2013
DOI: 10.1007/s10479-013-1372-x
|View full text |Cite
|
Sign up to set email alerts
|

Evader interdiction: algorithms, complexity and collateral damage

Abstract: In network interdiction problems, evaders (e.g., hostile agents or data packets) are moving through a network toward targets and we wish to choose locations for sensors in order to intercept the evaders. The evaders might follow deterministic routes or Markov chains, or they may be reactive, i.e., able to change their routes in order to avoid the sensors. The challenge in such problems is to choose sensor locations economically, balancing interdiction gains with costs, including the inconvenience sensors infli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…Stochastic models are more realistic to real-world scenarios and can invariably address the uncertainty in the network structure and evader behavior. Johnson et al [29] further provided algorithms for optimal sensor placement in several classes of special graphs and approximation results for general graphs, assuming that the evaders are deterministic, Markov chain-based, reactive, and unreactive. Similar to our model, Bertsimas et al [30] also introduced the randomized network interdiction problem, which allows the interdictor to use randomness to select arcs to be removed.…”
Section: Related Workmentioning
confidence: 99%
“…Stochastic models are more realistic to real-world scenarios and can invariably address the uncertainty in the network structure and evader behavior. Johnson et al [29] further provided algorithms for optimal sensor placement in several classes of special graphs and approximation results for general graphs, assuming that the evaders are deterministic, Markov chain-based, reactive, and unreactive. Similar to our model, Bertsimas et al [30] also introduced the randomized network interdiction problem, which allows the interdictor to use randomness to select arcs to be removed.…”
Section: Related Workmentioning
confidence: 99%