A bilevel partial interdiction problem with capacitated facilities and demand outsourcing

In this paper, partial facility interdiction decisions are integrated for the first time into a median type network interdiction problem with capacitated facilities and outsourcing option. The problem is modeled as a static Stackelberg game between an intelligent attacker and a defender. The attacke...

Full description

Saved in:
Bibliographic Details
Published inComputers & operations research Vol. 41; pp. 346 - 358
Main Authors Aksen, Deniz, Şengül Akca, Sema, Aras, Necati
Format Journal Article
LanguageEnglish
Published New York Elsevier Ltd 01.01.2014
Pergamon Press Inc
Subjects
Online AccessGet full text
ISSN0305-0548
1873-765X
0305-0548
DOI10.1016/j.cor.2012.08.013

Cover

Abstract In this paper, partial facility interdiction decisions are integrated for the first time into a median type network interdiction problem with capacitated facilities and outsourcing option. The problem is modeled as a static Stackelberg game between an intelligent attacker and a defender. The attacker's (leader's) objective is to cause the maximum (worst-case) disruption in an existing service network subject to an interdiction budget. On the other hand, the defender (follower) is responsible for satisfying the demand of all customers while minimizing the total demand-weighted transportation and outsourcing cost in the wake of the worst-case attack. She should consider the capacity reduction at the interdicted facilities where the number of interdictions cannot be known a priori, but depends on the attacker's budget allocation. We propose two different methods to solve this bilevel programming problem. The first one is a progressive grid search which is not viable on large sized instances. The second one is a multi-start simplex search heuristic developed to overcome the exponential time complexity of the first method. We also use an exhaustive search method to solve all combinations of full interdiction to assess the advantage of partial interdiction for the attacker. The test results suggest that under the partial interdiction approach the attacker can achieve a better utilization of his limited resources. [Display omitted] A bilevel partial interdiction problem with capacitated facilities and demand outsourcing ► We investigate a bilevel facility interdiction problem between an attacker and defender, where the attacker is the leader who wants to cause the most disruption in a median type network and the defender tries to assign customer demand to the facilities according to the remaining capacities and outsource the unmet demand with a penalty. ► Partial interdiction is possible where a partially interdicted facility loses some of its capacity in proportion to the attack level. ► Two solution methods are proposed. The first is a progressive grid search heuristic that can be applied for instances with up to 10 facilities. The second is a multi-start revised simplex search procedure. Both of the heuristics call Cplex to optimally solve an integer programming model in the lower level problem. ► We evaluate the benefit of the partial interdiction approach over full interdiction from the attacker’s point of view.
AbstractList In this paper, partial facility interdiction decisions are integrated for the first time into a median type network interdiction problem with capacitated facilities and outsourcing option. The problem is modeled as a static Stackelberg game between an intelligent attacker and a defender. The attacker's (leader's) objective is to cause the maximum (worst-case) disruption in an existing service network subject to an interdiction budget. On the other hand, the defender (follower) is responsible for satisfying the demand of all customers while minimizing the total demand-weighted transportation and outsourcing cost in the wake of the worst-case attack. She should consider the capacity reduction at the interdicted facilities where the number of interdictions cannot be known a priori, but depends on the attacker's budget allocation. We propose two different methods to solve this bilevel programming problem. The first one is a progressive grid search which is not viable on large sized instances. The second one is a multi-start simplex search heuristic developed to overcome the exponential time complexity of the first method. We also use an exhaustive search method to solve all combinations of full interdiction to assess the advantage of partial interdiction for the attacker. The test results suggest that under the partial interdiction approach the attacker can achieve a better utilization of his limited resources.
In this paper, partial facility interdiction decisions are integrated for the first time into a median type network interdiction problem with capacitated facilities and outsourcing option. The problem is modeled as a static Stackelberg game between an intelligent attacker and a defender. The attacker's (leader's) objective is to cause the maximum (worst-case) disruption in an existing service network subject to an interdiction budget. On the other hand, the defender (follower) is responsible for satisfying the demand of all customers while minimizing the total demand-weighted transportation and outsourcing cost in the wake of the worst-case attack. She should consider the capacity reduction at the interdicted facilities where the number of interdictions cannot be known a priori, but depends on the attacker's budget allocation. We propose two different methods to solve this bilevel programming problem. The first one is a progressive grid search which is not viable on large sized instances. The second one is a multi-start simplex search heuristic developed to overcome the exponential time complexity of the first method. We also use an exhaustive search method to solve all combinations of full interdiction to assess the advantage of partial interdiction for the attacker. The test results suggest that under the partial interdiction approach the attacker can achieve a better utilization of his limited resources. [PUBLICATION ABSTRACT]
In this paper, partial facility interdiction decisions are integrated for the first time into a median type network interdiction problem with capacitated facilities and outsourcing option. The problem is modeled as a static Stackelberg game between an intelligent attacker and a defender. The attacker's (leader's) objective is to cause the maximum (worst-case) disruption in an existing service network subject to an interdiction budget. On the other hand, the defender (follower) is responsible for satisfying the demand of all customers while minimizing the total demand-weighted transportation and outsourcing cost in the wake of the worst-case attack. She should consider the capacity reduction at the interdicted facilities where the number of interdictions cannot be known a priori, but depends on the attacker's budget allocation. We propose two different methods to solve this bilevel programming problem. The first one is a progressive grid search which is not viable on large sized instances. The second one is a multi-start simplex search heuristic developed to overcome the exponential time complexity of the first method. We also use an exhaustive search method to solve all combinations of full interdiction to assess the advantage of partial interdiction for the attacker. The test results suggest that under the partial interdiction approach the attacker can achieve a better utilization of his limited resources. [Display omitted] A bilevel partial interdiction problem with capacitated facilities and demand outsourcing ► We investigate a bilevel facility interdiction problem between an attacker and defender, where the attacker is the leader who wants to cause the most disruption in a median type network and the defender tries to assign customer demand to the facilities according to the remaining capacities and outsource the unmet demand with a penalty. ► Partial interdiction is possible where a partially interdicted facility loses some of its capacity in proportion to the attack level. ► Two solution methods are proposed. The first is a progressive grid search heuristic that can be applied for instances with up to 10 facilities. The second is a multi-start revised simplex search procedure. Both of the heuristics call Cplex to optimally solve an integer programming model in the lower level problem. ► We evaluate the benefit of the partial interdiction approach over full interdiction from the attacker’s point of view.
