2018
DOI: 10.1016/j.ress.2017.10.026
|View full text |Cite
|
Sign up to set email alerts
|

Stochastic shortest path network interdiction with a case study of Arizona–Mexico border

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…Guillot and Stauffer (2018) extend Dijkstra's algorithm for the stochastic SP problem in finite state and action spaces. Zhang et al (2018) study the issue of border security in terms of resource allocation, and formed the problem as stochastic SP network interdiction models. Ahmadi et al (2018) Similarly, fuzzy theory can be used to uncertainty analysis with imprecise weights in SP problem.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Guillot and Stauffer (2018) extend Dijkstra's algorithm for the stochastic SP problem in finite state and action spaces. Zhang et al (2018) study the issue of border security in terms of resource allocation, and formed the problem as stochastic SP network interdiction models. Ahmadi et al (2018) Similarly, fuzzy theory can be used to uncertainty analysis with imprecise weights in SP problem.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Magliocca et al [14] consider counter-drug interdiction to disrupt the cocaine distribution. Zhang et al [15] study the stochastic shortest-path interdiction problem using probabilistic detection likelihood to solve Ports-of-Entry problem; such as human trafficking, illegal drug distribution, and terrorism. Fang et al [16] develop a framework for the electrical power grid interdiction that balances the difficulties in predicting the hazard with the over conservatism in the attacker-defender models.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Above all, multi‐attacker is the most important consideration and therefore an extended literature review of multiple‐attacker games is presented in the following sections. For the completeness of the literature review, some notable multi‐period, multi‐target, and risk preference models are briefly referred (Hausken & Zhuang, ; Jose & Zhuang, ; Payyappalli, Zhuang, & Jose, ; Shan & Zhuang, ; Zhang, Zhuang, & Jose, ; Zhang, Zhuang, & Behlendorf, ).…”
Section: Introductionmentioning
confidence: 99%