[go: up one dir, main page]

create a website
Attack and Interception in Networks. (2021). Dutta, Bhaskar ; Chatterjee, Kalyan ; Bloch, Francis.
In: CRETA Online Discussion Paper Series.
RePEc:wrk:wcreta:68.

Full description at Econpapers || Download paper

Cited: 0

Citations received by this document

Cites: 20

References cited by this document

Cocites: 22

Documents which have cited the same bibliography

Coauthors: 0

Authors who have wrote about the same topic

Citations

Citations received by this document

    This document has not been cited yet.

References

References cited by this document

  1. Alan W McMasters and Thomas M Mustin. Optimal interdiction of a supply network. Naval Research Logistics Quarterly, 17(3):261–268, 1970.

  2. Alan Washburn and Kevin Wood. Two-person zero-sum games for network interdiction. Operations research, 43(2):243–251, 1995.

  3. Bruce Golden. A problem in network interdiction. Naval Research Logistics Quarterly, 25(4):711–713, 1978.

  4. David M Kreps and Robert Wilson. Sequential equilibria. Econometrica: Journal of the Econometric Society, pages 863–894, 1982.
    Paper not yet in RePEc: Add citation now
  5. David P Morton, Feng Pan, and Kevin J Saeger. Models for nuclear smuggling interdiction. IIE Transactions, 39(1):3–14, 2007.
    Paper not yet in RePEc: Add citation now
  6. Delbert Ray Fulkerson and Gary C Harding. Maximizing the minimum source-sink path subject to a budget constraint. Mathematical Programming, 13(1):116–118, 1977.
    Paper not yet in RePEc: Add citation now
  7. Diego A Cerdeiro, Marcin Dziubiński, and Sanjeev Goyal. Individual security, contagion, and network design. Journal of Economic Theory, 170:182–226, 2017.

  8. Francis Bloch, Bhaskar Dutta, and Marcin Dziubiński. A game of hide and seek in networks. Journal of Economic Theory, 190:105119, 2020.

  9. Gerard Debreu. A social equilibrium existence theorem. Proceedings of the National Academy of Sciences, 38(10):886–893, 1952.
    Paper not yet in RePEc: Add citation now
  10. Irving L Glicksberg. A further generalization of the kakutani fixed point theorem, with application to nash equilibrium points. Proceedings of the American Mathematical Society, 3(1):170–174, 1952.
    Paper not yet in RePEc: Add citation now
  11. J Cole Smith and Yongjia Song. A survey of network interdiction models and algorithms. European Journal of Operational Research, 283(3):797–811, 2020.

  12. Kelly J Cormican, David P Morton, and R Kevin Wood. Stochastic network interdiction. Operations Research, 46(2):184–197, 1998.

  13. Ky Fan. Fixed-point and minimax theorems in locally convex topological linear spaces. Proceedings of the National Academy of Sciences of the United States of America, 38(2):121, 1952.
    Paper not yet in RePEc: Add citation now
  14. Marcin Dziubiński and Sanjeev Goyal. How do you defend a network? Theoretical Economics, 12(1):331–376, 2017.

  15. Marcin Dziubiński and Sanjeev Goyal. Network design and defence. Games and Economic Behavior, 79:30–43, 2013.

  16. PM Ghare, Douglas C Montgomery, and WC Turner. Optimal interdiction policy for a flow network. Naval Research Logistics Quarterly, 18(1):37–45, 1971.

  17. R Kevin Wood. Deterministic network interdiction. Mathematical and Computer Modelling, 17(2):1–18, 1993.
    Paper not yet in RePEc: Add citation now
  18. Ricardo A Collado and David Papp. Network interdiction–models, applications, unexplored directions. Rutcor Res Rep, RRR4, Rutgers University, New Brunswick, NJ, 2012.
    Paper not yet in RePEc: Add citation now
  19. Richard Wollmer. Removing arcs from a network. Operations Research, 12(6):934–940, 1964.

  20. Sanjeev Goyal and Adrien Vigier. Attack, defence, and contagion in networks. The Review of Economic Studies, 81(4):1518–1542, 2014.

Cocites

Documents in RePEc which have cited the same bibliography

  1. The continuous maximum capacity path interdiction problem. (2023). Sefair, Jorge A ; Mitra, Ankan ; Tayyebi, Javad.
    In: European Journal of Operational Research.
    RePEc:eee:ejores:v:305:y:2023:i:1:p:38-52.

    Full description at Econpapers || Download paper

  2. Attack and interception in networks. (2022). Dutta, Bhaskar ; Chatterjee, Kalyan ; Bloch, Francis.
    In: Theoretical Economics.
    RePEc:the:publsh:5122.

    Full description at Econpapers || Download paper

  3. A Progressive Approximation Approach for the Exact Solution of Sparse Large-Scale Binary Interdiction Games. (2022). Sefair, Jorge A ; Contardo, Claudio.
    In: INFORMS Journal on Computing.
    RePEc:inm:orijoc:v:34:y:2022:i:2:p:890-908.

    Full description at Econpapers || Download paper

  4. A budget allocation model for domestic airport network protection. (2022). Ren, Xiaorong ; Yan, Xihong ; Nie, Xiaofeng.
    In: Socio-Economic Planning Sciences.
    RePEc:eee:soceps:v:82:y:2022:i:pb:s0038012122000520.

    Full description at Econpapers || Download paper

  5. Attack and Interception in Networks. (2021). Dutta, Bhaskar ; Chatterjee, Kalyan ; Bloch, Francis.
    In: CRETA Online Discussion Paper Series.
    RePEc:wrk:wcreta:68.

