46
Views
7
CrossRef citations to date
0
Altmetric
General Paper

An attrition game on an acyclic network

&
Pages 979-992 | Received 28 Aug 2013, Accepted 12 May 2014, Published online: 21 Dec 2017

References

  • AhujaRKMagnantiTLOrlinJBNetwork Flows1993566597
  • AkgunITanselBWoodRKThe multi-terminal maximum flow network-interdiction problemEuropean Journal of Operational Research2011211224125110.1016/j.ejor.2010.12.011
  • AlverasDGrotschelMJonasPPaulUWessalyRSurvivable mobile phone network architectures: Models and solution methodsIEEE Communications Magazine1998363889310.1109/35.663332
  • AssimakopoulosNA network interdiction model for hospital infection controlComputers in Biology and Medicine198717641342210.1016/0010-4825(87)90060-6
  • AugerJMAn infiltration game on k arcsNaval Research Logistics199138451152910.1002/1520-6750(199108)38:4<511::AID-NAV3220380406>3.0.CO;2-U
  • BakırNOA Stackelberg game model for resource allocation in cargo container securityAnnals of Operations Research2011187152210.1007/s10479-010-0793-z
  • BellMKanturskaUSchmöckerJFonzoneAAttacker-defender models and road network vulnerabilityPhilosophical Transactions of the Royal Society200836618721893190610.1098/rsta.2008.0019
  • BrownGCarlyleMDiehlDKlineJWoodRKA two-sided optimization for theater ballistic missile defenseOperations Research200553574576310.1287/opre.1050.0231
  • CappaneraPScaparraMPOptimal allocation of protective resources in shortest-path networksTransportation Science2010451648010.1287/trsc.1100.0340
  • CaulkinsJPCrawfordGReuerPSimulation of adaptive response: A model of drug interdictionMathematical and Computer Modeling1993172375210.1016/0895-7177(93)90238-T
  • ChurchRLScaparraMPMiddletonRSIdentifying critical infrastructure: The median and covering facility interdiction problemsAnnals of the Association of American Geographers200494349150210.1111/j.1467-8306.2004.00410.x
  • DesaiJSenSA global optimization algorithm for reliable network designEuropean Journal of Operational Research201020011810.1016/j.ejor.2008.12.016
  • DresherMA Sampling Inspection Problem in Arms Control Agreements: A Game-Theoretic Analysis, Memorandum RM-2972-ARPA1962
  • FordLRFulkersonDRFlows in Networks19621415
  • FulkersonDRHardingGCMaximizing the minimum source-sink path subject to a budget constraintMathematical Programming197713111611810.1007/BF01584329
  • GharePMMontgomeryDCTurnerWCOptimal interdiction policy for a flow networkNaval Research Logistics Quarterly1971181374510.1002/nav.3800180103
  • GibbensRJKellyFPDynamic routing in fully connected networksIMA Journal of Mathematical Control and Information1990717711110.1093/imamci/7.1.77
  • GoldenBA problem in network interdictionNaval Research Logistics Quarterly197825471171310.1002/nav.3800250412
  • Hohzaki R (2013). Inspection Games. Wiely Encyclopedia of Operations Research and Management Science, pp. 1–9.
  • Kodialam M and Lakshman TV (2003). Detecting network intrusions via sampling: A game theoretical approach. In: Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications (IEEE INFOCOM), San Francisco, CA, Vol. 3, pp 1880–1889.
  • LanchesterFWAircraft in Warfare: The Dawn of the Fourth Arm1916
  • LawlerELCombinatorial Optimization: Networks and Matroid1976134138
  • McMastersAWMustinTMOptimal interdiction of a supply networkNaval Research Logistics Quarterly197017326126810.1002/nav.3800170302
  • MitchellTBellRDrug Interdiction Operations by the Coast Guard1980
  • MorsePMKimballGEMethods of Operations Research1951
  • MyungYSKimHJTchaDWDesign of communication networks with survivability constraintsManagement Science199945223825210.1287/mnsc.45.2.238
  • OuveysiIWirthAOn design of a survivable network architecture for dynamic routing: Optimal solution strategy and an efficient heuristicEuropean Journal of Operational Research19991171304410.1016/S0377-2217(98)00015-0
  • PereaFPuertoJRevisiting a game theoretic framework for the robust railway network design against intentional attacksEuropean Journal of Operational Research2013226228629210.1016/j.ejor.2012.11.015
  • RuckleWHGeometric Games and their Applications1983
  • RuckleWHFennellRHolmesPTFennemoreCAmbushing random walks I: Finite modelsOperations Research197624231432410.1287/opre.24.2.314
  • SalmeronJDeception tactics for network interdiction: A multiobjective approachNetworks2012601455810.1002/net.20458
  • SalmeronJWoodRKBaldickRAnalysis of electric grid security under terrorist threatIEEE Transactions on Power Systems200419290591210.1109/TPWRS.2004.825888
  • ScaparraMPChurchRLA bilevel mixed-integer program for critical infrastructure protection planningComputers and Operations Research20083561905192310.1016/j.cor.2006.09.019
  • SmithJCLimCSudarghoFSurvivable network design under optimal and heuristic interdiction scenariosJournal of Global Optimization200738218119910.1007/s10898-006-9067-3
  • ThomasMNisgavYAn infiltration game with time dependent payoffNaval Research Logistics Quarterly197623229730210.1002/nav.3800230211
  • WashburnAWoodKTwo-person zero-sum games for network interdictionOperations Research199543224325110.1287/opre.43.2.243
  • WhitemanPSImproving single strike effectiveness for network interdictionMilitary Operations Research199944153010.5711/morj.4.4.15
  • WollmerRDRemoving arcs from a networkOperations Research196412693494010.1287/opre.12.6.934
  • WoodKDeterministic network interdictionMathematical and Computer Modeling199317211810.1016/0895-7177(93)90236-R

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.