Many-to-Many Game-Theoretic Approach for the Measurement of Transportation Network Vulnerability
暂无分享,去创建一个
Sanguthevar Rajasekaran | Reda A. Ammar | Dolly Sharma | Nicholas E Lownes | Qixing Wang | Saleh Ibrahim | S. Rajasekaran | R. Ammar | N. Lownes | Dolly Sharma | Saleh Ibrahim | Qixing Wang
[1] Ravindra K. Ahuja,et al. Network Flows: Theory, Algorithms, and Applications , 1993 .
[2] M G H Bell,et al. Attacker–defender models and road network vulnerability , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[3] Massimo Marchiori,et al. Vulnerability and protection of infrastructure networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[4] Pamela Murray-Tuite. Transportation Network Risk Profile for an Origin–Destination Pair , 2008 .
[5] Gilbert Laporte,et al. A game theoretic framework for the robust railway transit network design problem , 2010 .
[6] R. Vohra,et al. Finding the most vital arcs in a network , 1989 .
[7] Darren M. Scott,et al. Network Robustness Index : a new method for identifying critical links and evaluating the performance of transportation networks , 2006 .
[8] Pamela Murray-Tuite,et al. Methodology for Determining Vulnerable Links in a Transportation Network , 2004 .
[9] Michael G.H. Bell,et al. Risk-averse user equilibrium traffic assignment: an application of game theory , 2002 .
[10] Satish V. Ukkusuri,et al. A methodology to assess the criticality of highway transportation networks , 2009 .
[11] Joseph N. Prashker,et al. The applicability of non-cooperative game theory in transport analysis , 2006 .
[12] Brian Michael Jenkins,et al. Explosives and Incendiaries Used in Terrorist Attacks on Public Surface Transportation , 2010 .
[13] H. W. Corley,et al. Most vital links and nodes in weighted networks , 1982, Oper. Res. Lett..
[14] Larry J. LeBlanc,et al. An Algorithm for the Discrete Network Design Problem , 1975 .
[15] Y. She. Urban Transportation Networks: Equilibrium Analysis with Mathematical Programming Methods , 1985 .
[16] Michael G. H. Bell. The use of game theory to measure the vulnerability of stochastic networks , 2003, IEEE Trans. Reliab..