Journal articles on the topic 'Interdiction networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Interdiction networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gutin, Eli, Daniel Kuhn, and Wolfram Wiesemann. "Interdiction Games on Markovian PERT Networks." Management Science 61, no. 5 (2015): 999–1017. http://dx.doi.org/10.1287/mnsc.2014.1973.
Full textWei, Xiangyu, Kai Xu, Peng Jiao, Quanjun Yin, and Yabing Zha. "A Decomposition Approach for Stochastic Shortest-Path Network Interdiction with Goal Threshold." Symmetry 11, no. 2 (2019): 237. http://dx.doi.org/10.3390/sym11020237.
Full textHeld, Harald, and David L. Woodruff. "Heuristics for Multi-Stage Interdiction of Stochastic Networks." Journal of Heuristics 11, no. 5-6 (2005): 483–500. http://dx.doi.org/10.1007/s10732-005-3122-y.
Full textYaghlane, Asma Ben, M. Naceur Azaiez, and Mehdi Mrad. "System survivability in the context of interdiction networks." Reliability Engineering & System Safety 185 (May 2019): 362–71. http://dx.doi.org/10.1016/j.ress.2019.01.005.
Full textKosanoglu, Fuat, and Vicki M. Bier. "Target-oriented utility for interdiction of transportation networks." Reliability Engineering & System Safety 197 (May 2020): 106793. http://dx.doi.org/10.1016/j.ress.2020.106793.
Full textAhumada-Paras, Mareldi, Kaarthik Sundar, Russell Bent, and Anatoly Zlotnik. "N-k interdiction modeling for natural gas networks." Electric Power Systems Research 190 (January 2021): 106725. http://dx.doi.org/10.1016/j.epsr.2020.106725.
Full textJabarzare, Ziba, Hossein Zolfagharinia, and Mehdi Najafi. "Dynamic interdiction networks with applications in illicit supply chains." Omega 96 (October 2020): 102069. http://dx.doi.org/10.1016/j.omega.2019.05.005.
Full textCuffe, Paul. "A Comparison of Malicious Interdiction Strategies Against Electrical Networks." IEEE Journal on Emerging and Selected Topics in Circuits and Systems 7, no. 2 (2017): 205–17. http://dx.doi.org/10.1109/jetcas.2017.2704879.
Full textJiang, Shouyong, Yong Wang, Marcus Kaiser, and Natalio Krasnogor. "NIHBA: a network interdiction approach for metabolic engineering design." Bioinformatics 36, no. 11 (2020): 3482–92. http://dx.doi.org/10.1093/bioinformatics/btaa163.
Full textChestnut, Stephen R., and Rico Zenklusen. "Hardness and approximation for network flow interdiction." Networks 69, no. 4 (2017): 378–87. http://dx.doi.org/10.1002/net.21739.
Full textBayrak, Halil, and Matthew D. Bailey. "Shortest path network interdiction with asymmetric information." Networks 52, no. 3 (2008): 133–40. http://dx.doi.org/10.1002/net.20236.
Full textBartolacci, Michael R., and Stanko Dimitrov. "Promoting Resiliency in Emergency Communication Networks." International Journal of Information Systems for Crisis Response and Management 9, no. 1 (2017): 1–10. http://dx.doi.org/10.4018/ijiscram.2017010101.
Full textSundar, Kaarthik, Sidhant Misra, Russell Bent, and Feng Pan. "Credible Interdiction for Transmission Systems." IEEE Transactions on Control of Network Systems 8, no. 2 (2021): 738–48. http://dx.doi.org/10.1109/tcns.2021.3050128.
Full textHeld, Harald, Raymond Hemmecke, and David L. Woodruff. "A decomposition algorithm applied to planning the interdiction of stochastic networks." Naval Research Logistics 52, no. 4 (2005): 321–28. http://dx.doi.org/10.1002/nav.20079.
Full textShen, Siqian, J. Cole Smith, and Roshan Goli. "Exact interdiction models and algorithms for disconnecting networks via node deletions." Discrete Optimization 9, no. 3 (2012): 172–88. http://dx.doi.org/10.1016/j.disopt.2012.07.001.
Full textGoldberg, Noam. "Non-zero-sum nonlinear network path interdiction with an application to inspection in terror networks." Naval Research Logistics (NRL) 64, no. 2 (2017): 139–53. http://dx.doi.org/10.1002/nav.21738.
