86
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Solution algorithms for shortest path network interdiction with symmetric and asymmetric information

&
Article: 2247964 | Received 03 Mar 2023, Accepted 10 Aug 2023, Published online: 21 Aug 2023

References

  • Aksen, D., Akca, S.Ş., & Aras, N. (2014). A bilevel partial interdiction problem with capacitated facilities and demand outsourcing. Computers & Operations Research, 41, 346–358. https://doi.org/10.1016/j.cor.2012.08.013
  • Altner, D. S., Ergun, Ö., & Uhan, N. A. (2010). The maximum flow network interdiction problem: Valid inequalities, integrality gaps, and approximability. Operations Research Letters, 38(1), 33–38. https://doi.org/10.1016/j.orl.2009.09.013
  • Assimakopoulos, N. (1987). A network interdiction model for hospital infection control. Computers in Biology and Medicine, 17(6), 413–422. https://doi.org/10.1016/0010-4825(87)90060-6
  • Azizi, E., & Seifi, A. (2023). Shortest path network interdiction with incomplete information: a robust optimization approach. Annals of Operations Research, 1–33.
  • Baycik, N. O., & Sullivan, K. M. (2019). Robust location of hidden interdictions on a shortest path network. IISE Transactions, 51(12), 1332–1347. https://doi.org/10.1080/24725854.2019.1597316
  • Bayrak, H., & Bailey, M. D. (2008). Shortest path network interdiction with asymmetric information. Networks: An International Journal, 52(3), 133–140. https://doi.org/10.1002/net.20236
  • Borrero, J. S., Prokopyev, O. A., & Sauré, D. (2016). Sequential shortest path interdiction with incomplete information. Decision Analysis, 13(1), 68–98. https://doi.org/10.1287/deca.2015.0325
  • Brown, G., Carlyle, M., Salmerón, J., & Wood, K. (2006). Defending critical infrastructure. Interfaces, 36(6), 530–544. https://doi.org/10.1287/inte.1060.0252
  • Cappanera, P., & Scaparra, M. P. (2011). Optimal allocation of protective resources in shortest-path networks. Transportation Science, 45(1), 64–80. https://doi.org/10.1287/trsc.1100.0340
  • Dempe, S. (2002). Foundations of bilevel programming. Springer Science & Business Media.
  • Ding, T., Yao, L., & Li, F. (2018). A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection. Reliability Engineering & System Safety, 169, 179–186. https://doi.org/10.1016/j.ress.2017.08.020
  • Forghani, A., Dehghanian, F., Salari, M., & Ghiami, Y. (2020). A bi-level model and solution methods for partial interdiction problem on capacitated hierarchical facilities. Computers & Operations Research, 114, 104831. https://doi.org/10.1016/j.cor.2019.104831
  • Holzmann, T., & Smith, J. C. (2021). The shortest path interdiction problem with randomized interdiction strategies: Complexity and algorithms. Operations Research, 69(1), 82–99. https://doi.org/10.1287/opre.2020.2023
  • Israeli, E., & Wood, R. K. (2002). Shortest-path network interdiction. Networks: An International Journal, 40(2), 97–111. https://doi.org/10.1002/net.10039
  • Lim, C., & Smith, J. C. (2007). Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Transactions, 39(1), 15–26. https://doi.org/10.1080/07408170600729192
  • Malaviya, A., Rainwater, C., & Sharkey, T. (2012). Multi-period network interdiction problems with applications to city-level drug enforcement. IIE Transactions, 44(5), 368–380. https://doi.org/10.1080/0740817X.2011.602659
  • Morton, D. P., Pan, F., & Saeger, K. J. (2007). Models for nuclear smuggling interdiction. IIE Transactions, 39(1), 3–14. https://doi.org/10.1080/07408170500488956
  • Nandi, A. K., & Medal, H. R. (2016). Methods for removing links in a network to minimize the spread of infections. Computers & Operations Research, 69, 10–24. https://doi.org/10.1016/j.cor.2015.11.001
  • Prince, M., Smith, J. C., & Geunes, J. (2013). A three-stage procurement optimization problem under uncertainty. Naval Research Logistics (NRL), 60(5), 395–412. https://doi.org/10.1002/nav.21541
  • Sadeghi, S., Seifi, A., & Azizi, E. (2017). Trilevel shortest path network interdiction with partial fortification. Computers & Industrial Engineering, 106, 400–411. https://doi.org/10.1016/j.cie.2017.02.006
  • Salmerón, J. (2012). Deception tactics for network interdiction: A multiobjective approach. Networks, 60(1), 45–58. https://doi.org/10.1002/net.20458
  • Salmeron, J., Wood, K., & Baldick, R. (2009). Worst-case interdiction analysis of large-scale electric power grids. IEEE Transactions on Power Systems, 24(1), 96–104. https://doi.org/10.1109/TPWRS.2008.2004825
  • Scaparra, M. P., & Church, R. L. (2008). A bilevel mixed-integer program for critical infrastructure protection planning. Computers & Operations Research, 35(6), 1905–1923. https://doi.org/10.1016/j.cor.2006.09.019
  • Smith, J. C., Lim, C., & Sudargho, F. (2007). Survivable network design under optimal and heuristic interdiction scenarios. Journal of Global Optimization, 38(2), 181–199. https://doi.org/10.1007/s10898-006-9067-3
  • Smith, J. C., & Song, Y. (2020). A survey of network interdiction models and algorithms. European Journal of Operational Research, 283(3), 797–811.
  • Sullivan, K. M., Morton, D. P., Pan, F., & Cole Smith, J. (2014). Securing a border under asymmetric information. Naval Research Logistics (NRL), 61(2), 91–100. https://doi.org/10.1002/nav.21567
  • Wollmer, R. (1964). Removing arcs from a network. Operations Research, 12(6), 934–940. https://doi.org/10.1287/opre.12.6.934
  • Wood, R. K. (1993). Deterministic network interdiction. Mathematical and Computer Modelling, 17(2), 1–18. https://doi.org/10.1016/0895-7177(93)90236-R
  • Wu, X., & Conejo, A. J. (2017). An efficient tri-level optimization model for electric grid defense planning. IEEE Transactions on Power Systems, 32(4), 2984–2994. https://doi.org/10.1109/TPWRS.2016.2628887
  • Yuan, W., Zhao, L., & Zeng, B. (2014). Optimal power grid protection through a defender–attacker–defender model. Reliability Engineering & System Safety, 121, 83–89. https://doi.org/10.1016/j.ress.2013.08.003
  • Zhang, X., Zheng, Z., Zhang, S., & Du, W. (2016). Partial interdiction median models for multi-sourcing supply systems. The International Journal of Advanced Manufacturing Technology, 84(1-4), 165–181. https://doi.org/10.1007/s00170-015-7756-0
  • Zhao, L., & Zeng, B. (2013). Vulnerability analysis of power grids with line switching. IEEE Transactions on Power Systems, 28(3), 2727–2736. https://doi.org/10.1109/TPWRS.2013.2256374

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.