Abstract

AbstractThe field of network interdiction explores techniques for optimally impeding network operations using limited disruption actions. These disruptions may serve to remove network components, decrease arc capacities, or increase cost flows. Network interdiction models and algorithms help to identify vulnerabilities in a complex network without resorting to exhaustively enumerating worst‐case scenarios, and can be coupled with fortification models to assess benefits of protecting a network. This article is presented at an introductory level to illustrate the use and breadth of interdiction models, along with a discussion of fortification and design problems.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call