2018
DOI: 10.1109/access.2018.2838570
|View full text |Cite
|
Sign up to set email alerts
|

Shortest Path Network Interdiction With Goal Threshold

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…Various optimization techniques are used in modeling network interdiction problems. Among these, one may cite the shortest path problem (e.g., Israeli and Wood [23], Wei et al [24], Yaghlane et al [4], etc. ), the stochastic shortest path problem (e.g., Zhang et al [16]), the min-cut problem (e.g., Yaghlane et al [4]), Benders decomposition (e.g., Wei et al [24]), bilevel knapsack (e.g., Caprara et al [25]), to name a few.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Various optimization techniques are used in modeling network interdiction problems. Among these, one may cite the shortest path problem (e.g., Israeli and Wood [23], Wei et al [24], Yaghlane et al [4], etc. ), the stochastic shortest path problem (e.g., Zhang et al [16]), the min-cut problem (e.g., Yaghlane et al [4]), Benders decomposition (e.g., Wei et al [24]), bilevel knapsack (e.g., Caprara et al [25]), to name a few.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In interdiction network literature, various models are investigated. Wei et al [13] propose algorithms to optimize the consumption of attacker's resources on the shortest path interdiction model by limiting the network capacities. They approach the problem using various tools including Benders decomposition, Lagrange duality, set-covering, and Lagrange approximation algorithms.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Shortest-path network interdiction problems can be extended for various application scenarios [23]. Wei et al [24] introduced a threshold on the capacity of a network and proposed algorithms based on decomposition and duality formulation to optimize the interdictor's resource consumption. However, the algorithms cannot scale up to large networks and are sensitive to network parameters.…”
Section: Related Workmentioning
confidence: 99%