Author Şengül Akca, Sema
Aras, Necati
Aksen, Deniz
Author_xml – sequence: 1
  givenname: Deniz
  surname: Aksen
  fullname: Aksen, Deniz
  email: daksen@ku.edu.tr
  organization: College of Administrative Sciences and Economics, Koç University, Rumelifeneri Yolu, Sarıyer, İstanbul, Turkey
– sequence: 2
  givenname: Sema
  surname: Şengül Akca
  fullname: Şengül Akca, Sema
  email: sema.sengul@boun.edu.tr
  organization: Department of Industrial Engineering, Boğaziçi University, Bebek, İstanbul, Turkey
– sequence: 3
  givenname: Necati
  surname: Aras
  fullname: Aras, Necati
  email: arasn@boun.edu.tr
  organization: Department of Industrial Engineering, Boğaziçi University, Bebek, İstanbul, Turkey
BookMark eNqNkT9vFDEQxS0UJC6BD0BniYZmN-N_a0dUUUQAKRJNCqgsr3cWfPLZh-0L4tvj46hSRJlmpvi90cx75-Qs5YSEvGUwMmDT5Xb0uYwcGB_BjMDEC7JhRotBT-rbGdmAADWAkuYVOa91C700Zxvy_ZrOIeIDRrp3pQUXaUgNyxJ8CznRfclzxB39HdpP6t3e-dBcw4WufYqhBazUpYUuuDu2fGg1H4oP6cdr8nJ1seKb__2C3N9-vL_5PNx9_fTl5vpu8JLzNkgOBoXwmvGFOe21ZEKsqxEK5GoWmJznk1ZXs9BSGb7KmbGZSe2EuwIpxAV5f1rbL_11wNrsLlSPMbqE-VAtmzRTiuvnoFKr7hCHqaPvHqHb_lbqf3RKcsNAwnGhPlG-5FoLrvafO923VlyIloE9hmO3todjj-FYMLaH05XskXJfws6VP09qPpw02N18CFhs9QGTxyUU9M0uOTyh_gud_qgN
CODEN CMORAP
CitedBy_id crossref_primary_10_1016_j_ejor_2018_03_031
crossref_primary_10_1016_j_ejor_2016_09_016
crossref_primary_10_1016_j_cie_2023_109007
crossref_primary_10_1016_j_cie_2017_02_022
crossref_primary_10_1016_j_cor_2020_104996
crossref_primary_10_1016_j_ejor_2017_11_035
crossref_primary_10_1007_s10589_015_9795_8
crossref_primary_10_1016_j_future_2017_08_056
crossref_primary_10_1287_trsc_2018_0875
crossref_primary_10_1108_IJLM_04_2021_0199
crossref_primary_10_1016_j_ejor_2020_02_016
crossref_primary_10_2139_ssrn_4156125
crossref_primary_10_3934_math_2022307
crossref_primary_10_1007_s00170_015_7756_0
crossref_primary_10_1007_s10479_017_2705_y
crossref_primary_10_1016_j_ress_2021_108005
crossref_primary_10_1016_j_ijdrr_2019_101380
crossref_primary_10_3233_IFS_152042
crossref_primary_10_1007_s12046_020_1295_6
crossref_primary_10_1007_s12597_019_00354_7
crossref_primary_10_1016_j_tre_2016_07_002
crossref_primary_10_1057_s41274_017_0255_y
crossref_primary_10_1016_j_ejor_2015_07_025
crossref_primary_10_17341_gazimmfd_615372
crossref_primary_10_1016_j_cie_2017_10_003
crossref_primary_10_1016_j_eswa_2015_10_029
crossref_primary_10_1016_j_tre_2024_103482
crossref_primary_10_1080_01630563_2016_1255958
crossref_primary_10_1007_s00500_018_3005_4
crossref_primary_10_3934_math_2022882
crossref_primary_10_1287_ijoc_2022_1196
crossref_primary_10_1016_j_ejor_2017_11_058
crossref_primary_10_1016_j_asoc_2018_04_011
crossref_primary_10_1016_j_tre_2017_03_010
crossref_primary_10_1016_j_cor_2019_01_014
crossref_primary_10_1016_j_cor_2019_104831
crossref_primary_10_1016_j_cor_2015_05_016
crossref_primary_10_1080_23302674_2023_2247964
crossref_primary_10_1080_01605682_2020_1740621
crossref_primary_10_1016_j_cie_2014_03_010
crossref_primary_10_1016_j_ejor_2024_07_013
crossref_primary_10_1016_j_eswa_2018_05_036
crossref_primary_10_1109_ACCESS_2020_3012963
crossref_primary_10_1007_s00500_024_09842_5
crossref_primary_10_1007_s10489_017_1116_8
crossref_primary_10_1016_j_cor_2018_02_020
crossref_primary_10_1057_s41274_017_0185_8
crossref_primary_10_1016_j_omega_2023_102885
crossref_primary_10_1016_j_asoc_2017_11_004
crossref_primary_10_1080_0305215X_2019_1577408
crossref_primary_10_2139_ssrn_4144324
crossref_primary_10_1007_s40314_021_01453_2
crossref_primary_10_1016_j_ress_2022_108440
crossref_primary_10_1016_j_cie_2016_11_004
Cites_doi 10.1137/0403036
10.1093/comjnl/7.4.308
10.1080/00401706.1962.10490033
10.1016/j.cor.2006.09.019
10.1287/opre.12.6.934
10.1002/nav.3800180103
10.1016/j.ejor.2011.09.044
10.1007/s00158-003-0320-9
10.1287/opre.38.5.911
10.1002/nav.3800250412
10.1287/moor.8.4.538
10.1002/nav.3800170302
10.1016/j.compstruc.2004.03.072
10.1287/ijoc.12.4.272.11879
10.1016/j.cor.2010.06.002
10.1111/j.1467-8306.2004.00410.x
10.1007/s10898-008-9291-0
10.1287/mnsc.42.7.954
10.1016/0895-7177(93)90236-R
10.1016/j.biocon.2006.08.009
10.1007/BF01584329
10.1287/inte.1060.0252
10.1007/s10287-005-0025-1
10.1109/TPWRS.2004.825888
10.1080/07408170600729192
10.1002/1520-6750(199204)39:3<419::AID-NAV3220390310>3.0.CO;2-C
10.5711/morj.4.4.15
10.1007/s10100-009-0110-6
10.1109/TPWRS.2005.846198
10.1109/TPWRS.2008.2004825
10.1007/s10898-006-9067-3
10.1002/net.10039
10.1016/j.omega.2011.03.003
10.4095/213921
10.1007/s10957-010-9668-3
10.1111/j.1538-4632.2007.00698.x
10.1109/TPWRS.2005.851942
ContentType Journal Article
Copyright 2012 Elsevier Ltd
Copyright Pergamon Press Inc. Jan 2014
Copyright_xml – notice: 2012 Elsevier Ltd
– notice: Copyright Pergamon Press Inc. Jan 2014
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.cor.2012.08.013
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts
Computer and Information Systems Abstracts

Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
Business
EISSN 1873-765X
0305-0548
EndPage 358
ExternalDocumentID 3102396331
10_1016_j_cor_2012_08_013
S0305054812001785
Genre Feature
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
186
1B1
1OL
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
6J9
7-5
71M
8P~
9JN
9JO
AAAKF
AAAKG
AABNK
AACTN
AAEDT
AAEDW
AAFJI
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AARIN
AAXUO
AAYFN
AAYOK
ABAOU
ABBOA
ABEFU
ABFNM
ABFRF
ABJNI
ABMAC
ABMMH
ABUCO
ABXDB
ABYKQ
ACAZW
ACDAQ
ACGFO
ACGFS
ACNCT
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADGUI
ADJOM
ADMUD
AEBSH
AEFWE
AEHXG
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AI.
