877
Views
158
CrossRef citations to date
0
Altmetric
ORIGINAL ARTICLES

Models for nuclear smuggling interdiction

, &
Pages 3-14 | Received 01 Apr 2005, Accepted 01 Nov 2005, Published online: 08 Apr 2011

REFERENCES

  • Ahuja , R. K. , Magnanti , T. L. and Orlin , J. B. 1993 . Network Flows , Upper Saddle River, NJ : Prentice Hall .
  • Bailey , M. D. and Bayrak , H. 2005 . Network interdiction under asymmetric information , Pittsburgh, PA : Industrial Engineering Department, University of Pittsburgh . Technical report, 15260
  • Bailey , M. D. , Shechter , S. M. and Schaefer , A. J. 2004 . SPAR: stochastic programming with adversarial recourse , Pittsburgh, PA : Industrial Engineering Department, University of Pittsburgh . Technical report, 15260
  • Ball , D. Y. 1998 . The US second line of defense: preventing nuclear smuggling across Russia's borders , Washington, DC : Center for the Strategic and International Studies . PONARS memo # 50
  • Ball , M. O. , Golden , B. L. and Vohra , R. V. 1989 . Finding the most vital arcs in a network . Operations Research Letters , 8 : 73 – 76 .
  • Bard , J. F. 1991 . Some properties of the bilevel programming problem . Journal of Optimization Theory and Applications , 68 : 371 – 378 .
  • Bard , J. F. 1998 . Practical Bilevel Optimization: Algorithms and Applications , Boston, MA : Kluwer .
  • Ben-Ayed , O. 1993 . Bi-level linear programming . Computers & Operations Research , 20 : 485 – 501 .
  • Benders , J. F. 1962 . Partitioning procedures for solving mixed-variables programming problems . Numerische Mathematik , 4 : 238 – 252 .
  • Brown , G. G. , Carlyle , M. , Harney , R. , Skroch , E. and Wood , R. K. 2004 . How to optimally interdict a belligerent project to develop a nuclear weapon , Monterey, CA : Operations Research Department, Naval Postgraduate School . Technical report, 93943
  • Chern , M. S. and Lin , K. C. 1995 . Interdicting the activities of a linear program—a parametric approach . European Journal of Operational Research , 86 : 580 – 591 .
  • Cobb , D. 2002 . Statement of Associate Director, Threat Reduction, Los Alamos National Laboratory, submitted to Committee on Energy and Natural Resources, US Senate, July 10
  • Corley , H. W. and Sha , D. Y. 1982 . Most vital links and nodes in weighted networks . Operations Research Letters , 1 : 157 – 160 .
  • Cormican , K. , Morton , D. P. and Wood , R. K. 1998 . Stochastic network interdiction . Operations Research , 46 : 184 – 197 .
  • Fulkerson , D. R. and Harding , G. C. 1977 . Maximizing the minimum source-sink path subject to a budget constraint . Mathematical Programming , 13 : 116 – 118 .
  • Geoffrion , A. M. 1972 . Generalized Benders decomposition . Journal of Optimization Theory and Applications , 10 : 237 – 260 .
  • Ghare , P. M. , Montgomery , D. C. and Turner , T. M. 1971 . Optimal interdiction policy for a flow network . Naval Research Logistics Quarterly , 18 : 37 – 45 .
  • Golden , B. 1978 . A problem in network interdiction . Naval Research Logistics Quarterly , 25 : 711 – 713 .
  • Hemmecke , R. , Schultz , R. and Woodruff , D. L. 2003 . “ Interdicting stochastic networks with binary interdiction effort ” . In Network Interdiction and Stochastic Integer Programming , Edited by: Woodruff , D. L. Boston, MA : Kluwer .
  • International Atomic Energy Agency . 2004 . Illicit nuclear trafficking database , International Atomic Energy Agency . available at http://www.iaea.org/NewsCenter/Features/RadSources/Fact_Figureshtml. Accessed 25 September 2006
  • Ishizuka , Y. , Shimizu , K. and Bard , J. F. 1997 . Nondifferentiable and Two-Level Programming , Boston, MA : Kluwer .
  • Israeli , E. and Wood , R. K. 2001 . System interdiction and defense , Monterey, CA : Operations Research Department, Naval Postgraduate School . Working paper, 93943
  • Israeli , E. and Wood , R. K. 2002 . Shortest-path network interdiction . Networks , 40 : 97 – 111 .
  • Jones , G. L. 2002 . Nuclear nonproliferation: US efforts to help other countries combat nuclear smuggling need strengthened coordination and planning, Report to the Ranking Minority Member, Subcommittee on Emerging Threats, and Capabilities, Committee on Armed Services, US Senate, GAO-02-426, May 2002
  • Kelley , J. E. 1960 . The cutting plane method for solving convex programs . SIAM Journal of Industrial and Applied Mathematics , 8 : 703 – 712 .
  • Laporte , G. and Louveaux , F. V. 1993 . The integer L-shaped method for stochastic integer programs with complete recourse . Operations Research Letters , 13 : 133 – 142 .
  • Malik , K. , Mittal , A. K. and Gupta , S. K. 1989 . The k-most vital arcs in the shortest path problem . Operations Research Letters , 8 : 223 – 227 .
  • McMasters , A. W. and Mustin , T. M. 1970 . Optimal interdiction of a supply network . Naval Research Logistics Quarterly , 17 : 261 – 268 .
  • Morton , D. P. and Wood , R. K. 1999 . Restricted-recourse bounds for stochastic linear programming . Operations Research , 47 : 943 – 956 .
  • National Nuclear Security Administration . 2006 . Office of International Material Protection and Cooperation , Department of Energy and National Nuclear Security Administration . Overview of NA-25. available at http://www.nnsa.doe.gov/na-20/na25_fact.shtml. Accessed 25 September 2006
  • Pan , F. 2005 . Models and methods for stochastic network interdiction , PhD thesis Austin, TX : The University of Texas at Austin . 78712
  • Pan , F. , Charlton , W. and Morton , D. P. 2003 . “ Interdicting smuggled nuclear material ” . In Network Interdiction and Stochastic Integer Programming , Edited by: Woodruff , D. L. Boston, MA : Kluwer .
  • Reed , B. K. 1994 . Models for proliferation interdiction response analysis , MS thesis Monterey, CA : Naval Postgraduate School . 93943
  • Richardson , B. 1998 . Department of Energy press release: Russian Federation dedicate “second line of defense” , US nuclear detection technology to help secure Russian borders . September 2
  • Van Slyke , R. M. and Wets , R. J.-B. 1969 . L-shaped linear programs with applications to optimal control and stochastic programming . SIAM Journal on Applied Mathematics , 17 : 638 – 663 .
  • Washburn , A. R. and Wood , R. K. 1994 . Two-person zero-sum games for network interdiction . Operations Research , 43 : 243 – 251 .
  • Wollmer , R. D. 1964 . Removing arcs from a network . Operations Research , 12 : 934 – 940 .
  • Wollmer , R. D. 1980 . Two-stage linear programming under uncertainty with 0-1 integer first stage variables . Mathematical Programming , 19 : 279 – 288 .
  • Wood , R. K. 1993 . Deterministic network interdiction . Mathematical and Computer Modeling , 17 : 1 – 18 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.