    Full description at Econpapers || Download paper

  6. Attack and Interception in Networks. (2021). Dutta, Bhaskar ; Chatterjee, Kalyan ; Bloch, Francis.
    In: The Warwick Economics Research Paper Series (TWERPS).
    RePEc:wrk:warwec:1338.

    Full description at Econpapers || Download paper

  7. Attack and Interception in Networks. (2021). Dutta, Bhaskar ; Chatterjee, Kalyan ; Bloch, Francis.
    In: Working Papers.
    RePEc:ash:wpaper:57.

    Full description at Econpapers || Download paper

  8. Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience. (2020). Morshedlou, Nazanin ; Barker, Kash ; Gonzlez, Andrs D ; Ghorbani-Renani, Nafiseh.
    In: Reliability Engineering and System Safety.
    RePEc:eee:reensy:v:199:y:2020:i:c:s0951832019308191.

    Full description at Econpapers || Download paper

  9. Target-oriented utility for interdiction of transportation networks. (2020). Bier, Vicki M ; Kosanoglu, Fuat.
    In: Reliability Engineering and System Safety.
    RePEc:eee:reensy:v:197:y:2020:i:c:s0951832019302352.

    Full description at Econpapers || Download paper

  10. Dynamic interdiction networks with applications in illicit supply chains. (2020). Najafi, Mehdi ; Zolfagharinia, Hossein ; Jabarzare, Ziba.
    In: Omega.
    RePEc:eee:jomega:v:96:y:2020:i:c:s0305048318305243.

    Full description at Econpapers || Download paper

  11. A survey of network interdiction models and algorithms. (2020). Song, Yongjia ; Smith, Cole J.
    In: European Journal of Operational Research.
    RePEc:eee:ejores:v:283:y:2020:i:3:p:797-811.

    Full description at Econpapers || Download paper

  12. Maximum Capacity Path Interdiction Problem with Fixed Costs. (2019). Tayyebi, Javad ; Mohammadi, Abumoslem.
    In: Asia-Pacific Journal of Operational Research (APJOR).
    RePEc:wsi:apjorx:v:36:y:2019:i:04:n:s0217595919500180.

    Full description at Econpapers || Download paper

  13. Evaluating the Vulnerability of Time-Sensitive Transportation Networks: A Hub Center Interdiction Problem. (2019). Lei, Ting L.
    In: Sustainability.
    RePEc:gam:jsusta:v:11:y:2019:i:17:p:4614-:d:260754.

    Full description at Econpapers || Download paper

  14. A study of general and security Stackelberg game formulations. (2019). Fortz, Bernard ; Casorran, Carlos ; Ordoez, Fernando ; Labbe, Martine.
    In: European Journal of Operational Research.
    RePEc:eee:ejores:v:278:y:2019:i:3:p:855-868.

    Full description at Econpapers || Download paper

  15. Assessing and Improving the Operational Resilience of a Large Highway Infrastructure System to Worst-Case Losses. (2018). Wood, Kevin R ; Carlyle, Matthew W ; Brown, Gerald G ; Alderson, David L.
    In: Transportation Science.
    RePEc:inm:ortrsc:v:52:y:2018:i:4:p:1012-1034.

    Full description at Econpapers || Download paper

  16. Stochastic shortest path network interdiction with a case study of Arizona–Mexico border. (2018). Zhang, Jing ; Behlendorf, Brandon ; Zhuang, Jun.
    In: Reliability Engineering and System Safety.
    RePEc:eee:reensy:v:179:y:2018:i:c:p:62-73.

    Full description at Econpapers || Download paper

  17. Non‐zero‐sum nonlinear network path interdiction with an application to inspection in terror networks. (2017). Goldberg, Noam.
    In: Naval Research Logistics (NRL).
    RePEc:wly:navres:v:64:y:2017:i:2:p:139-153.

    Full description at Econpapers || Download paper

  18. Evader interdiction: algorithms, complexity and collateral damage. (2014). Gutfraind, Alexander ; Johnson, Matthew ; Ahmadizadeh, Kiyan .
    In: Annals of Operations Research.
    RePEc:spr:annopr:v:222:y:2014:i:1:p:341-359:10.1007/s10479-013-1372-x.

    Full description at Econpapers || Download paper

  19. A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector. (2013). Sanjeevi, Sujeevraja ; Yates, Justin.
    In: International Journal of Critical Infrastructure Protection.
    RePEc:eee:ijocip:v:6:y:2013:i:2:p:107-119.

    Full description at Econpapers || Download paper

  20. The stochastic interdiction median problem with disruption intensity levels. (2012). Losada, Chaya ; Scaparra, M ; Church, Richard ; Daskin, Mark .
    In: Annals of Operations Research.
    RePEc:spr:annopr:v:201:y:2012:i:1:p:345-365:10.1007/s10479-012-1170-x.

    Full description at Econpapers || Download paper

  21. Comparative Approaches for Assessing Network Vulnerability. (2008). Grubesic, Tony.
    In: International Regional Science Review.
    RePEc:sae:inrsre:v:31:y:2008:i:1:p:88-112.

    Full description at Econpapers || Download paper

Coauthors

Authors registered in RePEc who have wrote about the same topic

Report date: 2024-12-21 18:52:03 || Missing content? Let us know

CitEc is a RePEc service, providing citation data for Economics since 2001. Sponsored by INOMICS. Last updated October, 6 2023. Contact: CitEc Team.