Full textGuvenc, Ismail, Farshad Koohifar, Simran Singh, Mihail L. Sichitiu, and David Matolak. "Detection, Tracking, and Interdiction for Amateur Drones." IEEE Communications Magazine 56, no. 4 (2018): 75–81. http://dx.doi.org/10.1109/mcom.2018.1700455.
Full textZhang, Youzhi, Qingyu Guo, Bo An, Long Tran-Thanh, and Nicholas R. Jennings. "Optimal Interdiction of Urban Criminals with the Aid of Real-Time Information." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1262–69. http://dx.doi.org/10.1609/aaai.v33i01.33011262.
Full textJanjarassuk, Udom, and Jeff Linderoth. "Reformulation and sampling to solve a stochastic network interdiction problem." Networks 52, no. 3 (2008): 120–32. http://dx.doi.org/10.1002/net.20237.
Full textLei, Ting L. "Evaluating the Vulnerability of Time-Sensitive Transportation Networks: A Hub Center Interdiction Problem." Sustainability 11, no. 17 (2019): 4614. http://dx.doi.org/10.3390/su11174614.
Full textLei, Ting L. "Identifying Critical Facilities in Hub-and-Spoke Networks: A Hub Interdiction Median Problem." Geographical Analysis 45, no. 2 (2013): 105–22. http://dx.doi.org/10.1111/gean.12006.
Full textWu, Yipeng, Zhilong Chen, Huadong Gong, Qilin Feng, Yicun Chen, and Haizhou Tang. "Defender–attacker–operator: Tri-level game-theoretic interdiction analysis of urban water distribution networks." Reliability Engineering & System Safety 214 (October 2021): 107703. http://dx.doi.org/10.1016/j.ress.2021.107703.
Full textSwierczynski, Pawel, Marc Fyrbiak, Philipp Koppe, Amir Moradi, and Christof Paar. "Interdiction in practice—Hardware Trojan against a high-security USB flash drive." Journal of Cryptographic Engineering 7, no. 3 (2016): 199–211. http://dx.doi.org/10.1007/s13389-016-0132-7.
Full textMohammadi, Abumoslem, and Javad Tayyebi. "Maximum Capacity Path Interdiction Problem with Fixed Costs." Asia-Pacific Journal of Operational Research 36, no. 04 (2019): 1950018. http://dx.doi.org/10.1142/s0217595919500180.
Full textYan, Jingwen, Kaiming Xiao, Cheng Zhu, Jun Wu, Guoli Yang, and Weiming Zhang. "Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things." Sensors 20, no. 20 (2020): 5943. http://dx.doi.org/10.3390/s20205943.
Full textGradoń, Kacper T., Janusz A. Hołyst, Wesley R. Moy, Julian Sienkiewicz, and Krzysztof Suchecki. "Countering misinformation: A multidisciplinary approach." Big Data & Society 8, no. 1 (2021): 205395172110138. http://dx.doi.org/10.1177/20539517211013848.
Full textLiu, Chanjuan, Yuan Liu, Enqiang Zhu, Qiang Zhang, Xiaopeng Wei, and Bin Wang. "Cross-Inhibitor: a time-sensitive molecular circuit based on DNA strand displacement." Nucleic Acids Research 48, no. 19 (2020): 10691–701. http://dx.doi.org/10.1093/nar/gkaa835.
Full textCormican, Kelly J., David P. Morton, and R. Kevin Wood. "Stochastic Network Interdiction." Operations Research 46, no. 2 (1998): 184–97. http://dx.doi.org/10.1287/opre.46.2.184.
Full textWood, R. Kevin. "Deterministic network interdiction." Mathematical and Computer Modelling 17, no. 2 (1993): 1–18. http://dx.doi.org/10.1016/0895-7177(93)90236-r.
Full textIsraeli, Eitan, and R. Kevin Wood. "Shortest-path network interdiction." Networks 40, no. 2 (2002): 97–111. http://dx.doi.org/10.1002/net.10039.
Full textXiao, Kaiming, Cheng Zhu, Junjie Xie, Yun Zhou, Xianqiang Zhu, and Weiming Zhang. "Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework." Entropy 22, no. 8 (2020): 894. http://dx.doi.org/10.3390/e22080894.
Full textLunday, Brian J., and Hanif D. Sherali. "A Dynamic Network Interdiction Problem." Informatica 21, no. 4 (2010): 553–74. http://dx.doi.org/10.15388/informatica.2010.305.
Full textSoleimani-Alyar, Maryam, and Alireza Ghaffari-Hadigheh. "Dynamic Network Interdiction Problem with Uncertain Data." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 26, no. 02 (2018): 327–42. http://dx.doi.org/10.1142/s0218488518500174.