AIALX
AIEXJ
AIGVJ
AIKHN
AITUG
AJBFU
AJOXV
AKYCK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
AOUOD
APLSM
ARUGR
ASPBG
AVARZ
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HAMUX
HVGLF
HZ~
H~9
IHE
J1W
KOM
LY1
M41
MHUIS
MO0
MS~
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
PRBVW
Q38
R2-
RIG
ROL
RPZ
RXW
SDF
SDG
SDP
SDS
SES
SEW
SPC
SPCBC
SSB
SSD
SSO
SSV
SSW
SSZ
T5K
TAE
TN5
U5U
UAO
UPT
VH1
WUQ
XFK
XPP
ZMT
~02
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
7SC
8FD
EFKBS
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c422t-4208e33c712d1a7c74133ff83504f8d06ac26759b374582f4b11b147a3a90433
IEDL.DBID AIKHN
ISSN 0305-0548
IngestDate Fri Sep 05 12:21:18 EDT 2025
Fri Sep 05 12:23:38 EDT 2025
Fri Jul 25 05:42:46 EDT 2025
Tue Jul 01 02:06:28 EDT 2025
Thu Apr 24 22:58:51 EDT 2025
Fri Feb 23 02:33:28 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Simplex search
Bilevel programming
Outsourcing
Partial facility interdiction
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c422t-4208e33c712d1a7c74133ff83504f8d06ac26759b374582f4b11b147a3a90433
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
ObjectType-Article-1
ObjectType-Feature-2
PQID 1442810403
PQPubID 23500
PageCount 13
ParticipantIDs proquest_miscellaneous_1671552743
proquest_miscellaneous_1475548206
proquest_journals_1442810403
crossref_citationtrail_10_1016_j_cor_2012_08_013
crossref_primary_10_1016_j_cor_2012_08_013
elsevier_sciencedirect_doi_10_1016_j_cor_2012_08_013
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate January 2014
2014-1-00
20140101
PublicationDateYYYYMMDD 2014-01-01
PublicationDate_xml – month: 01
  year: 2014
  text: January 2014
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle Computers & operations research
PublicationYear 2014
Publisher Elsevier Ltd
Pergamon Press Inc
Publisher_xml – name: Elsevier Ltd
– name: Pergamon Press Inc
References Israeli, Wood (bib26) 2002; 40
Xeon
Radio Free Europe—Radio Liberty. Afghanistan: mobile-phone towers are Taliban's new target.
Wollmer (bib58) 1964; 12
2005 [accessed August.12].
Luersen, Le Riche, Guyon (bib36) 2004; 27
Stackelberg von (bib54) 1952
Intel
Köppe, Queyranne, Ryan (bib27) 2010; 146
Gurson AP. Simplex search behavior in nonlinear optimization
Salmerón, Wood, Baldick (bib45) 2004; 19
IBM ILOG CPLEX v12.1 parameters reference manual.
Software—Intel Xeon W3690 average CPU mark report
Luersen, Le Riche (bib35) 2004; 82
Lenstra (bib29) 1983; 8
Wikipedia, the Free Encyclopedia. 2003 Istanbul bombings
Motto, Arroyo, Galiana (bib39) 2005; 20
O'Hanley, Church, Gilless (bib41) 2007; 134
Dempe S. Discrete bilevel optimization problems. Technical report D-04109. Germany: Institut für Wirtschaftsinformatik, Universität Leipzig; 2001.
2000 [accessed August.012].
Wolff S. A local and globalized, constrained and simple bounded Nelder–Mead method. Technical report. Germany: Bauhaus-Universität Weimar; 2004. As of August 2012, the report was not available at its original source. It can be downloaded from
1999 [accessed August.12].
Nelder, Mead (bib40) 1965; 7
Salmerón, Wood, Baldick (bib46) 2009; 24
Church, Scaparra, Middleton (bib12) 2004; 94
2011 [accessed August.12].
Moore, Bard (bib38) 1990; 38
Scaparra MP, Church RL. Protecting supply systems to mitigate potential disaster: a model to fortify capacitated facilities. Kent Business School working paper no. 209. UK: University of Kent; 2010.
.
Saharidis, Ierapetritou (bib44) 2009; 44
Haftka, Gürdal (bib22) 1993
Smith, Lim, Sudargho (bib51) 2007; 38
Copyright IBM Corporation 1987
McMasters, Mustin (bib37) 1970; 17
Sherali, Adams (bib49) 1990; 3
Golden (bib19) 1971; 25
Scaparra, Church (bib47) 2008; 35
Bramel, Simchi-Levi (bib6) 1997
Chalk P, Hoffman B, Reville R, Kasupski A. Trends in terrorism. RAND Center for Terrorism Risk Management Policy
Snyder, Scaparra, Daskin, Church (bib52) 2006
Liberatore, Scaparra, Daskin (bib30) 2011; 38
2001 [accessed August.12].
Brown, Carlyle, Salmerón, Wood (bib8) 2005
Arroyo, Galiana (bib2) 2005; 20
Brown, Carlyle, Salmerón, Wood (bib9) 2006; 36
Gümüş, Floudas (bib21) 2005; 2
PassMark
2008 [accessed August.12].
Spendley, Hext, Himsworth (bib53) 1962; 4
DeNegre S. Interdiction and discrete bilevel linear programming. Unpublished PhD thesis. Bethlehem (PA), USA: Department of Industrial and Systems Engineering, Lehigh University; 2011.
Wood (bib59) 1993; 17
Chinchuluun, Huang, Pardalos (bib11) 2009
Church, Scaparra (bib13) 2007; 39
Brooks CH. The introduction to amoeba.
