, we reference it as a decoy checkpoint or a trap checkpoint.…”
Section: Computational Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Hidden sensors, or sensors using undisclosed technology, may improve pω but not alter truep¯ω. Following Salmerón , we refer to these as decoys and traps, respectively. Depending on which dominates a given checkpoint, we reference it as a decoy checkpoint or a trap checkpoint.…”
Section: Computational Resultsmentioning
confidence: 99%
“…Consider the length of an s-t path given the arc lengths (10). Choosing (s, k ) initializes our construction of the right-hand side of (4) via arc length c sk in (10a).…”
Section: Step Inequalities and Separationmentioning
confidence: 99%
See 1 more Smart Citation
“…These problems can further be divided into different classes based on for example, node or arc removal , complete or partial interdiction , single or multicommodity flow , single or multiobjective , deterministic or stochastic and randomized interdiction , and symmetry or asymmetry of information .…”
Section: Introductionmentioning
confidence: 99%
“…The smuggler is eager to choose safe transportation routes for illegal drugs or other contraband and customs wants to intercept them by setting inspection points. These researchers include Mitchell and Bell [33], Caulkins et al [14], Washburn and Wood [48], Bakır [6], and Salmeron [42]. Washburn and Wood formulated a TPZS smuggling game as a mixed integer problem from a graph-theoretical point of view.…”
Section: Introductionmentioning
confidence: 99%