2006
DOI: 10.1007/s10898-006-9067-3
|View full text |Cite
|
Sign up to set email alerts
|

Survivable network design under optimal and heuristic interdiction scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 76 publications
(32 citation statements)
references
References 27 publications
0
32
0
Order By: Relevance
“…Partial interdiction on arcs and interdiction budget to maximize the shortest path between supply and demand spots were considered by Fulkerson and Harding (1977) [15]. In the study of Smith et al (2007), partial interdiction was the reduction of the interdicted arcs' ow capacity [1]. Aksen et al (2012) integrated the partial interdiction idea into a facility interdiction model as a leader-follower game; the attacker had limited budget to cause interdiction, and the follower (defender) had to satisfy all customers' demand after attacking [4].…”
Section: Interdiction and Facility Forti Cation Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…Partial interdiction on arcs and interdiction budget to maximize the shortest path between supply and demand spots were considered by Fulkerson and Harding (1977) [15]. In the study of Smith et al (2007), partial interdiction was the reduction of the interdicted arcs' ow capacity [1]. Aksen et al (2012) integrated the partial interdiction idea into a facility interdiction model as a leader-follower game; the attacker had limited budget to cause interdiction, and the follower (defender) had to satisfy all customers' demand after attacking [4].…”
Section: Interdiction and Facility Forti Cation Modelsmentioning
confidence: 99%
“…Cr fṽ rg dr 0 Z 1 Cr fṽ rg dr: (22) We assume in this research thatṽ is a trapezoidal fuzzy number de ned by four constant points asṽ = (v (1) ; v (2) ; v (3) ; v (4) ). According to Expressions (23) and (24), the corresponding credibility measures and expected value ofṽ are computed as follows:…”
Section: The Proposed Credibility-based Fuzzy Chance Constrained Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Kodialam and Lakshman [29] developed a sampling method for inspecting data packets to detect the intrusion of a computer virus or other illegal software. Smith et al [46] discussed the fortification of a telecommunication network against malicious attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Scaparra and Church (2008) study the problem of allocating protective resources among the facilities of a system. Smith et al (2007) examine the problem of fortifying a network to defend against attacks in the context of survivable network design (e.g., Alevras et al, 1998;Myung et al, 1999;Ouveysi and Wirth, 1999). Desai and Sen (2010) consider the problem of designing reliable networks that satisfy several constraints while simultaneously allocating multiple resources to mitigate the arc failure probabilities such that the total cost of network design and resource allocation is minimized.…”
Section: Introductionmentioning
confidence: 99%