Processor 3600 series specifications page
BBC News UK. Arsonists target ambulance station. BBC online network
Liberatore, Scaparra, Daskin (bib31) 2012; 40
Fulkerson, Harding (bib17) 1977; 13
Whiteman (bib55) 1999; 4
[accessed August.12].
Losada, Scaparra, O'Hanley (bib34) 2012; 217
Ghare, Montgomery, Turner (bib18) 1971; 18
Humphrey, Wilson (bib23) 2000; 12
Bard, Moore (bib3) 1992; 39
Deng (bib16) 1998; vol. 20
Barton, Ivey (bib4) 1996; 42
Losada C, Scaparra MP, Church RL, Daskin MS. The multiple resource probabilistic interdiction median problem. Kent Business School working paper no. 187. UK: University of Kent; 2009.
2009 [accessed August.12].
Lim, Smith (bib32) 2007; 39
Aksen, Piyade, Aras (bib1) 2010; 18
Bramel (10.1016/j.cor.2012.08.013_bib6) 1997
Köppe (10.1016/j.cor.2012.08.013_bib27) 2010; 146
Lenstra (10.1016/j.cor.2012.08.013_bib29) 1983; 8
10.1016/j.cor.2012.08.013_bib57
Haftka (10.1016/j.cor.2012.08.013_bib22) 1993
10.1016/j.cor.2012.08.013_bib56
10.1016/j.cor.2012.08.013_bib15
Aksen (10.1016/j.cor.2012.08.013_bib1) 2010; 18
10.1016/j.cor.2012.08.013_bib14
Arroyo (10.1016/j.cor.2012.08.013_bib2) 2005; 20
Scaparra (10.1016/j.cor.2012.08.013_bib47) 2008; 35
Smith (10.1016/j.cor.2012.08.013_bib51) 2007; 38
Brown (10.1016/j.cor.2012.08.013_bib8) 2005
Church (10.1016/j.cor.2012.08.013_bib12) 2004; 94
10.1016/j.cor.2012.08.013_bib10
Luersen (10.1016/j.cor.2012.08.013_bib35) 2004; 82
Liberatore (10.1016/j.cor.2012.08.013_bib30) 2011; 38
Losada (10.1016/j.cor.2012.08.013_bib34) 2012; 217
Israeli (10.1016/j.cor.2012.08.013_bib26) 2002; 40
10.1016/j.cor.2012.08.013_bib48
Humphrey (10.1016/j.cor.2012.08.013_bib23) 2000; 12
Deng (10.1016/j.cor.2012.08.013_bib16) 1998; vol. 20
Salmerón (10.1016/j.cor.2012.08.013_bib45) 2004; 19
Saharidis (10.1016/j.cor.2012.08.013_bib44) 2009; 44
Moore (10.1016/j.cor.2012.08.013_bib38) 1990; 38
Spendley (10.1016/j.cor.2012.08.013_bib53) 1962; 4
Sherali (10.1016/j.cor.2012.08.013_bib49) 1990; 3
Fulkerson (10.1016/j.cor.2012.08.013_bib17) 1977; 13
10.1016/j.cor.2012.08.013_bib42
10.1016/j.cor.2012.08.013_bib43
Wood (10.1016/j.cor.2012.08.013_bib59) 1993; 17
Stackelberg von (10.1016/j.cor.2012.08.013_bib54) 1952
Luersen (10.1016/j.cor.2012.08.013_bib36) 2004; 27
Golden (10.1016/j.cor.2012.08.013_bib19) 1971; 25
McMasters (10.1016/j.cor.2012.08.013_bib37) 1970; 17
Salmerón (10.1016/j.cor.2012.08.013_bib46) 2009; 24
Barton (10.1016/j.cor.2012.08.013_bib4) 1996; 42
Liberatore (10.1016/j.cor.2012.08.013_bib31) 2012; 40
Motto (10.1016/j.cor.2012.08.013_bib39) 2005; 20
Lim (10.1016/j.cor.2012.08.013_bib32) 2007; 39
Bard (10.1016/j.cor.2012.08.013_bib3) 1992; 39
10.1016/j.cor.2012.08.013_bib33
10.1016/j.cor.2012.08.013_bib5
Whiteman (10.1016/j.cor.2012.08.013_bib55) 1999; 4
10.1016/j.cor.2012.08.013_bib24
Gümüş (10.1016/j.cor.2012.08.013_bib21) 2005; 2
Wollmer (10.1016/j.cor.2012.08.013_bib58) 1964; 12
10.1016/j.cor.2012.08.013_bib25
10.1016/j.cor.2012.08.013_bib7
Brown (10.1016/j.cor.2012.08.013_bib9) 2006; 36
Nelder (10.1016/j.cor.2012.08.013_bib40) 1965; 7
O'Hanley (10.1016/j.cor.2012.08.013_bib41) 2007; 134
Snyder (10.1016/j.cor.2012.08.013_bib52) 2006
Church (10.1016/j.cor.2012.08.013_bib13) 2007; 39
10.1016/j.cor.2012.08.013_bib20
Chinchuluun (10.1016/j.cor.2012.08.013_bib11) 2009
Ghare (10.1016/j.cor.2012.08.013_bib18) 1971; 18
References_xml – volume: 39
  start-page: 15
  year: 2007
  end-page: 26
  ident: bib32
  article-title: Algorithms for discrete and continuous multicommodity flow network interdiction problems
  publication-title: IIE Transactions
– volume: vol. 20
  start-page: 149
  year: 1998
  end-page: 164
  ident: bib16
  article-title: Complexity issues in bilevel linear programming
  publication-title: Multilevel optimization: algorithms and applications. Nonconvex optimization and its applications
– reference: ; 2009 [accessed August.12].
– volume: 94
  start-page: 491
  year: 2004
  end-page: 502
  ident: bib12
  article-title: Identifying critical infrastructure: the median and covering facility interdiction problems
  publication-title: Annals of the Association of American Geographers
– reference: Dempe S. Discrete bilevel optimization problems. Technical report D-04109. Germany: Institut für Wirtschaftsinformatik, Universität Leipzig; 2001.
– reference: Xeon
– volume: 12
  start-page: 934
  year: 1964
  end-page: 940
  ident: bib58
  article-title: Removing arcs from a network
  publication-title: Operations Research
– volume: 8
  start-page: 538
  year: 1983
  end-page: 548
  ident: bib29
  article-title: Integer programming with a fixed number of variables
  publication-title: Mathematics of Operations Research
– volume: 4
  start-page: 15
  year: 1999
  end-page: 30
  ident: bib55
  article-title: Improving single strike effectiveness for network interdiction
  publication-title: Military Operations Research
– reference: ; 2000 [accessed August.012].
