The interdiction problem arises in a variety of areas including military logistics, infectious disease control, and counter-terrorism. In the typical formulation of network interdiction. the task of the interdictor is to find a set of edges in a weighted network such that the removal of those edges would increase the cost to an evader of traveling on a path through the network. Our work is motivated by cases in which the evader has incomplete information about the network or lacks planning time or computational power, e.g. when authorities set up roadblocks to catch bank robbers, the criminals do not know all the roadblock locations or the best path to use for their escape. We introduce a model of network interdiction in which the motion of...
We study sequential interdiction when the interdictor has incomplete initial information about the n...
International audienceGiven a graph G and an interdiction budget k, the Maximum Clique Interdiction ...
This project describes a lexicographic network interdiction model for identifying optimal locations ...
Abstract. The interdiction problem arises in a variety of areas including military logistics, infect...
Shortest path network interdiction is a combinatorial optimiza-tion problem on an activity network a...
Abstract. In network interdiction problems, evaders (e.g., hostile agents or data packets) may be mo...
We study bilevel optimization problems that model decentralized decision-making settings with two in...
asks to optimally place sensors on a network to detect Markovian motion by one or more evaders. It w...
Traditional network interdiction refers to the problem of an interdictor trying to reduce the throug...
Thesis (Ph.D.)--Boston UniversityNetwork interdiction problems consist of games between an attacker ...
We study a network security game arising in the interdiction of fare evasion or smuggling. A defende...
Preventing crimes or terrorist attacks in urban areas is challenging. Law enforcement officers need ...
Large scale smuggling of illegal goods is a longstanding problem, with $1.4b and thousands of agents...
Security forces are deployed to protect networks that are threatened by multiple intruders. To selec...
Several scenarios exist in the modern interconnected world which call for efficient network interdic...
We study sequential interdiction when the interdictor has incomplete initial information about the n...
International audienceGiven a graph G and an interdiction budget k, the Maximum Clique Interdiction ...
This project describes a lexicographic network interdiction model for identifying optimal locations ...
Abstract. The interdiction problem arises in a variety of areas including military logistics, infect...
Shortest path network interdiction is a combinatorial optimiza-tion problem on an activity network a...
Abstract. In network interdiction problems, evaders (e.g., hostile agents or data packets) may be mo...
We study bilevel optimization problems that model decentralized decision-making settings with two in...
asks to optimally place sensors on a network to detect Markovian motion by one or more evaders. It w...
Traditional network interdiction refers to the problem of an interdictor trying to reduce the throug...
Thesis (Ph.D.)--Boston UniversityNetwork interdiction problems consist of games between an attacker ...
We study a network security game arising in the interdiction of fare evasion or smuggling. A defende...
Preventing crimes or terrorist attacks in urban areas is challenging. Law enforcement officers need ...
Large scale smuggling of illegal goods is a longstanding problem, with $1.4b and thousands of agents...
Security forces are deployed to protect networks that are threatened by multiple intruders. To selec...
Several scenarios exist in the modern interconnected world which call for efficient network interdic...
We study sequential interdiction when the interdictor has incomplete initial information about the n...
International audienceGiven a graph G and an interdiction budget k, the Maximum Clique Interdiction ...
This project describes a lexicographic network interdiction model for identifying optimal locations ...