Skip to main content
Top

2013 | OriginalPaper | Chapter

4. Interdiction Models and Applications

Authors : Nedialko B. Dimitrov, David P. Morton

Published in: Handbook of Operations Research for Homeland Security

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Through interdiction models, we infer the vulnerabilities inherent in an operational system. This chapter presents four applications of interdiction modeling: (a) to delay an adversary’s development of a first nuclear weapon; (b) to understand vulnerabilities in an electric power system; (c) to locate sensors in a municipal water network; and (d) to secure a border against a nuclear smuggler. In each case, we detail and interpret the mathematical model and characterize insights gained from solving instances of the model. We point to special structures that sometimes arise in interdiction models and the associated implications for analyses. From these examples, themes emerge on how one should model, and defend against, an intelligent adversary.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Albert R, Albert I, Nakarado GL (2004) Structural vulnerability of the North American power grid. Phys Rev E 69(2):025103+ Albert R, Albert I, Nakarado GL (2004) Structural vulnerability of the North American power grid. Phys Rev E 69(2):025103+
go back to reference Alvarez R (2004) Interdicting electrical power grids. Master’s thesis, Naval Postgraduate School, Monterey, CA Alvarez R (2004) Interdicting electrical power grids. Master’s thesis, Naval Postgraduate School, Monterey, CA
go back to reference Atkinson MP, Cao Z, Wein LM (2008) Optimal stopping analysis of a radiation detection system to protect cities from a nuclear terrorist attack. Risk Anal 28:353–371CrossRef Atkinson MP, Cao Z, Wein LM (2008) Optimal stopping analysis of a radiation detection system to protect cities from a nuclear terrorist attack. Risk Anal 28:353–371CrossRef
go back to reference Bard JF (1998) Practical bilevel optimization: algorithms and applications. Kluwer, Boston Bard JF (1998) Practical bilevel optimization: algorithms and applications. Kluwer, Boston
go back to reference Barron J (2003) Power surge blacks out northeast. The New York Times, August 15 Barron J (2003) Power surge blacks out northeast. The New York Times, August 15
go back to reference Berry J, Hart WE, Phillips CA, Uber J (2004) A general integer-programming-based framework for sensor placement in municipal water networks. In: Sehlke G, Hayes DF, Stevens DK (eds) Proceedings of the World Water and Environmental Resources Congress 2004, Salt Lake City, Utah, United States. June 27–July 1 Berry J, Hart WE, Phillips CA, Uber J (2004) A general integer-programming-based framework for sensor placement in municipal water networks. In: Sehlke G, Hayes DF, Stevens DK (eds) Proceedings of the World Water and Environmental Resources Congress 2004, Salt Lake City, Utah, United States. June 27–July 1
go back to reference Berry J, Hart WE, Phillips CA, Uber JG, Watson J (2006) Sensor placement in municipal water networks with temporal integer programming models. J Water Resour Plann Manag 132(4):218–224 Berry J, Hart WE, Phillips CA, Uber JG, Watson J (2006) Sensor placement in municipal water networks with temporal integer programming models. J Water Resour Plann Manag 132(4):218–224
go back to reference Berry J, Carr RD, Hart WE, Leung VJ, Phillips CA, Watson J (2009) Designing contamination warning systems for municipal water networks using imperfect sensors. J Water Resour Plann Manag 135(4):253–263 Berry J, Carr RD, Hart WE, Leung VJ, Phillips CA, Watson J (2009) Designing contamination warning systems for municipal water networks using imperfect sensors. J Water Resour Plann Manag 135(4):253–263
go back to reference Berry JW, Boman E, Riesen LA, Hart WE, Phillips CA, Watson J-P, Murray R (2010) User’s manual: TEVA-SPOT toolkit version 2.4. Technical Report EPA/600/R-08/041, National Homeland Security Research Center, Office of Research and Development, U.S. Environmental Protection Agency Berry JW, Boman E, Riesen LA, Hart WE, Phillips CA, Watson J-P, Murray R (2010) User’s manual: TEVA-SPOT toolkit version 2.4. Technical Report EPA/600/R-08/041, National Homeland Security Research Center, Office of Research and Development, U.S. Environmental Protection Agency
