Optimizing system resilience: A facility protection model with recovery time
暂无分享,去创建一个
Jesse R. O'Hanley | Maria Paola Scaparra | Chaya Losada | M. P. Scaparra | J. O’Hanley | Chaya Losada
[1] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[2] Natalia Alguacil,et al. Analysis of Electric Grid Interdiction With Line Switching , 2010, IEEE Transactions on Power Systems.
[3] J. C. Smith,et al. Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .
[4] Christodoulos A. Floudas. Generalized Benders Decomposition , 2009, Encyclopedia of Optimization.
[5] Maria Paola Scaparra,et al. Optimal Allocation of Protective Resources in Shortest-Path Networks , 2011, Transp. Sci..
[6] Hanif D. Sherali,et al. A modification of Benders' decomposition algorithm for discrete subproblems: An approach for stochastic programs with integer recourse , 2002, J. Glob. Optim..
[7] Z. Caner Taskin,et al. Cutting plane algorithms for solving a stochastic edge-partition problem , 2009, Discret. Optim..
[8] Jonathan F. Bard,et al. The Mixed Integer Linear Bilevel Programming Problem , 1990, Oper. Res..
[9] Richard L. Church,et al. A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..
[10] N. Waters. Methodology For Servicing The Geography Of Urban Fire: An Exploration With Special Reference To London, Ontario , 1977 .
[11] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[12] Necati Aras,et al. The budget constrained r-interdiction median problem with capacity expansion , 2010, Central Eur. J. Oper. Res..
[13] Alan T. Murray,et al. Critical infrastructure : reliability and vulnerability , 2007 .
[14] Gareth W. Parry. Common cause failure analysis: A critique and some suggestions , 1991 .
[15] Christodoulos A. Floudas,et al. Global optimization of mixed-integer bilevel programming problems , 2005, Comput. Manag. Sci..
[16] J. C. Smith,et al. Models and algorithms for the design of survivable multicommodity flow networks with general failure scenarios , 2008 .
[17] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[18] Antonio J. Conejo,et al. A Benders decomposition method for discretely-constrained mathematical programs with equilibrium constraints , 2010, J. Oper. Res. Soc..
[19] Richard L. Church,et al. Production , Manufacturing and Logistics An exact solution approach for the interdiction median problem with fortification , 2008 .
[20] Maria Paola Scaparra,et al. Hedging against disruptions with ripple effects in location analysis , 2012 .
[21] A. A. Oluoko-Odingo,et al. Vulnerability and Adaptation to Food Insecurity and Poverty in Kenya , 2011 .
[22] Wang Qian,et al. BILEVEL PROGRAMS WITH MULTIPLE FOLLOWERS , 2000 .
[23] M. P. Scaparra,et al. The Multiple Resource Probabilistic Interdiction Median Problem , 2022 .
[24] David G. Kamien. The McGraw-Hill homeland security handbook , 2006 .
[25] Jørgen Tind,et al. L-shaped decomposition of two-stage stochastic programs with integer recourse , 1998, Math. Program..
[26] M. P. Scaparra,et al. Optimizing Protection Strategies for Supply Chains: Comparing Classic Decision-Making Criteria in an Uncertain Environment , 2011 .
[27] Jesse R. O'Hanley,et al. Designing robust coverage networks to hedge against worst-case facility losses , 2008, Eur. J. Oper. Res..
[28] J. F. Benders. Partitioning procedures for solving mixed-variables programming problems , 1962 .
[29] Richard L. Church,et al. Identifying Critical Infrastructure: The Median and Covering Facility Interdiction Problems , 2004 .
[30] Maria Paola Scaparra,et al. Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification , 2011, Comput. Oper. Res..
[31] Marianthi G. Ierapetritou,et al. Resolution method for mixed integer bi-level linear problems based on decomposition technique , 2009, J. Glob. Optim..
[32] J. Arroyo,et al. On the solution of the bilevel programming formulation of the terrorist threat problem , 2005, IEEE Transactions on Power Systems.
[33] Gregory Levitin,et al. Defence and attack of systems with variable attacker system structure detection probability , 2010, J. Oper. Res. Soc..
[34] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[35] P. Marcotte,et al. A bilevel model of taxation and its application to optimal highway pricing , 1996 .
[36] Dulcy M. Abraham,et al. Allocating security resources to a water supply network , 2007 .
[37] Richard L. Church,et al. Protecting Critical Assets: The r-interdiction median problem with fortification , 2007 .
[38] Erik Jenelius,et al. Critical infrastructure protection under imperfect attacker perception , 2010, Int. J. Crit. Infrastructure Prot..
[39] M. P. Scaparra,et al. Protecting Supply Systems to Mitigate Potential Disaster , 2012 .
[40] Åke J. Holmgren,et al. Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks , 2007, IEEE Transactions on Power Systems.