JC Smith, Y Song - European Journal of Operational Research, 2020 - Elsevier
This paper discusses the development of interdiction optimization models and algorithms, with an emphasis on mathematical programming techniques and future research challenges …
The illicit wildlife trade is a pervasive and global problem that has far-reaching impacts on both society and the environment. Aside from threatening numerous species around the …
M Mirzaei, SMJM Al-e, MA Shirazi - Computers & Industrial Engineering, 2021 - Elsevier
We study the interdiction of smuggling network that arranging the activities of the police in order to successfully interdict criminals in smuggling goods. This work contributes to the …
Y Xiang - Reliability Engineering & System Safety, 2023 - Elsevier
This study presents a novel maximal reliable path interdiction (MRPI) problem in application to traffic inspection and intercepting invading attackers. This problem differs from traditional …
U Sadana, E Delage - INFORMS Journal on Computing, 2023 - pubsonline.informs.org
Conditional value at risk (CVaR) is widely used to account for the preferences of a risk- averse agent in extreme loss scenarios. To study the effectiveness of randomization in …
C Yu, Z Zou, Y Shao, F Zhang - Kybernetes, 2020 - emerald.com
Purpose The purpose of this paper is to develop a novel integrated supplier selection approach incorporating decision maker's risk attitude using the artificial neural network …
K Zheng, LA Albert - Naval Research Logistics (NRL), 2019 - Wiley Online Library
Abstract Information technology (IT) infrastructure relies on a globalized supply chain that is vulnerable to numerous risks from adversarial attacks. It is important to protect IT …
Q Li, M Li, R Zhang, J Gan - Reliability Engineering & System Safety, 2021 - Elsevier
This paper studies a capacitated facility location and protection problem against the boundedly rational attacker that merges probabilistic fortification and interdiction, and …
We consider a new class of max flow network interdiction problems, where the defender is able to introduce new arcs to the network after the attacker has made their interdiction …