– start-page: 234−57
  year: 2006
  ident: bib52
  article-title: Planning for disruptions in supply chain networks
  publication-title: TutORials in Operations Research
– volume: 38
  start-page: 181
  year: 2007
  end-page: 199
  ident: bib51
  article-title: Survivable network design under optimal and heuristic interdiction scenarios
  publication-title: Journal of Global Optimization
– year: 1952
  ident: bib54
  article-title: The theory of the market economy
– volume: 18
  start-page: 37
  year: 1971
  end-page: 45
  ident: bib18
  article-title: Optimal interdiction policy for a flow network
  publication-title: Naval Research Logistics Quarterly
– volume: 40
  start-page: 97
  year: 2002
  end-page: 111
  ident: bib26
  article-title: Shortest-path network interdiction
  publication-title: Networks
– volume: 146
  start-page: 137
  year: 2010
  end-page: 150
  ident: bib27
  article-title: Parametric integer programming algorithm for bilevel mixed integer programs
  publication-title: Journal of Optimization Theory and Application
– reference: Brooks CH. The introduction to amoeba.
– year: 1993
  ident: bib22
  article-title: Elements of structural optimization
– year: 1997
  ident: bib6
  article-title: The logic of logistics: theory, algorithms, and applications for logistics management
  publication-title: Springer series in operations research
– volume: 19
  start-page: 905
  year: 2004
  end-page: 912
  ident: bib45
  article-title: Analysis of electric grid security under terrorist threat
  publication-title: IEEE Transactions on Power Systems
– reference: ; 2005 [accessed August.12].
– volume: 35
  start-page: 1905
  year: 2008
  end-page: 1923
  ident: bib47
  article-title: A bilevel mixed-integer program for critical infrastructure protection planning
  publication-title: Computers & Operations Research
– reference: IBM ILOG CPLEX v12.1 parameters reference manual.
– volume: 38
  start-page: 357
  year: 2011
  end-page: 366
  ident: bib30
  article-title: Analysis of facility protection strategies against uncertain numbers of attacks: the stochastic
  publication-title: Computers and Operations Research
– reference: Software—Intel Xeon W3690 average CPU mark report,
– reference: 〉; 2008 [accessed August.12].
– volume: 20
  start-page: 789
  year: 2005
  end-page: 797
  ident: bib2
  article-title: On the solution of the bilevel programming formulation of the terrorist threat problem
  publication-title: IEEE Transactions on Power Systems
– reference: BBC News UK. Arsonists target ambulance station. BBC online network,
– volume: 82
  start-page: 2251
  year: 2004
  end-page: 2260
  ident: bib35
  article-title: Globalized Nelder–Mead method for engineering optimization
  publication-title: Computers and Structures
– reference: Wolff S. A local and globalized, constrained and simple bounded Nelder–Mead method. Technical report. Germany: Bauhaus-Universität Weimar; 2004. As of August 2012, the report was not available at its original source. It can be downloaded from:
– reference: PassMark
– reference: DeNegre S. Interdiction and discrete bilevel linear programming. Unpublished PhD thesis. Bethlehem (PA), USA: Department of Industrial and Systems Engineering, Lehigh University; 2011.
– volume: 20
  start-page: 1357
  year: 2005
  end-page: 1365
  ident: bib39
  article-title: MILP for the analysis of electric grid security under disruptive threat
  publication-title: IEEE Transactions on Power Systems
– reference: Radio Free Europe—Radio Liberty. Afghanistan: mobile-phone towers are Taliban's new target. 〈
– volume: 44
  start-page: 29
  year: 2009
  end-page: 51
  ident: bib44
  article-title: Resolution method for mixed integer bi-level linear problems based on decomposition technique
  publication-title: Journal of Global Optimization
– reference: Scaparra MP, Church RL. Protecting supply systems to mitigate potential disaster: a model to fortify capacitated facilities. Kent Business School working paper no. 209. UK: University of Kent; 2010.
– volume: 39
  start-page: 129
  year: 2007
  end-page: 146
  ident: bib13
  article-title: Protecting critical assets: the
  publication-title: Geographical Analysis
– volume: 17
  start-page: 1
  year: 1993
  end-page: 18
  ident: bib59
  article-title: Deterministic network interdiction
  publication-title: Mathematical and Computer Modelling
– volume: 7
  start-page: 308
  year: 1965
  end-page: 313
  ident: bib40
  article-title: A simplex method for function minimization
  publication-title: Computer Journal
– reference: Processor 3600 series specifications page,
– reference: Gurson AP. Simplex search behavior in nonlinear optimization,
– reference: ; 2001 [accessed August.12].
– volume: 3
  start-page: 411
  year: 1990
  end-page: 430
  ident: bib49
  article-title: A hierarchy of relaxations between the continuous and convex hull representations for zero-one programming problems
  publication-title: SIAM Journal on Discrete Mathematics
– volume: 24
  start-page: 96
  year: 2009
  end-page: 104
  ident: bib46
  article-title: Worst-case interdiction analysis of large-scale electric power grids
  publication-title: IEEE Transactions on Power Systems
– volume: 38
  start-page: 911
  year: 1990
  end-page: 921
  ident: bib38
  article-title: The mixed-integer linear bilevel programming problem
  publication-title: Operations Research
– volume: 39
  start-page: 419
  year: 1992
  end-page: 435
  ident: bib3
  article-title: An algorithm for the discrete bilevel programming problem
  publication-title: Naval Research Logistics
– start-page: 197
  year: 2009
  end-page: 221
  ident: bib11
  article-title: Multilevel (hierarchical) optimization: complexity issues, optimality conditions, algorithms
  publication-title: Advances in applied mathematics and global optimization
– reference: ; 1999 [accessed August.12].
– reference: Intel
– volume: 27
  start-page: 43
  year: 2004
  end-page: 54
  ident: bib36
  article-title: A constrained, globalised, and bounded Nelder–Mead method for engineering optimization
  publication-title: Structural and Multidisciplinary Optimization
– volume: 12
  start-page: 272
  year: 2000
  end-page: 283
  ident: bib23
  article-title: A revised simplex search procedure for the stochastic simulation response surface optimization
  publication-title: INFORMS Journal on Computing
– volume: 17
  start-page: 261
  year: 1970
  end-page: 268
  ident: bib37
  article-title: Optimal interdiction of supply network
  publication-title: Naval Research Logistics Quarterly
– volume: 36
  start-page: 530
  year: 2006
  end-page: 544
  ident: bib9
  article-title: Defending critical infrastructure
  publication-title: Interfaces
– reference: Losada C, Scaparra MP, Church RL, Daskin MS. The multiple resource probabilistic interdiction median problem. Kent Business School working paper no. 187. UK: University of Kent; 2009.