Full textChen, Yan, Cheng Guo, and Shenghan Yu. "Bi-objective optimization models for network interdiction." RAIRO - Operations Research 53, no. 2 (2019): 461–72. http://dx.doi.org/10.1051/ro/2017050.
Full textPay, Babak Saleck, Jason R. W. Merrick, and Yongjia Song. "Stochastic network interdiction with incomplete preference." Networks 73, no. 1 (2018): 3–22. http://dx.doi.org/10.1002/net.21831.
Full textZenklusen, R. "Network flow interdiction on planar graphs." Discrete Applied Mathematics 158, no. 13 (2010): 1441–55. http://dx.doi.org/10.1016/j.dam.2010.04.008.
Full textLuo, Junren, Xiang Ji, Wei Gao, Wanpeng Zhang, and Shaofei Chen. "Goal Recognition Control under Network Interdiction Using a Privacy Information Metric." Symmetry 11, no. 8 (2019): 1059. http://dx.doi.org/10.3390/sym11081059.
Full textGuerrero Castro, Javier. "Estudios de ignorancia, inteligencia y la guerra contra las drogas en Colombia/ Ignorance studies, intelligence and the war on drugs in Colombia." URVIO - Revista Latinoamericana de Estudios de Seguridad, no. 21 (November 13, 2017): 158. http://dx.doi.org/10.17141/urvio.21.2017.2943.
Full textMuckensturm, Joshua R., and Dave C. Longhorn. "Assessing the vulnerability of military theater distribution routes." Journal of Defense Analytics and Logistics 3, no. 1 (2019): 60–82. http://dx.doi.org/10.1108/jdal-07-2018-0012.
Full textWei, Xiangyu, Cheng Zhu, Kaiming Xiao, Quanjun Yin, and Yabing Zha. "Shortest Path Network Interdiction With Goal Threshold." IEEE Access 6 (2018): 29332–43. http://dx.doi.org/10.1109/access.2018.2838570.
Full textAmuru, SaiDhiraj, R. Michael Buehrer, and Mihaela van der Schaar. "Blind Network Interdiction Strategies—A Learning Approach." IEEE Transactions on Cognitive Communications and Networking 1, no. 4 (2015): 435–49. http://dx.doi.org/10.1109/tccn.2016.2542078.
Full textCasas, Irene, Eric Delmelle, and Justin Yates. "Geographic characteristics of a network interdiction problem." GeoJournal 81, no. 1 (2014): 37–53. http://dx.doi.org/10.1007/s10708-014-9595-1.
Full textBud Whiteman, Philip S. "Improving Single Strike Effectiveness for Network Interdiction." Military Operations Research 4, no. 4 (1999): 15–30. http://dx.doi.org/10.5711/morj.4.4.15.
Full textZhao, Jia, and Gang Sun. "Reliable Network Interdiction Models with Multiple Unit Costs." Mathematical and Computational Applications 21, no. 4 (2016): 50. http://dx.doi.org/10.3390/mca21040050.
Full textRocco S, Claudio M., and José Emmanuel Ramirez-Marquez. "Deterministic network interdiction optimization via an evolutionary approach." Reliability Engineering & System Safety 94, no. 2 (2009): 568–76. http://dx.doi.org/10.1016/j.ress.2008.06.008.
Full textBertsimas, Dimitris, Ebrahim Nasrabadi, and James B. Orlin. "On the power of randomization in network interdiction." Operations Research Letters 44, no. 1 (2016): 114–20. http://dx.doi.org/10.1016/j.orl.2015.11.005.
Full textSalmerón, Javier. "Deception tactics for network interdiction: A multiobjective approach." Networks 60, no. 1 (2011): 45–58. http://dx.doi.org/10.1002/net.20458.
Full textWashburn, Alan, and Kevin Wood. "Two-Person Zero-Sum Games for Network Interdiction." Operations Research 43, no. 2 (1995): 243–51. http://dx.doi.org/10.1287/opre.43.2.243.
Full textPavlikov, Konstantin. "Improved formulations for minimum connectivity network interdiction problems." Computers & Operations Research 97 (September 2018): 48–57. http://dx.doi.org/10.1016/j.cor.2018.04.012.
Full textMurray, Alan T., Timothy C. Matisziw, and Tony H. Grubesic. "Critical network infrastructure analysis: interdiction and system flow." Journal of Geographical Systems 9, no. 2 (2007): 103–17. http://dx.doi.org/10.1007/s10109-006-0039-4.
Full text