go back to reference Borger J (2012) Who is responsible for the Iran nuclear scientists attacks? The Guardian, January 12 Borger J (2012) Who is responsible for the Iran nuclear scientists attacks? The Guardian, January 12
go back to reference Boros E, Fedzhora L, Kantor PB, Saeger KJ, Stroud P (2009) Large scale LP model for finding optimal container inspection strategies. Naval Res Logist 56:404–420CrossRef Boros E, Fedzhora L, Kantor PB, Saeger KJ, Stroud P (2009) Large scale LP model for finding optimal container inspection strategies. Naval Res Logist 56:404–420CrossRef
go back to reference Broad WJ, Markoff J, Sanger DE (2011) Israeli test on worm called crucial in Iran nuclear delay. The New York Times, January 15 Broad WJ, Markoff J, Sanger DE (2011) Israeli test on worm called crucial in Iran nuclear delay. The New York Times, January 15
go back to reference Brown GG, Carlyle WM, Harney R, Skroch E, Wood RK (2009) Interdicting a nuclear-weapons project. Oper Res 57:866–877CrossRef Brown GG, Carlyle WM, Harney R, Skroch E, Wood RK (2009) Interdicting a nuclear-weapons project. Oper Res 57:866–877CrossRef
go back to reference Chassin D, Posse C (2005) Evaluating North American electric grid reliability using the Barabási–Albert network model. Phys A Stat Mech Appl 355(2–4):667–677 Chassin D, Posse C (2005) Evaluating North American electric grid reliability using the Barabási–Albert network model. Phys A Stat Mech Appl 355(2–4):667–677
go back to reference Cheng J, Xie M, Roberts F (2009) Design and deployment of a mobile sensor network for the surveillance of nuclear materials in metropolitan areas. In: Proceedings of 15th international conference on reliability and quality of design (ISSAT09), San Francisco, California, USA. August 6–8 Cheng J, Xie M, Roberts F (2009) Design and deployment of a mobile sensor network for the surveillance of nuclear materials in metropolitan areas. In: Proceedings of 15th international conference on reliability and quality of design (ISSAT09), San Francisco, California, USA. August 6–8
go back to reference Cormican K, Morton DP, Wood RK (1998) Stochastic network interdiction. Oper Res 46:184–197CrossRef Cormican K, Morton DP, Wood RK (1998) Stochastic network interdiction. Oper Res 46:184–197CrossRef
go back to reference Daskin MS (1995) Network and discrete location: models, algorithms, and applications. Wiley, New YorkCrossRef Daskin MS (1995) Network and discrete location: models, algorithms, and applications. Wiley, New YorkCrossRef
go back to reference Dimitrov NB, Michalopoulos D, Morton DP, Nehme MV, Pan F, Popova E, Schneider EA, Thoreson GG (2011) Network deployment of radiation detectors with physics-based detection probability calculations. Ann Oper Res 187:207–228CrossRef Dimitrov NB, Michalopoulos D, Morton DP, Nehme MV, Pan F, Popova E, Schneider EA, Thoreson GG (2011) Network deployment of radiation detectors with physics-based detection probability calculations. Ann Oper Res 187:207–228CrossRef
go back to reference Espiritu J, Coit D, Prakash U (2007) Component criticality importance measures for the power industry. Electr Power Syst Res 77(5–6):407–420CrossRef Espiritu J, Coit D, Prakash U (2007) Component criticality importance measures for the power industry. Electr Power Syst Res 77(5–6):407–420CrossRef
go back to reference GE Energy for The National Renewable Energy Laboratory (2010) Western wind and solar integration study. The National Renewable Energy Laboratory Report NREL/SR-550-47434 GE Energy for The National Renewable Energy Laboratory (2010) Western wind and solar integration study. The National Renewable Energy Laboratory Report NREL/SR-550-47434
go back to reference United States General Accounting Office (GAO) (2003) Drinking water: Experts’ views on how future federal funding can best be spent to improve security. Technical Report GAO-04-29. Report to the Committee on Environment and Public Works, U.S. Senate United States General Accounting Office (GAO) (2003) Drinking water: Experts’ views on how future federal funding can best be spent to improve security. Technical Report GAO-04-29. Report to the Committee on Environment and Public Works, U.S. Senate