– reference: Wikipedia, the Free Encyclopedia. 2003 Istanbul bombings,
– volume: 2
  start-page: 181
  year: 2005
  end-page: 212
  ident: bib21
  article-title: Global optimization of mixed-integer bilevel programming problems
  publication-title: Computational Management Science
– volume: 134
  start-page: 130
  year: 2007
  end-page: 141
  ident: bib41
  article-title: Locating and protecting critical reserve sites to minimize expected and worst-case losses
  publication-title: Biological Conservation
– reference: Copyright IBM Corporation 1987,
– reference: Chalk P, Hoffman B, Reville R, Kasupski A. Trends in terrorism. RAND Center for Terrorism Risk Management Policy,
– volume: 13
  start-page: 116
  year: 1977
  end-page: 118
  ident: bib17
  article-title: Maximizing the minimum source-sink path subject to a budget constraint
  publication-title: Mathematical Programming
– volume: 217
  start-page: 519
  year: 2012
  end-page: 530
  ident: bib34
  article-title: Optimizing system resilience: a facility protection model with recovery time
  publication-title: European Journal of Operational Research
– volume: 42
  start-page: 954
  year: 1996
  end-page: 973
  ident: bib4
  article-title: Nelder–Mead simplex modifications for simulation optimization
  publication-title: Management Science
– reference: .
– reference: [accessed August.12].
– volume: 4
  start-page: 441
  year: 1962
  end-page: 461
  ident: bib53
  article-title: Sequential application of simplex design in optimization and evolutionary operations
  publication-title: Technometrics
– volume: 40
  start-page: 21
  year: 2012
  end-page: 30
  ident: bib31
  article-title: Hedging against disruptions with ripple effects in location analysis
  publication-title: Omega
– reference: ; 2011 [accessed August.12].
– volume: 18
  start-page: 269
  year: 2010
  end-page: 291
  ident: bib1
  article-title: The budget constrained r-interdiction median problem with capacity expansion
  publication-title: Central European Journal of Operations Research
– start-page: 102
  year: 2005
  end-page: 123
  ident: bib8
  article-title: Analyzing the vulnerability of critical infrastructure to attack and planning defenses
  publication-title: TutORials in Operations Research
– volume: 25
  start-page: 711
  year: 1971
  end-page: 713
  ident: bib19
  article-title: A problem in network interdiction
  publication-title: Naval Research Logistics Quarterly
– volume: 3
  start-page: 411
  issue: 3
  year: 1990
  ident: 10.1016/j.cor.2012.08.013_bib49
  article-title: A hierarchy of relaxations between the continuous and convex hull representations for zero-one programming problems
  publication-title: SIAM Journal on Discrete Mathematics
  doi: 10.1137/0403036
– ident: 10.1016/j.cor.2012.08.013_bib15
– ident: 10.1016/j.cor.2012.08.013_bib57
– volume: 7
  start-page: 308
  issue: 4
  year: 1965
  ident: 10.1016/j.cor.2012.08.013_bib40
  article-title: A simplex method for function minimization
  publication-title: Computer Journal
  doi: 10.1093/comjnl/7.4.308
– volume: 4
  start-page: 441
  issue: 4
  year: 1962
  ident: 10.1016/j.cor.2012.08.013_bib53
  article-title: Sequential application of simplex design in optimization and evolutionary operations
  publication-title: Technometrics
  doi: 10.1080/00401706.1962.10490033
– ident: 10.1016/j.cor.2012.08.013_bib48
– volume: 35
  start-page: 1905
  issue: 6
  year: 2008
  ident: 10.1016/j.cor.2012.08.013_bib47
  article-title: A bilevel mixed-integer program for critical infrastructure protection planning
  publication-title: Computers & Operations Research
  doi: 10.1016/j.cor.2006.09.019
– start-page: 234−57
  year: 2006
  ident: 10.1016/j.cor.2012.08.013_bib52
  article-title: Planning for disruptions in supply chain networks
  publication-title: TutORials in Operations Research
– ident: 10.1016/j.cor.2012.08.013_bib25
– volume: 12
  start-page: 934
  issue: 6
  year: 1964
  ident: 10.1016/j.cor.2012.08.013_bib58
  article-title: Removing arcs from a network
  publication-title: Operations Research
  doi: 10.1287/opre.12.6.934
– volume: 18
  start-page: 37
  issue: 1
  year: 1971
  ident: 10.1016/j.cor.2012.08.013_bib18
  article-title: Optimal interdiction policy for a flow network
  publication-title: Naval Research Logistics Quarterly
  doi: 10.1002/nav.3800180103
– volume: 217
  start-page: 519
  issue: 3
  year: 2012
  ident: 10.1016/j.cor.2012.08.013_bib34
  article-title: Optimizing system resilience: a facility protection model with recovery time
  publication-title: European Journal of Operational Research
  doi: 10.1016/j.ejor.2011.09.044
– ident: 10.1016/j.cor.2012.08.013_bib33
– ident: 10.1016/j.cor.2012.08.013_bib5
– volume: 27
  start-page: 43
  issue: 1−2
  year: 2004
  ident: 10.1016/j.cor.2012.08.013_bib36
  article-title: A constrained, globalised, and bounded Nelder–Mead method for engineering optimization
  publication-title: Structural and Multidisciplinary Optimization
  doi: 10.1007/s00158-003-0320-9
– year: 1993
  ident: 10.1016/j.cor.2012.08.013_bib22
– year: 1997
  ident: 10.1016/j.cor.2012.08.013_bib6
  article-title: The logic of logistics: theory, algorithms, and applications for logistics management
– volume: 38
  start-page: 911
  issue: 5
  year: 1990
  ident: 10.1016/j.cor.2012.08.013_bib38
  article-title: The mixed-integer linear bilevel programming problem
  publication-title: Operations Research
  doi: 10.1287/opre.38.5.911
