726
Views
55
CrossRef citations to date
0
Altmetric
ORIGINAL ARTICLES

Multi-period network interdiction problems with applications to city-level drug enforcement

, &
Pages 368-380 | Received 01 Aug 2010, Accepted 01 Jun 2011, Published online: 02 Mar 2012

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (8)

Elnaz Azizi & Abbas Seifi. (2023) Solution algorithms for shortest path network interdiction with symmetric and asymmetric information. International Journal of Systems Science: Operations & Logistics 10:1.
Read now
Emily C. Griffin, Aaron Ferber, Lucas Lafferty, Burcu B. Keskin, Bistra Dilkina & Meredith Gore. (2023) Interdiction of Wildlife Trafficking Supply Chains: An Analytical Approach1. IISE Transactions 0:0, pages 1-34.
Read now
Daniel Kosmas, Christina Melander, Emily Singerhouse, Thomas C. Sharkey, Kayse Lee Maass, Kelle Barrick & Lauren Martin. (2023) A transdisciplinary approach for generating synthetic but realistic domestic sex trafficking networks. IISE Transactions 0:0, pages 1-15.
Read now
Nicholas R. Magliocca, Ashleigh N. Price, Penelope C. Mitchell, Kevin M. Curtin, Matthew Hudnall & Kendra McSweeney. (2022) Coupling agent-based simulation and spatial optimization models to understand spatially complex and co-evolutionary behavior of cocaine trafficking networks and counterdrug interdiction. IISE Transactions 0:0, pages 1-14.
Read now
Rashid Anzoom, Rakesh Nagi & Chrysafis Vogiatzis. (2022) A review of research in illicit supply-chain networks and new directions to thwart them. IISE Transactions 54:2, pages 134-158.
Read now
Michelle D. Fabiani & Brandon Behlendorf. (2021) Cumulative disruptions: interdependency and commitment escalation as mechanisms of illicit network failure. Global Crime 22:1, pages 22-50.
Read now
N. Orkun Baycik & Kelly M. Sullivan. (2019) Robust location of hidden interdictions on a shortest path network. IISE Transactions 51:12, pages 1332-1347.
Read now
Nail Orkun Baycik, Thomas C. Sharkey & Chase E. Rainwater. (2018) Interdicting layered physical and information flow networks. IISE Transactions 50:4, pages 316-331.
Read now

Articles from other publishers (47)