go back to reference United States General Accounting Office (GAO) (2011) Combating nuclear smuggling: DHS has developed a strategic plan for its global nuclear detection architecture, but gaps remain. Technical Report GAO-11-869T. Testimony Before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, U.S. House of Representatives United States General Accounting Office (GAO) (2011) Combating nuclear smuggling: DHS has developed a strategic plan for its global nuclear detection architecture, but gaps remain. Technical Report GAO-11-869T. Testimony Before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, U.S. House of Representatives
go back to reference Gaukler GM, Li C, Cannaday R, Chirayath SS, Ding Y (2011) Detecting nuclear materials smuggling: using radiography to improve container inspection policies. Ann Oper Res 187:65–87CrossRef Gaukler GM, Li C, Cannaday R, Chirayath SS, Ding Y (2011) Detecting nuclear materials smuggling: using radiography to improve container inspection policies. Ann Oper Res 187:65–87CrossRef
go back to reference Günlük O, Pochet Y (2001) Mixing MIR inequalities for mixed integer programs. Math Program 90:429–458CrossRef Günlük O, Pochet Y (2001) Mixing MIR inequalities for mixed integer programs. Math Program 90:429–458CrossRef
go back to reference Harney R, Brown GG, Carlyle WM, Skroch E, Wood RK (2006) Anatomy of a project to produce a first nuclear weapon. Sci Global Secur 14:163–182CrossRef Harney R, Brown GG, Carlyle WM, Skroch E, Wood RK (2006) Anatomy of a project to produce a first nuclear weapon. Sci Global Secur 14:163–182CrossRef
go back to reference Hart WE, Murray R (2010) A review of sensor placement strategies for contamination warning systems. J Water Resour Plann Manag 136(6):611–619CrossRef Hart WE, Murray R (2010) A review of sensor placement strategies for contamination warning systems. J Water Resour Plann Manag 136(6):611–619CrossRef
go back to reference Hochbaum DS (2009) Dynamic evolution of economically preferred facilities. Eur J Oper Res 193:649–659CrossRef Hochbaum DS (2009) Dynamic evolution of economically preferred facilities. Eur J Oper Res 193:649–659CrossRef
go back to reference Hochbaum DS, Fishbain B (2011) Nuclear threat detection with mobile distributed sensor networks. Ann Oper Res 187:45–638CrossRef Hochbaum DS, Fishbain B (2011) Nuclear threat detection with mobile distributed sensor networks. Ann Oper Res 187:45–638CrossRef
go back to reference Keizer G (2010) Is Stuxnet the ‘best’ malware ever? Computerworld, September 16 Keizer G (2010) Is Stuxnet the ‘best’ malware ever? Computerworld, September 16
go back to reference Kessler G, Wright R (2007) Israel, U.S. shared data on suspected nuclear site. Washington Post, September 21 Kessler G, Wright R (2007) Israel, U.S. shared data on suspected nuclear site. Washington Post, September 21
go back to reference Kuhn HW, Tucker AW (1951) Nonlinear programming. In: Proceedings of the 2nd Berkeley symposium on mathematical statistics and probability, University of California Press. Berkeley, California, pp 481–492 Kuhn HW, Tucker AW (1951) Nonlinear programming. In: Proceedings of the 2nd Berkeley symposium on mathematical statistics and probability, University of California Press. Berkeley, California, pp 481–492
go back to reference Lee BH, Deininger RA (1992) Optimal locations of monitoring stations in water distribution system. J Environ Eng 118(1):4–16 Lee BH, Deininger RA (1992) Optimal locations of monitoring stations in water distribution system. J Environ Eng 118(1):4–16
go back to reference Madigan D, Mittal S, Roberts F (2007) Sequential decision making algorithms for port of entry inspection: overcoming computational challenges. In: Muresan G, Altiok T, Melamed B, Zeng D (eds) Proceedings of the 2007 IEEE Intelligence and Security Informatics Conference, New Brunswick, New Jersey, USA. May 23–24, pp 1–7 Madigan D, Mittal S, Roberts F (2007) Sequential decision making algorithms for port of entry inspection: overcoming computational challenges. In: Muresan G, Altiok T, Melamed B, Zeng D (eds) Proceedings of the 2007 IEEE Intelligence and Security Informatics Conference, New Brunswick, New Jersey, USA. May 23–24, pp 1–7
