[1] |
Albert L A, Nikolaev A, Jacobson S H. Homeland security research opportunities[J]. IIE Transactions, 2023, 55(1):22-31.
|
[2] |
Smith J C, Song Y J. A survey of network interdiction models and algorithms[J]. European Journal of Operational Research, 2020, 283(3):797-811.
|
[3] |
项寅. 网络阻断问题研究热点及发展方向[J]. 运筹与管理, 2022, 31(1):128-134.
|
|
Xiang Y. A bi-level network interdiction model andTabu-search method for preventing terrorist invasion[J]. Operations Research and Management Science, 2022, 31(1):128-134.
|
[4] |
Cormican K J, Morton D P, Wood R K. Stochastic Network Interdiction[J]. Operations Research,1998, 46(2):184-197.
|
[5] |
Enayaty A, Rainwater C E, Sharkey T C. A logic-based decomposition approach for multi-period network interdiction models[J]. Omega, 2019, 87:71-85.
|
[6] |
Jabarzare Z, Zolfagharinia H, Najafi M. Dynamic interdiction networks with applications in illicit supply chains[J]. Omega, 2020, 96:23-37.
|
[7] |
Israeli E, Wood R K. Shortest-path network interdiction[J]. Networks, 2002, 40(4):97-111.
|
[8] |
Xie X D, Felipe A V. An interdependent network interdiction model for disrupting sex trafficking networks[J]. Production and Operations Management, 2022, 31(6):2695-2713
|
[9] |
Yan J W, Xiao K M, Zhu C. Bi-layer shortest-path network interdiction game for internet of things[J]. Sensors, 2020,20:1-19.
|
[10] |
Morton D, Pan F, Saeger K. Models for nuclear smuggling interdiction[J]. IIE Transactions, 2007, 39(1):3-14.
|
[11] |
Pan F, Morton D P.Minimizing a stochastic maximum-reliability Path[J]. Networks, 2010, 52:111-119.
|
[12] |
Zhang J, Zhuang J, Behlendorf B. Stochastic shortest path network interdiction with a case study of Arizona-Mexico border[J]. Reliability Engineering and System Safety, 2018, 33(1):68-98.
|
[13] |
Karabulut E, Aras N, Altınel I K. Optimal sensor deployment to increase the security of the maximal breach path in border surveillance[J]. European Journal of Operational Research, 2017, 259(1):19-36.
|
[14] |
项寅. 恐怖分子入侵阻止网络的双层规划建模与禁忌搜索分析[J]. 运筹与管理, 2020,29(10):1-11.
|
|
Xiang Y. A bi-level network interdiction model and Tabu-search method for preventing terrorist invasion[J]. Operations Research and Management Science, 2020, 29(10):1-11.
|
[15] |
项寅. 不对称信息下反恐阻止网络设计[J]. 中国管理科学, 2020,28(9):188-198.
|
|
Xiang Y. Interdiction network design for preventing terrorist invasion with asymmetric information[J]. Chinese Journal of Management Science,2020,28(9):188-198.
|
[16] |
Xiang Y, Wei H. Joint optimizing network interdiction and emergency facility location in terrorist attacks[J]. Computers & Industrial Engineering, 2020, 144(6):1-15.
|
[17] |
Haywood A B, Lunday B J, Robbins M J. Intruder detection and interdiction modeling: A bilevel programming approach for ballistic missile defense asset location[J].Omega,2022,DOI:10.1016/j.omega.2022.102640 .
|
[18] |
Kennedy K T, Deckro R F, Moore J T, et al. Nodal interdiction[J]. Mathematical & Computer Modelling, 2011, 54:316-325
|
[19] |
Xiao K M, Zhu C, Zhang W M, et al. The Bi-objective shortest path network interdiction problem: Subgraph algorithm and saturation property[J]. IEEE Access, 2020(8):1-15
|
[20] |
Borrero J S, Prokopyev O A, Sauré D. Sequential shortest path interdiction with incomplete information[J]. Decision Analysis, 2015, 21:1-31.
|