2013
DOI: 10.1016/j.cie.2013.04.014
|View full text |Cite
|
Sign up to set email alerts
|

Maximum dynamic network flow interdiction problem: New formulation and solution procedures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(9 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…NIP is also a useful model for researching the protection of IoT, e.g., the defensive resource allocation [15] and adversarial outbreak detection [19]. Numerous variations of NIP have been proposed and studied to meet different hypotheses under particular scenarios [16,17,[20][21][22][23][24]. Among the many types of NIP, SPNI is a classic and important branch.…”
Section: Introductionmentioning
confidence: 99%
“…NIP is also a useful model for researching the protection of IoT, e.g., the defensive resource allocation [15] and adversarial outbreak detection [19]. Numerous variations of NIP have been proposed and studied to meet different hypotheses under particular scenarios [16,17,[20][21][22][23][24]. Among the many types of NIP, SPNI is a classic and important branch.…”
Section: Introductionmentioning
confidence: 99%
“…In the literature, scholars have studied CIS vulnerability under different types of disruptive events, including (1) random failures, which are modeled by randomly selecting a certain fraction of system components to make them fail (Motter and Lai, ; Crucitti et al., ; Albert et al., ; Yazdani and Jeffrey, ; Dobson et al., ; Ouyang and Dueñas‐Osorio, ; Carreras et al., ; Dobson et al., ; Ren and Dobson, ; Ouyang et al., ; Newman, ; Hong et al., ); (2) natural hazards, whose scenarios are simulated by hazard generation models (FEMA, ) and their impacts on system components are described by fragility curves (Dueñas‐Osorio et al., ; Adachi and Ellingwood, ; Esposito et al., ; Franchin and Cavalieri, ; Cavallaro et al., ; FEMA, ; Ouyang and Dueñas‐Osorio, ); (3) malicious attacks, which are simulated by removing important components (Hines et al., ; Holmgren, ; Rosas‐Casals et al., ; Holme et al., ; Bompard et al., ; Mishkovski et al., ; Zio et al., ; Alderson et al., ; Ouyang et al., ; Wang et al., ; Afshari Rad and Kakhki, ; Hasani and Khosrojerdi, ; Newell, ; Bogloee et al. ); and (4) some combinations of the above events (Levitin and Hausken, ; Levitin, ; Miller‐Hooks et al., ).…”
Section: Introductionmentioning
confidence: 99%
“…(3) malicious attacks, which are simulated by removing important components (Hines et al, 2010;Holmgren, 2006;Rosas-Casals et al, 2007;Holme et al, 2002;Bompard et al, 2010;Mishkovski et al, 2011;Zio et al, 2012;Alderson et al, 2015;Ouyang et al, 2015;Wang et al, 2016;Afshari Rad and Kakhki, 2013;Hasani and Khosrojerdi, 2016;Newell, 1980;Bogloee et al 2017); and (4) some combinations of the above events (Levitin and Hausken, 2009;Levitin, 2007;Miller-Hooks et al, 2012). Note that the above events do not consider the spatial proximity of the damaged components and should be grouped into nonproximity-based events.…”
Section: Introductionmentioning
confidence: 99%
“…The above classification is not inclusive. There are other variants, some as special cases and some the same but under different names, such as interdiction on planar graphs, , interdiction in any region of a network in the Euclidean space , game theoretic models , matching interdiction , minimum spanning tree interdiction , Matrix interdiction , median and covering facility interdiction , and maximum flow interdiction on dynamic networks . For a taxonomy of different types of these problems the interested reader is referred to .…”
Section: Introductionmentioning
confidence: 99%