go back to reference McGoldrick F (2011) Limiting transfers of enrichment and reprocessing technology: issues, constraints, options. Report for Belfer Center for Science and International Affairs, Harvard Kennedy School, Cambridge, MA McGoldrick F (2011) Limiting transfers of enrichment and reprocessing technology: issues, constraints, options. Report for Belfer Center for Science and International Affairs, Harvard Kennedy School, Cambridge, MA
go back to reference McLay LA, Lloyd JD, Niman E (2011) Interdicting nuclear material on cargo containers using knapsack problem models. Ann Oper Res 187:185–205CrossRef McLay LA, Lloyd JD, Niman E (2011) Interdicting nuclear material on cargo containers using knapsack problem models. Ann Oper Res 187:185–205CrossRef
go back to reference Mili L, Qiu Q, Phadke AG (2004) Risk assessment of catastrophic failures in electric power systems. Int J Crit Infrastruct 1(1):38–63CrossRef Mili L, Qiu Q, Phadke AG (2004) Risk assessment of catastrophic failures in electric power systems. Int J Crit Infrastruct 1(1):38–63CrossRef
go back to reference Miller AJ, Wolsey LA (2003) Tight formulations for some simple mixed integer programs and convex objective integer programs. Math Program 98:73–88CrossRef Miller AJ, Wolsey LA (2003) Tight formulations for some simple mixed integer programs and convex objective integer programs. Math Program 98:73–88CrossRef
go back to reference Morton DP, Pan F, Saeger KJ (2007) Models for nuclear smuggling interdiction. IIE Trans Oper Eng 38:3–14CrossRef Morton DP, Pan F, Saeger KJ (2007) Models for nuclear smuggling interdiction. IIE Trans Oper Eng 38:3–14CrossRef
go back to reference Motto AL, Arroyo JM, Galiana FD (2005) A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat. IEEE Trans Power Syst 20(3):1357–1365CrossRef Motto AL, Arroyo JM, Galiana FD (2005) A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat. IEEE Trans Power Syst 20(3):1357–1365CrossRef
go back to reference Murray R, Hart WE, Phillips CA, Berry J, Boman EG, Carr RD, Riesen LA, Watson J, Haxton T, Herrmann JG, Janke R, Gray G, Taxon T, Uber JG, Morley KM (2009) US Environmental Protection Agency uses operations research to reduce contamination risks in drinking water. Interfaces 39(1):57–68CrossRef Murray R, Hart WE, Phillips CA, Berry J, Boman EG, Carr RD, Riesen LA, Watson J, Haxton T, Herrmann JG, Janke R, Gray G, Taxon T, Uber JG, Morley KM (2009) US Environmental Protection Agency uses operations research to reduce contamination risks in drinking water. Interfaces 39(1):57–68CrossRef
go back to reference Murray R, Haxton T, Janke R, Hart WE, Berry J, Phillips C (2010) Sensor network design for drinking water contamination warning systems: A compendium of research results and case studies using the TEVA-SPOT software. Technical Report EPA/600/R-09/141, National Homeland Security Research Center, Office of Research and Development, U.S. Environmental Protection Agency Murray R, Haxton T, Janke R, Hart WE, Berry J, Phillips C (2010) Sensor network design for drinking water contamination warning systems: A compendium of research results and case studies using the TEVA-SPOT software. Technical Report EPA/600/R-09/141, National Homeland Security Research Center, Office of Research and Development, U.S. Environmental Protection Agency
go back to reference National Energy Policy Development Group (2001) National Energy Policy: Report of the National Energy Policy Development Group. U.S. Government Printing Office National Energy Policy Development Group (2001) National Energy Policy: Report of the National Energy Policy Development Group. U.S. Government Printing Office
go back to reference Nehme MV (2009) Two-person games for stochastic network interdiction: models, methods, and complexities. Ph.D. thesis, The University of Texas at Austin Nehme MV (2009) Two-person games for stochastic network interdiction: models, methods, and complexities. Ph.D. thesis, The University of Texas at Austin
