Interdiction models and applications

11Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Through interdiction models, we infer the vulnerabilities inherent in an operational system. This chapter presents four applications of interdiction modeling: (a) to delay an adversary’s development of a first nuclear weapon; (b) to understand vulnerabilities in an electric power system; (c) to locate sensors in a municipal water network; and (d) to secure a border against a nuclear smuggler. In each case, we detail and interpret the mathematical model and characterize insights gained from solving instances of the model. We point to special structures that sometimes arise in interdiction models and the associated implications for analyses. From these examples, themes emerge on how one should model, and defend against, an intelligent adversary.

Cite

CITATION STYLE

APA

Dimitrov, N. B., & Morton, D. P. (2013). Interdiction models and applications. In International Series in Operations Research and Management Science (Vol. 183, pp. 73–103). Springer New York LLC. https://doi.org/10.1007/978-1-4614-5278-2_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free