journal article Jun 01, 2008

A bilevel mixed-integer program for critical infrastructure protection planning

View at Publisher Save 10.1016/j.cor.2006.09.019
Topics

No keywords indexed for this article. Browse by subject →

References
40
[1]
Church RL, Scaparra MP. Protecting critical assets: the r-interdiction median problem with fortification. Geographical Analysis, 2006, forthcoming. 10.1111/j.1538-4632.2007.00698.x
[2]
Hakimi "Optimum location of switching centers and the absolute centers and medians of a graph" Operations Research (1964) 10.1287/opre.12.3.450
[3]
Scaparra MP, Church RL. An optimal approach for the interdiction median problem with fortification. Working paper no. 78, Kent Business School, 2005. University of Kent, UK (Available at 〈http://www.kent.ac.uk/kbs/research-information/working-papers/)〉.
[4]
Wollmer "Removing arcs from a network" Operations Research (1964) 10.1287/opre.12.6.934
[5]
Wood "Deterministic network interdiction" Mathematical and Computer Modeling (1993) 10.1016/0895-7177(93)90236-r
[6]
Church "Identifying critical infrastructure: the median and covering facility interdiction problems" Annals of the Association of American Geographers (2004) 10.1111/j.1467-8306.2004.00410.x
[7]
Brown GG, Carlyle WM, Salmeron J, Wood K. Analyzing the vulnerability of critical infrastructure to attack and planning defenses. In: Greenberg HJ, series editor. Smith JC. volume editor, Tutorial in operations research: emerging theory, methods, and applications, INFORMS 2005. 2005. 10.1287/educ.1053.0018
[8]
Hansen "New branch and bound rules for linear bilevel programming" SIAM Journal on Scientific and Statistical Computing (1992) 10.1137/0913069
[9]
Salmeron "Analysis of electric grid security under terrorist threat" IEEE Transactions on Power Systems (2004) 10.1109/tpwrs.2004.825888
[10]
Jüttner "Supply chain risk management: outlining an agenda for future research" International Journal of Logistics: Research and Applications (2003) 10.1080/13675560310001627016
[11]
Sheffi "Supply chain management under the threat of international terrorism" International Journal of Logistics Management (2001) 10.1108/09574090110806262
[12]
Rice "Building a secure and resilient supply network" Supply Chain Management Review (2003)
[13]
Ball "Network reliability" (1995)
[14]
Raghavan "Network connectivity" (1997)
[15]
Balakrishnan "Connectivity-splitting models for survivable network design" Networks (2003) 10.1002/net.10100
[16]
Drezner "Heuristic solution methods for two location problems with unreliable facilities" Journal of the Operational Research Society (1987) 10.1057/jors.1987.88
[17]
Lee "On solving unreliable planar location problems" Computers and Operations Research (2001) 10.1016/s0305-0548(99)00120-3
[18]
Bundschuh M, Klabjan D, Thurston DL. Modelling robust and reliable supply chains. Working paper, University of Illinois at Urbana-Champaign, 2003.
[19]
Snyder "Reliability models for facility location: the expected failure cost case" Transportation Science (2005) 10.1287/trsc.1040.0107
[20]
O’Hanley JR. Optimizing reserve selection planning in the face of uncertain site loss. PhD thesis, Department of Environmental Science, Policy and Management, University of California, Berkeley, 2005.
[21]
Cormican "Stochastic network interdiction" Operations Research (1998) 10.1287/opre.46.2.184
[22]
Fulkerson "Maximizing the minimum source-sink path subject to a budget constraint" Mathematical Programming (1977) 10.1007/bf01584329
[23]
Israeli "Shortest-path network interdiction" Networks (2002) 10.1002/net.10039
[24]
Lim C, Smith JC. Algorithms for discrete and continuous multicommodity flow network interdiction problems, IIE Transactions 2006, to appear. 10.1080/07408170600729192
[25]
Israeli E. System interdiction and defense. PhD dissertation, Operations Research Department, Naval Post Graduate School, Monterey, CA, 1999.
[26]
Stackelberg (1952)
[27]
Church RL, Cohon JL. Multiobjective location analysis of regional energy facility siting problems. Report prepared for the US Energy Research and Development Administration (BNL 50567), 1976. 10.2172/7294043
[28]
Hanjoul "A facility location problem with clients’ preference orderings" Regional Science and Urban Economics (1987) 10.1016/0166-0462(87)90011-1
[29]
Bard (1998)
[30]
Dempe (2002)
[31]
Moore "The mixed integer linear bilevel programming problem" Operations Research (1990) 10.1287/opre.38.5.911
[32]
Vicente "Discrete linear bilevel programming problem" Journal of Optimization Theory and Applications (1996) 10.1007/bf02275351
[33]
Karlof "Bilevel programming applied to the flow shop scheduling problem" Computers and Operations Research (1996) 10.1016/0305-0548(95)00034-8
[34]
Morton DP, Pan F.,Saegar KJ. Models for nuclear smuggling interdiction. In: Higle JL, Römisch W, editors, Stochastic Programing E-Print Series (SPEPS); 2006-5.
[35]
Ahuja (1993)
[36]
Church "COBRA: a new formulation of the classic p-median location problem" Annals of Operations Research (2003) 10.1023/a:1026142406234
[37]
Goodchild M, Noronha V. Location-allocation for small computers. Monograph No. 8., Department of Geography, The University of Iowa, Iowa City, 1983.
[38]
Alp "An efficient genetic algorithm for the p-median problem" Annals of Operations Research (2003) 10.1023/a:1026130003508
[39]
Gerrard "Closest assignment constraints and location models: properties and structure" Location Science (1996) 10.1016/s0966-8349(97)00001-6
[40]
Rojeski "Central facilities location under an investment constraint" Geographical Analysis (1970) 10.1111/j.1538-4632.1970.tb00864.x
Cited By
301
Safety Science
Metrics
301
Citations
40
References
Details
Published
Jun 01, 2008
Vol/Issue
35(6)
Pages
1905-1923
License
View
Cite This Article
Maria P. Scaparra, Richard L. Church (2008). A bilevel mixed-integer program for critical infrastructure protection planning. Computers & Operations Research, 35(6), 1905-1923. https://doi.org/10.1016/j.cor.2006.09.019
Related

You May Also Like

Variable neighborhood search

N. Mladenović, P. Hansen · 1997

3,415 citations

A genetic algorithm for the vehicle routing problem

Barrie M. Baker, M.A. Ayechew · 2003

647 citations

Reinforcement learning for combinatorial optimization: A survey

Nina Mazyavkina, Sergey Sviridov · 2021

565 citations