An attrition game on a network ruled by Lanchester’s square law
暂无分享,去创建一个
[1] Joseph M. Kahn,et al. Imaging diversity receivers for high-speed infrared wireless communication , 1998, IEEE Commun. Mag..
[2] Ravindra K. Ahuja,et al. Network Flows , 2011 .
[3] Javier Salmerón,et al. Deception tactics for network interdiction: A multiobjective approach , 2012, Networks.
[4] Gerald G. Brown,et al. A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..
[5] Maria Paola Scaparra,et al. Optimal Allocation of Protective Resources in Shortest-Path Networks , 2011, Transp. Sci..
[6] D. Tcha,et al. Design of Communication Networks with Survivability Constraints , 1999 .
[7] Javier Salmeron,et al. The Value of Recovery Transformers in Protecting an Electric Transmission Grid Against Attack , 2015, IEEE Transactions on Power Systems.
[8] Ami Arbel. A weighted-gradient approach to multi-objective linear programming problems using the analytic hierarchy process , 1993 .
[9] Philip M. Morse,et al. Methods of Operations Research , 1952 .
[10] J. Salmeron,et al. Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.
[11] Zoë K Harris. Efficient allocation of resources to prevent HIV infection among injection drug users: the Prevention Point Philadelphia (PPP) needle exchange program. , 2006, Health economics.
[12] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[13] R. Kevin Wood,et al. The multi-terminal maximum-flow network-interdiction problem , 2011, Eur. J. Oper. Res..
[14] Leo Liberti,et al. Introduction to Global Optimization , 2006 .
[15] John M. Auger. An infiltration game onk arcs , 1991 .
[16] Martin Grötschel,et al. Survivable mobile phone network architectures: models and solution methods , 1998 .
[17] Richard L. Church,et al. A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..
[18] R. Kevin Wood,et al. Deterministic network interdiction , 1993 .
[19] Philip S. Bud Whiteman. Improving Single Strike Effectiveness for Network Interdiction , 1999 .
[20] Richard J. Gibbens,et al. Dynamic Routing in Fully Connected Networks , 1990 .
[21] Jonathan Cole Smith,et al. Survivable network design under optimal and heuristic interdiction scenarios , 2007, J. Glob. Optim..
[22] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[23] Jitamitra Desai,et al. A global optimization algorithm for reliable network design , 2010, Eur. J. Oper. Res..
[24] Justo Puerto,et al. Revisiting a game theoretic framework for the robust railway network design against intentional attacks , 2013, Eur. J. Oper. Res..
[25] William H. Ruckle,et al. Geometric games and their applications , 1983 .
[26] Delbert Ray Fulkerson,et al. Maximizing the minimum source-sink path subject to a budget constraint , 1977, Math. Program..
[27] Alan W. McMasters,et al. Optimal interdiction of a supply network , 1970 .
[28] Melvin Dresher,et al. A Sampling Inspection Problem in Arms Control Agreements: A Game-Theoretic Analysis , 1962 .
[29] Richard D. Wollmer,et al. Removing Arcs from a Network , 1964 .
[30] William H. Ruckle,et al. Ambushing Random Walks I: Finite Models , 1976, Oper. Res..
[31] Richard L. Church,et al. Identifying Critical Infrastructure: The Median and Covering Facility Interdiction Problems , 2004 .
[32] Eric V. Denardo,et al. Flows in Networks , 2011 .
[33] Marlin U. Thomas,et al. An infiltration game with time dependent payoff , 1976 .
[34] W. C. Turner,et al. Optimal interdiction policy for a flow network , 1971 .
[35] Takashi Chiba,et al. An attrition game on an acyclic network , 2015, J. Oper. Res. Soc..
[36] Jonathan P. Caulkins,et al. Simulation of adaptive response: A model of drug interdiction , 1993 .
[37] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[38] M. Naceur Azaiez,et al. Game Theoretic Risk Analysis of Security Threats , 2009 .
[39] Halil Bayrak,et al. Shortest path network interdiction with asymmetric information , 2008, Networks.
[40] F. W. Lanchester,et al. Aircraft in Warfare: The Dawn of the Fourth Arm , 1995 .
[41] B. Golden. A problem in network interdiction , 1978 .
[42] Iradj Ouveysi,et al. On design of a survivable network architecture for dynamic routing: Optimal solution strategy and an efficient heuristic , 1999, Eur. J. Oper. Res..
[43] N. Assimakopoulos,et al. A network interdiction model for hospital infection control. , 1987, Computers in biology and medicine.
[44] M G H Bell,et al. Attacker–defender models and road network vulnerability , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[45] Niyazi Onur Bakir. A Stackelberg game model for resource allocation in cargo container security , 2011, Ann. Oper. Res..
[46] Kensaku Kikuta,et al. An Ambush Game with an Unknown Number of Infiltrators , 2004, Oper. Res..