Interdiction models and applications

Nedialko B. Dimitrov, David P. Morton*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapter

8 Scopus citations

Abstract

Through interdiction models, we infer the vulnerabilities inherent in an operational system. This chapter presents four applications of interdiction modeling: (a) to delay an adversary’s development of a first nuclear weapon; (b) to understand vulnerabilities in an electric power system; (c) to locate sensors in a municipal water network; and (d) to secure a border against a nuclear smuggler. In each case, we detail and interpret the mathematical model and characterize insights gained from solving instances of the model. We point to special structures that sometimes arise in interdiction models and the associated implications for analyses. From these examples, themes emerge on how one should model, and defend against, an intelligent adversary.

Original languageEnglish (US)
Title of host publicationInternational Series in Operations Research and Management Science
PublisherSpringer New York LLC
Pages73-103
Number of pages31
DOIs
StatePublished - Jan 1 2013

Publication series

NameInternational Series in Operations Research and Management Science
Volume183
ISSN (Print)0884-8289

ASJC Scopus subject areas

  • Software
  • Computer Science Applications
  • Strategy and Management
  • Management Science and Operations Research
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Interdiction models and applications'. Together they form a unique fingerprint.

Cite this