Daniel Kosmas, Thomas C. Sharkey, John E. Mitchell, Kayse Lee Maass & Lauren Martin. (2023) Interdicting restructuring networks with applications in illicit trafficking. European Journal of Operational Research 308:2, pages 832-851.
Crossref
Kewei Yang, Jichao Li, Maidi Liu, Tianyang Lei, Xueming Xu, Hongqian Wu, Jiaping Cao & Gaoxin Qi. (2023) Complex systems and network science: a survey. Journal of Systems Engineering and Electronics 34:3, pages 543-573.
Crossref
Barış Tezcan & Kayse Lee Maass. (2023) Human trafficking interdiction with decision dependent success. Socio-Economic Planning Sciences 87, pages 101521.
Crossref
Elnaz Azizi & Abbas Seifi. (2023) Shortest path network interdiction with incomplete information: a robust optimization approach. Annals of Operations Research.
Crossref
Burcu B. Keskin, Emily C. Griffin, Jonathan O. Prell, Bistra Dilkina, Aaron Ferber, John MacDonald, Rowan Hilend, Stanley Griffis & Meredith L. Gore. (2023) Quantitative Investigation of Wildlife Trafficking Supply Chains: A Review. Omega 115, pages 102780.
Crossref
Javad Tayyebi, Ankan Mitra & Jorge A. Sefair. (2023) The continuous maximum capacity path interdiction problem. European Journal of Operational Research 305:1, pages 38-52.
Crossref
Mehdi Najafi, Hossein Zolfagharinia & Fatemeh Asadi. (2023) Angels against demons: Fight against smuggling in an illicit supply chain with uncertain outcomes and unknown structure. Computers & Industrial Engineering 176, pages 109007.
Crossref
Daniel Kosmas, Thomas C. Sharkey, John E. Mitchell, Kayse Lee Maass & Lauren Martin. (2022) Multi-period max flow network interdiction with restructuring for disrupting domestic sex trafficking networks. Annals of Operations Research.
Crossref
Johnathon D. Huff, William B. Leonard & Hugh R. Medal. (2022) The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints. International Journal of Critical Infrastructure Protection 39, pages 100572.
Crossref
Yunxiao Zhang & Pasquale Malacaria. (2022) Optimization-Time Analysis for Cybersecurity. IEEE Transactions on Dependable and Secure Computing 19:4, pages 2365-2383.
Crossref
Ashleigh N. Price, Kevin M. Curtin, Nicholas R. Magliocca, Daniel Turner, Penelope Mitchell, Kendra McSweeney & Diana L. Summers. (2022) A family of models in support of realistic drug interdiction location decision‐making. Transactions in GIS 26:4, pages 1962-1980.
Crossref
Xiaodan Xie & Felipe Aros‐Vera. (2022) An interdependent network interdiction model for disrupting sex trafficking networks. Production and Operations Management 31:6, pages 2695-2713.
Crossref
N. Orkun Baycik. (2022) Machine learning based approaches to solve the maximum flow network interdiction problem. Computers & Industrial Engineering 167, pages 107873.
Crossref
Claudio Contardo & Jorge A. Sefair. (2022) A Progressive Approximation Approach for the Exact Solution of Sparse Large-Scale Binary Interdiction Games. INFORMS Journal on Computing 34:2, pages 890-908.
Crossref
Yeming Shen, Thomas C. Sharkey, Boleslaw K. Szymanski & William (Al) Wallace. (2021) Interdicting interdependent contraband smuggling, money and money laundering networks. Socio-Economic Planning Sciences 78, pages 101068.
Crossref
Mahdieh Mirzaei, S. Mohammad J. Mirzapour Al-e-hashem & Mohsen Akbarpour Shirazi. (2021) A maximum-flow network interdiction problem in an uncertain environment under information asymmetry condition: Application to smuggling goods. Computers & Industrial Engineering 162, pages 107708.
Crossref
Burcu B. Keskin, Gregory J. Bott & Nickolas K. Freeman. (2020) Cracking Sex Trafficking: Data Analysis, Pattern Recognition, and Path Prediction. Production and Operations Management 30:4, pages 1110-1135.
Crossref
Xiucui Guan, Chao Liu & Qiao Zhang. (2020) The Critical Node Problem Based on Connectivity Index and Properties of Components on Trees. Asia-Pacific Journal of Operational Research 38:01, pages 2050041.
Crossref
Ziba Jabarzare, Hossein Zolfagharinia & Mehdi Najafi. (2020) Dynamic interdiction networks with applications in illicit supply chains. Omega 96, pages 102069.
Crossref
Abolfazl Abdolahzadeh, Massoud Aman & Javad Tayyebi. (2020) Minimum -cut interdiction problem . Computers & Industrial Engineering 148, pages 106708.
Crossref
J. Cole Smith & Yongjia Song. (2020) A survey of network interdiction models and algorithms. European Journal of Operational Research 283:3, pages 797-811.
Crossref
Sergey S. Ketkov & Oleg A. Prokopyev. (2020) On greedy and strategic evaders in sequential interdiction settings with incomplete information. Omega 92, pages 102161.
Crossref
N. Orkun Baycik, Thomas C. Sharkey & Chase E. Rainwater. (2020) A Markov Decision Process approach for balancing intelligence and interdiction operations in city-level drug trafficking enforcement. Socio-Economic Planning Sciences 69, pages 100700.
