References
- BazaraaMSJarvisJJSheraliHDLinear Programming and Network Flows2010
- BierVMHaphuriwatNMenoyoJZimmermanRCulpenAMOptimal resource allocation for defense of targets based on differing measures of attractivenessRisk Analysis200828376377010.1111/j.1539-6924.2008.01053.x
- CarrigyARoccoCMRamirez-MarquezJEMultistate stochastic network interdiction via reliability modelling and evolutionary optimizationJournal of Risk and Reliability201022412742
- ChernMLinKInterdicting the activities of a linear program—A parametric analysisEuropean Journal of Operational Research199586358059110.1016/0377-2217(94)00057-J
- CormicanKJComputational Methods for Deterministic and Stochastic Network Interdiction Problems1995
- FordLRFulkersonDRA simple algorithm for finding maximal network flows and an application to the hitchcock problemResearch Memorandum RM-1601955
- FordLRFulkersonDRMaximal flow through a networkCanadian Journal of Mathematics1956839940410.4153/CJM-1956-045-5
- FulkersonDRHardingGCMaximizing the minimum source-sink path subject to a budget constraintMathematical Programming197713111611810.1007/BF01584329
- GharePMMontgomeryDCTurnerWCOptimal interdiction policy for a flow networkNaval Research Logistics Quarterly1971181374510.1002/nav.3800180103
- GoldenBA problem in network interdictionNaval Research Logistics Quarterly197825471171310.1002/nav.3800250412
- HarrisTERossFSFundamentals of a method for evaluating rail net capacitiesResearch Memorandum RM-15731955
- IsraeliEWoodRKShortest-path network interdictionNetworks20024029711110.1002/net.10039
- LevitinGHauskenKSeparation in homogeneous systems with independent identical elementsEuropean Journal of Operational Research2010203362563410.1016/j.ejor.2009.08.016
- LimCSmithJCAlgorithms for discrete and continuous multicommodity flow network interdiction problemsIIE Transactions2007391152610.1080/07408170600729192
- LundayBJResource allocation on networks: Nested event tree optimization, network interdiction, and game theoretic methods2010
- LundayBJSheraliHDA dynamic network interdiction problemInformatica2010214553574
- LundayBJSheraliHDGlickmanTSThe nested event tree model with application to combating terrorismINFORMS Journal on Computing201022462063410.1287/ijoc.1100.0377
- McMastersAWMustinTMOptimal interdiction of a supply networkNaval Research Logistics Quarterly197017326126810.1002/nav.3800170302
- NapierRWGershenfeldMKGroups: Theory and Experiences1993
- PhillipsCAThe network inhibition problemProceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing1993776785
- Ramirez-MarquezJERoccoCMLevitinGOptimal network protection against diverse interdictor strategiesReliability Engineering and System Safety201196337438210.1016/j.ress.2010.10.003
- RoccoCMRamirez-MarquezJEDeterministic network interdiction optimization via an evolutionary approachReliability Engineering and System Safety200994256857610.1016/j.ress.2008.06.008
- RoccoCMRamirez-MarquezJEVulnerability metrics and analysis for communities in complex networksReliability Engineering and System Safety201196101360136610.1016/j.ress.2011.03.001
- RoccoCMRamirez-MarquezJESalazarDEBi and tri-objective optimization in the deterministic network interdiction problemReliability Engineering and System Safety201095888789610.1016/j.ress.2010.03.008
- RoysetROWoodRKSolving the bi-objective maximum-flow network-interdiction problemINFORMS Journal on Computing200719217518410.1287/ijoc.1060.0191
- von EyeASchusterCRogersWMModelling synergy using manifest categorical variablesInternational Journal of Behavioral Development199822353755710.1080/016502598384261
- WollmerRDRemoving arcs from a networkOperations Research196412693494010.1287/opre.12.6.934
- WollmerRDAlgorithms for targeting strikes in a lines-of-communication networkResearch Memorandum RM-5864-PR1969
- WoodRKDeterministic network interdictionMathematical and Computer Modeling199317211810.1016/0895-7177(93)90236-R