Interdiction models and applications

Nedialko B. Dimitrov, David P. Morton*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapter

11 Scopus citations


Through interdiction models, we infer the vulnerabilities inherent in an operational system. This chapter presents four applications of interdiction modeling: (a) to delay an adversary’s development of a first nuclear weapon; (b) to understand vulnerabilities in an electric power system; (c) to locate sensors in a municipal water network; and (d) to secure a border against a nuclear smuggler. In each case, we detail and interpret the mathematical model and characterize insights gained from solving instances of the model. We point to special structures that sometimes arise in interdiction models and the associated implications for analyses. From these examples, themes emerge on how one should model, and defend against, an intelligent adversary.

Original languageEnglish (US)
Title of host publicationInternational Series in Operations Research and Management Science
PublisherSpringer New York LLC
Number of pages31
StatePublished - Jan 1 2013

Publication series

NameInternational Series in Operations Research and Management Science
ISSN (Print)0884-8289

ASJC Scopus subject areas

  • Software
  • Computer Science Applications
  • Strategy and Management
  • Management Science and Operations Research
  • Applied Mathematics


Dive into the research topics of 'Interdiction models and applications'. Together they form a unique fingerprint.

Cite this