Crossref
Forough Enayaty-Ahangar, Chase E. Rainwater & Thomas C. Sharkey. (2019) A Logic-based Decomposition Approach for Multi-Period Network Interdiction Models. Omega 87, pages 71-85.
Crossref
Abumoslem Mohammadi & Javad Tayyebi. (2019) Maximum Capacity Path Interdiction Problem with Fixed Costs. Asia-Pacific Journal of Operational Research 36:04, pages 1950018.
Crossref
David Schweitzer & Hugh Medal. (2019) Wireless LAN transmitter location under the threat of jamming attacks. Computers & Operations Research 106, pages 14-27.
Crossref
Babak Saleck Pay, Jason R. W. Merrick & Yongjia Song. (2019) Stochastic network interdiction with incomplete preference. Networks 73:1, pages 3-22.
Crossref
Ashwin Bahulkar, N. Orkun Baycik, Thomas Sharkey, Yeming Shen, Boleslaw Szymanski & William Wallace. (2018) Integrative Analytics for Detecting and Disrupting Transnational Interdependent Criminal Smuggling, Money, and Money-Laundering Networks. Integrative Analytics for Detecting and Disrupting Transnational Interdependent Criminal Smuggling, Money, and Money-Laundering Networks.
R. Khanduzi & H. R. Maleki. (2017) A novel bilevel model and solution algorithms for multi-period interdiction problem with fortification. Applied Intelligence 48:9, pages 2770-2791.
Crossref
Satish Vadlamani, David Schweitzer, Hugh Medal, Apurba Nandi & Burak Eksioglu. (2018) A mixed-integer programming approach for locating jamming devices in a flow-jamming attack. Computers & Operations Research 95, pages 83-96.
Crossref
Ertuğrul Ayyıldız, Gökhan ÖZÇELİK & Cevriye Temel Gencer. (2018) Determining the most vital arcs on the shortest path for fire trucks in terrorist actions that will cause fire. Communications Faculty Of Science University of Ankara Series A1Mathematics and Statistics 68:1, pages 441-450.
Crossref
Maryam Soleimani-Alyar & Alireza Ghaffari-Hadigheh. (2018) Dynamic Network Interdiction Problem with Uncertain Data. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 26:02, pages 327-342.
Crossref
Marina Torres, Shouyong Jiang, David Pelta, Marcus Kaiser & Natalio Krasnogor. 2018. Advances in Artificial Intelligence. Advances in Artificial Intelligence 273 282 .
Maryam Soleimani-Alyar & Alireza Ghaffari-Hadigheh. (2017) Solving multi-period interdiction via generalized Bender’s decomposition. Acta Mathematicae Applicatae Sinica, English Series 33:3, pages 633-644.
Crossref
Maria Afshari Rad & Hossein Taghizadeh Kakhki. (2017) Two extended formulations for cardinality maximum flow network interdiction problem. Networks 69:4, pages 367-377.
Crossref
Renata A. Konrad, Andrew C. Trapp, Timothy M. Palmbach & Jeffrey S. Blom. (2017) Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications. European Journal of Operational Research 259:2, pages 733-745.
Crossref
David Schweitzer, Ruholla Jafari-Marandi & Hugh Medal. (2017) Analyzing the robustness of an array of wireless access points to mobile jammers. Computers & Industrial Engineering 107, pages 25-38.
Crossref
Somayeh Sadeghi, Abbas Seifi & Elnaz Azizi. (2017) Trilevel shortest path network interdiction with partial fortification. Computers & Industrial Engineering 106, pages 400-411.
Crossref
Huy Nguyen & Thomas C. Sharkey. (2016) A computational approach to determine damage in infrastructure networks from outage reports. Optimization Letters 11:4, pages 753-770.
Crossref
Jia Zhao & Gang Sun. (2016) Reliable Network Interdiction Models with Multiple Unit Costs. Mathematical and Computational Applications 21:4, pages 50.
Crossref
Yen Tang, Jean-Philippe P. Richard & J. Cole Smith. (2015) A class of algorithms for mixed-integer bilevel min–max optimization. Journal of Global Optimization 66:2, pages 225-262.
Crossref
Maryam Soleimani-Alyar, Alireza Ghaffari-Hadigheh & Fatemeh Sadeghi. (2016) Controlling Floods by Optimization Methods. Water Resources Management 30:12, pages 4053-4062.
Crossref
Juan S. Borrero, Oleg A. Prokopyev & Denis Sauré. (2016) Sequential Shortest Path Interdiction with Incomplete Information. Decision Analysis 13:1, pages 68-98.
Crossref
Hugh R. Medal. (2016) The wireless network jamming problem subject to protocol interference. Networks 67:2, pages 111-125.
Crossref
Hiba Baroud, Jose E. Ramirez-Marquez, Kash Barker & Claudio M. Rocco. (2014) Stochastic Measures of Network Resilience: Applications to Waterway Commodity Flows. Risk Analysis 34:7, pages 1317-1335.
Crossref
M. Afshari Rad & H. Taghizadeh Kakhki. (2013) Maximum dynamic network flow interdiction problem: New formulation and solution procedures. Computers & Industrial Engineering 65:4, pages 531-536.
Crossref
Fatemeh Asadi, Hossein Zolfagharinia & Mehdi Najafi. (2022) Angels Against Demons: Fight Against Smuggling in an Illicit Supply Chain with Uncertain Outcomes and Unknown Structure. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.