2012
DOI: 10.1007/978-3-642-28209-6_8
|View full text |Cite
|
Sign up to set email alerts
|

Evader Interdiction and Collateral Damage

Abstract: In network interdiction problems, evaders (e.g., hostile agents or data packets) may be moving through a network towards targets and we wish to choose locations for sensors in order to intercept the evaders before they reach their destinations. The evaders might follow deterministic routes or Markov chains, or they may be reactive, i.e., able to change their routes in order to avoid sensors placed to detect them. The challenge in such problems is to choose sensor locations economically, balancing security gain… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Wood developed a 'min-max' formulation to reformulate the maximum flow NIP and reduced it to a one-level integer programming model (IP) [17]. With the study of Wood, the number of NIP studies has increased and NIP becomes a well-studied research topic from many different scopes, such as minimizing the maximum flow or maximizing the shortest path on a given network, national defense [18,19], humanitarian logistics [20], facility or sensor locations [21,22], nuclear smuggling interdiction [23,24].…”
Section: Literature Reviewmentioning
confidence: 99%
See 4 more Smart Citations
“…Wood developed a 'min-max' formulation to reformulate the maximum flow NIP and reduced it to a one-level integer programming model (IP) [17]. With the study of Wood, the number of NIP studies has increased and NIP becomes a well-studied research topic from many different scopes, such as minimizing the maximum flow or maximizing the shortest path on a given network, national defense [18,19], humanitarian logistics [20], facility or sensor locations [21,22], nuclear smuggling interdiction [23,24].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The objective function (20) determines the total distance of the shortest path used by the network user after the interdictions of the attacker. Constraint sets (21)(22)(23)(24) are dual constraints. The constraint set (25) ensures that the total cost of interdictions is smaller or equal to the budge.…”
Section: I-model(f)mentioning
confidence: 99%
See 3 more Smart Citations