2014
DOI: 10.1002/nav.21567
|View full text |Cite
|
Sign up to set email alerts
|

Securing a border under asymmetric information

Abstract: We study a stochastic interdiction model of Morton et al. IIE Transactions, 39 (2007):3–14 that locates radiation sensors at border crossings to detect and prevent the smuggling of nuclear material. In this model, an interdictor places sensors at customs checkpoints to minimize a potential smuggler's maximum probability of crossing a border undetected. We focus on a model variant in which the interdictor has different, and likely more accurate, perceptions of the system's parameters than the smuggler does. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
18
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 33 publications
(18 citation statements)
references
References 10 publications
0
18
0
Order By: Relevance
“…Stochastic network interdiction problems incorporate uncertainties that often arise in adversarial attacks (Cormican, Morton, & Wood, ). Stochastic network interdiction problems have various applications such as detecting smuggled nuclear material at borders (Sullivan, Morton, Pan, & Cole Smith, ) and interdicting drug transportation networks (Pan & Morton, ). The stochasticity often occurs in network parameters such as arc capacities and interdiction attempts.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Stochastic network interdiction problems incorporate uncertainties that often arise in adversarial attacks (Cormican, Morton, & Wood, ). Stochastic network interdiction problems have various applications such as detecting smuggled nuclear material at borders (Sullivan, Morton, Pan, & Cole Smith, ) and interdicting drug transportation networks (Pan & Morton, ). The stochasticity often occurs in network parameters such as arc capacities and interdiction attempts.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Lei, Shen, and Song () propose a min‐max flow problem, where the interdictor's action for each arc is random with a given success rate in reducing the arc's capacity. Multiple solution approaches have been used to solve these problems such as L‐shaped method (Pan & Morton, ), cutting‐planes (Sullivan et al, ), decomposition methods (Held, Hemmecke, & Woodruff, ; Janjarassuk & Linderoth, ), sample average approximation (Lei et al, ; Song & Shen, ).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Since these early developments there has been a flurry of interest and publications on this subject, partly due to its captivating combinatorial nature, and partly due to many applications including those in warfare , flood control , spread of contagious diseases , filtering or chemically treating toxic waste , identification of “critical infrastructure” , intercepting drug, weapons, nuclear material smuggling , and computer network monitoring .…”
Section: Introductionmentioning
confidence: 99%
“…These problems can further be divided into different classes based on for example, node or arc removal , complete or partial interdiction , single or multicommodity flow , single or multiobjective , deterministic or stochastic and randomized interdiction , and symmetry or asymmetry of information .…”
Section: Introductionmentioning
confidence: 99%
“…Bailey et al [6] model a problem that has both of these types of uncertainty. Information asymmetry between interdictor and opponent has been studied [11,27,37,41,42] as have multiple-objective problems [35][36][37]. Applications of interdiction models vary widely, including infection control [5], natural disaster mitigation [43], military tactic development [10], natural resource and infrastructure security [11,38,39,44], and prevention of nuclear proliferation [12,27,32].…”
Section: Introductionmentioning
confidence: 99%