相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A budgeted maximum multiple coverage model for cybersecurity planning and management
Kaiyue Zheng et al.
IISE TRANSACTIONS (2019)
A Robust Approach for Mitigating Risks in Cyber Supply Chains
Kaiyue Zheng et al.
RISK ANALYSIS (2019)
Stochastic maximum flow interdiction problems under heterogeneous risk preferences
Xiao Lei et al.
COMPUTERS & OPERATIONS RESEARCH (2018)
A Value-Function-Based Exact Approach for the Bilevel Mixed-Integer Programming Problem
Leonardo Lozano et al.
OPERATIONS RESEARCH (2017)
Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender-attacker model
Apurba K. Nandi et al.
COMPUTERS & OPERATIONS RESEARCH (2016)
Dynamic Shortest-Path Interdiction
Jorge A. Sefair et al.
NETWORKS (2016)
Risk-Averse Shortest Path Interdiction
Yongjia Song et al.
INFORMS JOURNAL ON COMPUTING (2016)
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Saman A. Zonouz et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Securing a border under asymmetric information
Kelly M. Sullivan et al.
NAVAL RESEARCH LOGISTICS (2014)
Maximum dynamic network flow interdiction problem: New formulation and solution procedures
M. Afshari Rad et al.
COMPUTERS & INDUSTRIAL ENGINEERING (2013)
Interdicting a Nuclear-Weapons Project
Gerald G. Brown et al.
OPERATIONS RESEARCH (2009)
Minimizing a stochastic maximum-reliability path
Feng Pan et al.
NETWORKS (2008)
Reformulation and sampling to solve a stochastic network interdiction problem
Udom Janjarassuk et al.
NETWORKS (2008)
Models for nuclear smuggling interdiction
David P. Morton et al.
IIE TRANSACTIONS (2007)
Shortest-path network interdiction
E Israeli et al.
NETWORKS (2002)