go back to reference Nehme MV, Morton DP (2009) Tightening a network interdiction model. In: Proceedings of the 2009 Industrial Engineering Research Conference, Miami, Florida, May 30 – June 3 Nehme MV, Morton DP (2009) Tightening a network interdiction model. In: Proceedings of the 2009 Industrial Engineering Research Conference, Miami, Florida, May 30 – June 3
go back to reference Nehme MV, Morton DP (2010) Efficient nested solutions of the bipartite network interdiction problem. In: Johnson A, Miller J (eds) Proceedings of the 2010 Industrial Engineering Research Conference, Cancun, Mexico. June, 2010 Nehme MV, Morton DP (2010) Efficient nested solutions of the bipartite network interdiction problem. In: Johnson A, Miller J (eds) Proceedings of the 2010 Industrial Engineering Research Conference, Cancun, Mexico. June, 2010
go back to reference O’Brien JJ (1969) Scheduling handbook. McGraw-Hill Book Company, New York O’Brien JJ (1969) Scheduling handbook. McGraw-Hill Book Company, New York
go back to reference Office of Technology Assessment U.S. Congress (1990) Physical vulnerability of electric systems to natural disasters and sabotage. U.S. Government Printing Office. OTA-E-453 Office of Technology Assessment U.S. Congress (1990) Physical vulnerability of electric systems to natural disasters and sabotage. U.S. Government Printing Office. OTA-E-453
go back to reference Ostfeld A, Salomons E (2004) Optimal layout of early warning detection stations for water distribution systems security. J Water Resour Plann Manag 130(5):377–385 Ostfeld A, Salomons E (2004) Optimal layout of early warning detection stations for water distribution systems security. J Water Resour Plann Manag 130(5):377–385
go back to reference Pan F, Morton DP (2008) Minimizing a stochastic maximum-reliability path. Networks 52:111–119CrossRef Pan F, Morton DP (2008) Minimizing a stochastic maximum-reliability path. Networks 52:111–119CrossRef
go back to reference Pan F, Charlton W, Morton DP (2003) Interdicting smuggled nuclear material. In: Woodruff DL (ed) Network interdiction and stochastic integer programming. Kluwer, Boston, pp 1–20CrossRef Pan F, Charlton W, Morton DP (2003) Interdicting smuggled nuclear material. In: Woodruff DL (ed) Network interdiction and stochastic integer programming. Kluwer, Boston, pp 1–20CrossRef
go back to reference Pochet Y, Wolsey LA (1994) Polyhedra for lotsizing with Wagner-Whitin costs. Math Program 67:297–323CrossRef Pochet Y, Wolsey LA (1994) Polyhedra for lotsizing with Wagner-Whitin costs. Math Program 67:297–323CrossRef
go back to reference Qiang Q, Nagurney A (2008) A unified network performance measure with importance identification and the ranking of network components. Optim Lett 2(1):127–142CrossRef Qiang Q, Nagurney A (2008) A unified network performance measure with importance identification and the ranking of network components. Optim Lett 2(1):127–142CrossRef
go back to reference Rausand M, Høyland A (2003) System reliability theory: models, statistical methods, and applications, 2nd edn. Wiley, Hoboken Rausand M, Høyland A (2003) System reliability theory: models, statistical methods, and applications, 2nd edn. Wiley, Hoboken
go back to reference Reed BK (1994) Models for proliferation interdiction response analysis. Master’s thesis, Naval Postgraduate School, Monterey, CA Reed BK (1994) Models for proliferation interdiction response analysis. Master’s thesis, Naval Postgraduate School, Monterey, CA
go back to reference Rhys JMW (1970) A selection problem of shared fixed costs and network flows. Manag Sci 17:200–207CrossRef Rhys JMW (1970) A selection problem of shared fixed costs and network flows. Manag Sci 17:200–207CrossRef
go back to reference Rossman LA (2000) EPANET 2: Users manual. Technical Report EPA/600/R-00/057, United States Environmental Protection Agency Rossman LA (2000) EPANET 2: Users manual. Technical Report EPA/600/R-00/057, United States Environmental Protection Agency
go back to reference Salmerón J, Wood K, Baldick R (2004) Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 19(2):905–912CrossRef Salmerón J, Wood K, Baldick R (2004) Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 19(2):905–912CrossRef