– start-page: 197
  year: 2009
  ident: 10.1016/j.cor.2012.08.013_bib11
  article-title: Multilevel (hierarchical) optimization: complexity issues, optimality conditions, algorithms
– volume: 25
  start-page: 711
  issue: 4
  year: 1971
  ident: 10.1016/j.cor.2012.08.013_bib19
  article-title: A problem in network interdiction
  publication-title: Naval Research Logistics Quarterly
  doi: 10.1002/nav.3800250412
– volume: 8
  start-page: 538
  issue: 4
  year: 1983
  ident: 10.1016/j.cor.2012.08.013_bib29
  article-title: Integer programming with a fixed number of variables
  publication-title: Mathematics of Operations Research
  doi: 10.1287/moor.8.4.538
– volume: 17
  start-page: 261
  issue: 3
  year: 1970
  ident: 10.1016/j.cor.2012.08.013_bib37
  article-title: Optimal interdiction of supply network
  publication-title: Naval Research Logistics Quarterly
  doi: 10.1002/nav.3800170302
– ident: 10.1016/j.cor.2012.08.013_bib43
– volume: 82
  start-page: 2251
  issue: 23−26
  year: 2004
  ident: 10.1016/j.cor.2012.08.013_bib35
  article-title: Globalized Nelder–Mead method for engineering optimization
  publication-title: Computers and Structures
  doi: 10.1016/j.compstruc.2004.03.072
– volume: 12
  start-page: 272
  issue: 4
  year: 2000
  ident: 10.1016/j.cor.2012.08.013_bib23
  article-title: A revised simplex search procedure for the stochastic simulation response surface optimization
  publication-title: INFORMS Journal on Computing
  doi: 10.1287/ijoc.12.4.272.11879
– volume: 38
  start-page: 357
  issue: 1
  year: 2011
  ident: 10.1016/j.cor.2012.08.013_bib30
  article-title: Analysis of facility protection strategies against uncertain numbers of attacks: the stochastic R-interdiction median problem with fortification
  publication-title: Computers and Operations Research
  doi: 10.1016/j.cor.2010.06.002
– volume: 94
  start-page: 491
  issue: 3
  year: 2004
  ident: 10.1016/j.cor.2012.08.013_bib12
  article-title: Identifying critical infrastructure: the median and covering facility interdiction problems
  publication-title: Annals of the Association of American Geographers
  doi: 10.1111/j.1467-8306.2004.00410.x
– volume: vol. 20
  start-page: 149
  year: 1998
  ident: 10.1016/j.cor.2012.08.013_bib16
  article-title: Complexity issues in bilevel linear programming
– volume: 44
  start-page: 29
  issue: 1
  year: 2009
  ident: 10.1016/j.cor.2012.08.013_bib44
  article-title: Resolution method for mixed integer bi-level linear problems based on decomposition technique
  publication-title: Journal of Global Optimization
  doi: 10.1007/s10898-008-9291-0
– volume: 42
  start-page: 954
  issue: 7
  year: 1996
  ident: 10.1016/j.cor.2012.08.013_bib4
  article-title: Nelder–Mead simplex modifications for simulation optimization
  publication-title: Management Science
  doi: 10.1287/mnsc.42.7.954
– volume: 17
  start-page: 1
  issue: 2
  year: 1993
  ident: 10.1016/j.cor.2012.08.013_bib59
  article-title: Deterministic network interdiction
  publication-title: Mathematical and Computer Modelling
  doi: 10.1016/0895-7177(93)90236-R
– ident: 10.1016/j.cor.2012.08.013_bib42
– volume: 134
  start-page: 130
  issue: 1
  year: 2007
  ident: 10.1016/j.cor.2012.08.013_bib41
  article-title: Locating and protecting critical reserve sites to minimize expected and worst-case losses
  publication-title: Biological Conservation
  doi: 10.1016/j.biocon.2006.08.009
– volume: 13
  start-page: 116
  issue: 1
  year: 1977
  ident: 10.1016/j.cor.2012.08.013_bib17
  article-title: Maximizing the minimum source-sink path subject to a budget constraint
  publication-title: Mathematical Programming
  doi: 10.1007/BF01584329
– volume: 36
  start-page: 530
  issue: 6
  year: 2006
  ident: 10.1016/j.cor.2012.08.013_bib9
  article-title: Defending critical infrastructure
  publication-title: Interfaces
  doi: 10.1287/inte.1060.0252
– volume: 2
  start-page: 181
  issue: 3
  year: 2005
  ident: 10.1016/j.cor.2012.08.013_bib21
  article-title: Global optimization of mixed-integer bilevel programming problems
  publication-title: Computational Management Science
  doi: 10.1007/s10287-005-0025-1
– volume: 19
  start-page: 905
  issue: 2
  year: 2004
  ident: 10.1016/j.cor.2012.08.013_bib45
  article-title: Analysis of electric grid security under terrorist threat
  publication-title: IEEE Transactions on Power Systems
  doi: 10.1109/TPWRS.2004.825888
– ident: 10.1016/j.cor.2012.08.013_bib56
– volume: 39
  start-page: 15
  issue: 1
  year: 2007
  ident: 10.1016/j.cor.2012.08.013_bib32
  article-title: Algorithms for discrete and continuous multicommodity flow network interdiction problems
  publication-title: IIE Transactions
  doi: 10.1080/07408170600729192
– volume: 39
  start-page: 419
  issue: 3
  year: 1992
  ident: 10.1016/j.cor.2012.08.013_bib3
  article-title: An algorithm for the discrete bilevel programming problem
  publication-title: Naval Research Logistics
  doi: 10.1002/1520-6750(199204)39:3<419::AID-NAV3220390310>3.0.CO;2-C
– volume: 4
  start-page: 15
  issue: 4
  year: 1999
  ident: 10.1016/j.cor.2012.08.013_bib55
  article-title: Improving single strike effectiveness for network interdiction
  publication-title: Military Operations Research
  doi: 10.5711/morj.4.4.15
– ident: 10.1016/j.cor.2012.08.013_bib10
– ident: 10.1016/j.cor.2012.08.013_bib14
– start-page: 102
  year: 2005
  ident: 10.1016/j.cor.2012.08.013_bib8
  article-title: Analyzing the vulnerability of critical infrastructure to attack and planning defenses
