4.3 Article

Securing a border under asymmetric information

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Deception tactics for network interdiction: A multiobjective approach

Javier Salmeron

NETWORKS (2012)

Article Computer Science, Hardware & Architecture

Minimizing a stochastic maximum-reliability path

Feng Pan et al.

NETWORKS (2008)

Article Computer Science, Hardware & Architecture

Reformulation and sampling to solve a stochastic network interdiction problem

Udom Janjarassuk et al.

NETWORKS (2008)

Article Computer Science, Hardware & Architecture

Shortest path network interdiction with asymmetric information

Halil Bayrak et al.

NETWORKS (2008)

Article Engineering, Industrial

Models for nuclear smuggling interdiction

David P. Morton et al.

IIE TRANSACTIONS (2007)

Article Computer Science, Hardware & Architecture

Shortest-path network interdiction

E Israeli et al.

NETWORKS (2002)