go back to reference Salmerón J, Wood K, and Baldick R (2004) Optimizing electric grid design under asymmetric threat (II). Technical Report NPS-OR-04-001, Naval Postgraduate School. Prepared for U.S. Department of Justice, Office of Justice Programs and Office of Domestic Preparedness Salmerón J, Wood K, and Baldick R (2004) Optimizing electric grid design under asymmetric threat (II). Technical Report NPS-OR-04-001, Naval Postgraduate School. Prepared for U.S. Department of Justice, Office of Justice Programs and Office of Domestic Preparedness
go back to reference Salmerón J, Wood K, Baldick R (2009) Worst-case interdiction analysis of large-scale electric power grids. IEEE Trans Power Syst 24(1):96–104CrossRef Salmerón J, Wood K, Baldick R (2009) Worst-case interdiction analysis of large-scale electric power grids. IEEE Trans Power Syst 24(1):96–104CrossRef
go back to reference Shtub A, Bard JF, Globerson S (2005) Project management: processes, methodologies, and economics. Prentice Hall, Upper Saddle River Shtub A, Bard JF, Globerson S (2005) Project management: processes, methodologies, and economics. Prentice Hall, Upper Saddle River
go back to reference Stroud PD, Saeger KJ (2003) Enumeration of increasing Boolean expressions and alternative digraph implementations for diagnostic applications. In: Proceedings volume IV, computer, communication and control technologies, pp 328–333 Stroud PD, Saeger KJ (2003) Enumeration of increasing Boolean expressions and alternative digraph implementations for diagnostic applications. In: Proceedings volume IV, computer, communication and control technologies, pp 328–333
go back to reference Sullivan KM, Morton DP, Pan F, Smith JC (2012) Interdicting stochastic evasion paths with asymmetric information on bipartite networks. Naval Res Logist (under revision) Sullivan KM, Morton DP, Pan F, Smith JC (2012) Interdicting stochastic evasion paths with asymmetric information on bipartite networks. Naval Res Logist (under revision)
go back to reference Talukdar S, Apt J, Ilic M, Lave L, Morgan M (2003) Cascading failures: survival versus prevention. Electr J 16(9):25–31CrossRef Talukdar S, Apt J, Ilic M, Lave L, Morgan M (2003) Cascading failures: survival versus prevention. Electr J 16(9):25–31CrossRef
go back to reference Tavner PJ, Xiang J, Spinato F (2007) Reliability analysis for wind turbines. Wind Energy 10(1):1–18CrossRef Tavner PJ, Xiang J, Spinato F (2007) Reliability analysis for wind turbines. Wind Energy 10(1):1–18CrossRef
go back to reference Watson J, Murray R, Hart WE (2009) Formulation and optimization of robust sensor placement problems for drinking water contamination warning systems. J Infrastruct Syst 15(4):330+ Watson J, Murray R, Hart WE (2009) Formulation and optimization of robust sensor placement problems for drinking water contamination warning systems. J Infrastruct Syst 15(4):330+
go back to reference Wein LM, Wilkins AH, Baveja M, Flynn SE (2006) Preventing the importation of illicit nuclear materials in shipping containers. Risk Anal 26:1377–1393CrossRef Wein LM, Wilkins AH, Baveja M, Flynn SE (2006) Preventing the importation of illicit nuclear materials in shipping containers. Risk Anal 26:1377–1393CrossRef
go back to reference Wein LM, Liu Y, Cao Z, Flynn SE (2007) The optimal spatiotemporal deployment of radiation portal monitors can improve nuclear detection at overseas ports. Sci Global Secur 15:211–233CrossRef Wein LM, Liu Y, Cao Z, Flynn SE (2007) The optimal spatiotemporal deployment of radiation portal monitors can improve nuclear detection at overseas ports. Sci Global Secur 15:211–233CrossRef
go back to reference Witzgall CJ, Saunders PB (1988) Electronic mail and the “locator’s” dilemma. In: Ringeisen RD, Roberts FS (eds) Applications of discrete mathematics. SIAM, Philadelphia, pp 65–84 Witzgall CJ, Saunders PB (1988) Electronic mail and the “locator’s” dilemma. In: Ringeisen RD, Roberts FS (eds) Applications of discrete mathematics. SIAM, Philadelphia, pp 65–84
Metadata
Title
Interdiction Models and Applications
Authors
Nedialko B. Dimitrov
David P. Morton
Copyright Year
2013
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-5278-2_4