  publication-title: TutORials in Operations Research
– volume: 18
  start-page: 269
  issue: 3
  year: 2010
  ident: 10.1016/j.cor.2012.08.013_bib1
  article-title: The budget constrained r-interdiction median problem with capacity expansion
  publication-title: Central European Journal of Operations Research
  doi: 10.1007/s10100-009-0110-6
– volume: 20
  start-page: 789
  issue: 2
  year: 2005
  ident: 10.1016/j.cor.2012.08.013_bib2
  article-title: On the solution of the bilevel programming formulation of the terrorist threat problem
  publication-title: IEEE Transactions on Power Systems
  doi: 10.1109/TPWRS.2005.846198
– volume: 24
  start-page: 96
  issue: 1
  year: 2009
  ident: 10.1016/j.cor.2012.08.013_bib46
  article-title: Worst-case interdiction analysis of large-scale electric power grids
  publication-title: IEEE Transactions on Power Systems
  doi: 10.1109/TPWRS.2008.2004825
– ident: 10.1016/j.cor.2012.08.013_bib24
– volume: 38
  start-page: 181
  issue: 2
  year: 2007
  ident: 10.1016/j.cor.2012.08.013_bib51
  article-title: Survivable network design under optimal and heuristic interdiction scenarios
  publication-title: Journal of Global Optimization
  doi: 10.1007/s10898-006-9067-3
– volume: 40
  start-page: 97
  issue: 2
  year: 2002
  ident: 10.1016/j.cor.2012.08.013_bib26
  article-title: Shortest-path network interdiction
  publication-title: Networks
  doi: 10.1002/net.10039
– volume: 40
  start-page: 21
  issue: 1
  year: 2012
  ident: 10.1016/j.cor.2012.08.013_bib31
  article-title: Hedging against disruptions with ripple effects in location analysis
  publication-title: Omega
  doi: 10.1016/j.omega.2011.03.003
– ident: 10.1016/j.cor.2012.08.013_bib7
  doi: 10.4095/213921
– volume: 146
  start-page: 137
  issue: 1
  year: 2010
  ident: 10.1016/j.cor.2012.08.013_bib27
  article-title: Parametric integer programming algorithm for bilevel mixed integer programs
  publication-title: Journal of Optimization Theory and Application
  doi: 10.1007/s10957-010-9668-3
– year: 1952
  ident: 10.1016/j.cor.2012.08.013_bib54
– ident: 10.1016/j.cor.2012.08.013_bib20
– volume: 39
  start-page: 129
  issue: 2
  year: 2007
  ident: 10.1016/j.cor.2012.08.013_bib13
  article-title: Protecting critical assets: the r-interdiction median problem with fortification
  publication-title: Geographical Analysis
  doi: 10.1111/j.1538-4632.2007.00698.x
– volume: 20
  start-page: 1357
  issue: 3
  year: 2005
  ident: 10.1016/j.cor.2012.08.013_bib39
  article-title: MILP for the analysis of electric grid security under disruptive threat
  publication-title: IEEE Transactions on Power Systems
  doi: 10.1109/TPWRS.2005.851942
SSID ssj0000721
Score 2.3321462
Snippet In this paper, partial facility interdiction decisions are integrated for the first time into a median type network interdiction problem with capacitated...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 346
SubjectTerms Bilevel programming
Budgeting
Decisions
Demand
Game theory
Mathematical models
Mathematical problems
Mathematical programming
Networks
Operations research
Outsourcing
Partial facility interdiction
Search methods
Searching
Simplex search
Studies
Title A bilevel partial interdiction problem with capacitated facilities and demand outsourcing
URI https://dx.doi.org/10.1016/j.cor.2012.08.013
https://www.proquest.com/docview/1442810403
https://www.proquest.com/docview/1475548206
https://www.proquest.com/docview/1671552743
Volume 41
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB76ANGDj6pYrWUFT0JssrtN7LEUS1XoxQr1FLLJBio1LZp69Lc7s9n4AnvwlMfOLsk-5rEz-w3AufLJOSUCR7kidaQWrhOhGuEo0UXxl6JEUCbaYuyPHuTttDutwKA8C0NhlZb3FzzdcGv7pmN7s7OczTr3NFVR4UAJVeSYr0Kdi57frUG9f3M3Gn8x5MAcvyJ6hyqUzk0T5oU2HgV4cQPk6Ym_xNMvRm2kz3AXtq3ayPrFl-1BRWcN2Cij1huwU2ZnYHaxNmDrG9TgPjz2mUIG8KbnbEn_h40RUgROD3OwgdnEMoz2ZVmMEjSmw2c6YSnezQ3sKouyhCX6mS6LVW62_bHtA5gMryeDkWPTKjix5Dx3yKGuhYgDjydeFMSoUwiRpqiKuTK9Slw_ijmaET0lAnKqpVJ5nvJkEImoR3Bnh1DLFpk-AoZvFFrQSINWSY_rSGtUoWIUeJJrP5VNcMvODGMLOU6ZL-ZhGVv2FGL_h9T_IWXD9EQTLj6rLAu8jXXEshyh8MekCVEerKvWKkcztCv2FU0gNMTQNnWx-OyzGNcaOVCiTC9WRBOg9kWI92to_MCg2klx_L-vO4FNfJLFNk8LavnLSp-i4pOrNlQv3722nd4fxtr_cw
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLbGkHgceAwQgwFB4oRU1jZZy47TBBowdmFI4xQ1bSoNjW6CjSO_HTtNx0NiB06tGidKEye2Y-czwJkKyDnFQ0e5PHWE5q4ToRrhKN5A8ZeiRFAm2qIXdB7F7aAxKEG7uAtDYZV278_3dLNb2y91O5r1yXBYfyBWRYUDJVSeY34JlkWDhxTXd_HxFedBAGC5K6HhEHnh2jRBXmjhUXiXb2A8Pf6XcPq1TRvZc70FG1ZpZK28X9tQ0lkFVoqY9QpsFrkZmF2qFVj_BjS4A08tpnD5v-sRm9DfYWOEE4HMYa41MJtWhtGpLItRfsZ09UwnLMW3kQFdZVGWsES_0GM8m5pDf2x7F_rXV_12x7FJFZxY-P7UIXe65jwOPT_xojBGjYLzNEVFzBXpZeIGUeyjEdFUPCSXWiqU5ylPhBGPmgR2tgflbJzpfWD4RaH9jDRokzR9HWmNClSM4k74OkhFFdxiMGVsAccp78VIFpFlzxLHX9L4S8qF6fEqnM-rTHK0jUXEopgh-YNlJEqDRdVqxWxKu17f0ABCMwwtUxeLT-fFuNLIfRJlejwjmhB1L8K7X0AThAbTTvCD__XuBFY7_fuu7N707g5hDUtEfuBTg_L0daaPUAWaqmPD4p_umgBN
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+bilevel+partial+interdiction+problem+with+capacitated+facilities+and+demand+outsourcing&rft.jtitle=Computers+%26+operations+research&rft.au=Aksen%2C+Deniz&rft.au=Akca%2C+Sema+Sengul&rft.au=Aras%2C+Necati&rft.date=2014-01-01&rft.issn=0305-0548&rft.volume=41&rft.spage=346&rft.epage=358&rft_id=info:doi/10.1016%2Fj.cor.2012.08.013&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0305-0548&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0305-0548&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0305-0548&client=summon