References
- AhujaRKMagnantiTLOrlinJBNetwork Flows1993566597
- AkgunITanselBWoodRKThe multi-terminal maximum flow network-interdiction problemEuropean Journal of Operational Research2011211224125110.1016/j.ejor.2010.12.011
- AlverasDGrotschelMJonasPPaulUWessalyRSurvivable mobile phone network architectures: Models and solution methodsIEEE Communications Magazine1998363889310.1109/35.663332
- AssimakopoulosNA network interdiction model for hospital infection controlComputers in Biology and Medicine198717641342210.1016/0010-4825(87)90060-6
- AugerJMAn infiltration game on k arcsNaval Research Logistics199138451152910.1002/1520-6750(199108)38:4<511::AID-NAV3220380406>3.0.CO;2-U
- BakırNOA Stackelberg game model for resource allocation in cargo container securityAnnals of Operations Research2011187152210.1007/s10479-010-0793-z
- BellMKanturskaUSchmöckerJFonzoneAAttacker-defender models and road network vulnerabilityPhilosophical Transactions of the Royal Society200836618721893190610.1098/rsta.2008.0019
- BrownGCarlyleMDiehlDKlineJWoodRKA two-sided optimization for theater ballistic missile defenseOperations Research200553574576310.1287/opre.1050.0231
- CappaneraPScaparraMPOptimal allocation of protective resources in shortest-path networksTransportation Science2010451648010.1287/trsc.1100.0340
- CaulkinsJPCrawfordGReuerPSimulation of adaptive response: A model of drug interdictionMathematical and Computer Modeling1993172375210.1016/0895-7177(93)90238-T
- ChurchRLScaparraMPMiddletonRSIdentifying critical infrastructure: The median and covering facility interdiction problemsAnnals of the Association of American Geographers200494349150210.1111/j.1467-8306.2004.00410.x
- DesaiJSenSA global optimization algorithm for reliable network designEuropean Journal of Operational Research201020011810.1016/j.ejor.2008.12.016
- DresherMA Sampling Inspection Problem in Arms Control Agreements: A Game-Theoretic Analysis, Memorandum RM-2972-ARPA1962
- FordLRFulkersonDRFlows in Networks19621415
- FulkersonDRHardingGCMaximizing the minimum source-sink path subject to a budget constraintMathematical Programming197713111611810.1007/BF01584329
- GharePMMontgomeryDCTurnerWCOptimal interdiction policy for a flow networkNaval Research Logistics Quarterly1971181374510.1002/nav.3800180103
- GibbensRJKellyFPDynamic routing in fully connected networksIMA Journal of Mathematical Control and Information1990717711110.1093/imamci/7.1.77
- GoldenBA problem in network interdictionNaval Research Logistics Quarterly197825471171310.1002/nav.3800250412
- Hohzaki R (2013). Inspection Games. Wiely Encyclopedia of Operations Research and Management Science, pp. 1–9.
- Kodialam M and Lakshman TV (2003). Detecting network intrusions via sampling: A game theoretical approach. In: Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications (IEEE INFOCOM), San Francisco, CA, Vol. 3, pp 1880–1889.
- LanchesterFWAircraft in Warfare: The Dawn of the Fourth Arm1916
- LawlerELCombinatorial Optimization: Networks and Matroid1976134138
- McMastersAWMustinTMOptimal interdiction of a supply networkNaval Research Logistics Quarterly197017326126810.1002/nav.3800170302
- MitchellTBellRDrug Interdiction Operations by the Coast Guard1980
- MorsePMKimballGEMethods of Operations Research1951
- MyungYSKimHJTchaDWDesign of communication networks with survivability constraintsManagement Science199945223825210.1287/mnsc.45.2.238
- OuveysiIWirthAOn design of a survivable network architecture for dynamic routing: Optimal solution strategy and an efficient heuristicEuropean Journal of Operational Research19991171304410.1016/S0377-2217(98)00015-0
- PereaFPuertoJRevisiting a game theoretic framework for the robust railway network design against intentional attacksEuropean Journal of Operational Research2013226228629210.1016/j.ejor.2012.11.015
- RuckleWHGeometric Games and their Applications1983
- RuckleWHFennellRHolmesPTFennemoreCAmbushing random walks I: Finite modelsOperations Research197624231432410.1287/opre.24.2.314
- SalmeronJDeception tactics for network interdiction: A multiobjective approachNetworks2012601455810.1002/net.20458
- SalmeronJWoodRKBaldickRAnalysis of electric grid security under terrorist threatIEEE Transactions on Power Systems200419290591210.1109/TPWRS.2004.825888
- ScaparraMPChurchRLA bilevel mixed-integer program for critical infrastructure protection planningComputers and Operations Research20083561905192310.1016/j.cor.2006.09.019
- SmithJCLimCSudarghoFSurvivable network design under optimal and heuristic interdiction scenariosJournal of Global Optimization200738218119910.1007/s10898-006-9067-3
- ThomasMNisgavYAn infiltration game with time dependent payoffNaval Research Logistics Quarterly197623229730210.1002/nav.3800230211
- WashburnAWoodKTwo-person zero-sum games for network interdictionOperations Research199543224325110.1287/opre.43.2.243
- WhitemanPSImproving single strike effectiveness for network interdictionMilitary Operations Research199944153010.5711/morj.4.4.15
- WollmerRDRemoving arcs from a networkOperations Research196412693494010.1287/opre.12.6.934
- WoodKDeterministic network interdictionMathematical and Computer Modeling199317211810.1016/0895-7177(93)90236-R