A survey of network interdiction models and algorithms

JC Smith, Y Song - European Journal of Operational Research, 2020 - Elsevier
This paper discusses the development of interdiction optimization models and algorithms,
with an emphasis on mathematical programming techniques and future research challenges …

Edgecooper: Network-aware cooperative lidar perception for enhanced vehicular awareness

G Luo, C Shao, N Cheng, H Zhou… - IEEE Journal on …, 2023 - ieeexplore.ieee.org
Autonomous driving vehicle (ADV) that is ready to transform our society and economy, is in
desperate need of precise positioning over itself as well as surrounding environments …

An arc cover–path-cover formulation and strategic analysis of alternative-fuel station locations

I Capar, M Kuby, VJ Leon, YJ Tsai - European Journal of Operational …, 2013 - Elsevier
In this study, we present a new formulation of the generalized flow-refueling location model
that takes vehicle range and trips between origin–destination pairs into account. The new …

A tri-level location-allocation model for forward/reverse supply chain

AMF Fard, M Hajaghaei-Keshteli - Applied Soft Computing, 2018 - Elsevier
The design of supply chain network usually directly influences the performance of location-
allocation of facilities, especially for the main parties. This paper firstly addresses the tri-level …

Hedging against disruptions with ripple effects in location analysis

F Liberatore, MP Scaparra, MS Daskin - Omega, 2012 - Elsevier
Supply systems are subject to disruptions whose impact may not remain confined, but might
actually propagate across the network. We consider the problem of optimally protecting a …

Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications

RA Konrad, AC Trapp, TM Palmbach… - European Journal of …, 2017 - Elsevier
Human trafficking is a complex transnational problem for society and the global economy.
While researchers have studied this topic in a variety of contexts, including the criminology …

[HTML][HTML] Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs

MHR Khouzani, Z Liu, P Malacaria - European Journal of Operational …, 2019 - Elsevier
We present a framework to efficiently solve a multi-objective optimisation problem for cyber-
security defence. Facing an attacker who can mount a multi-stage attack (modelled using …

Strategies for protecting supply chain networks against facility and transportation disruptions: an improved Benders decomposition approach

N Azad, GKD Saharidis, H Davoudpour… - Annals of Operations …, 2013 - Springer
Disruptions rarely occur in supply chains, but their negative financial and technical impacts
make the recovery process very slow. In this paper, we propose a capacitated supply chain …

[HTML][HTML] Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies

M Barrère, C Hankin, N Nicolaou, DG Eliades… - Journal of information …, 2020 - Elsevier
Abstract In recent years, Industrial Control Systems (ICS) have become increasingly
exposed to a wide range of cyber-physical attacks, having massive destructive …

[HTML][HTML] Optimal development of alternative fuel station networks considering node capacity restrictions

PK Rose, R Nugroho, T Gnann, P Plötz… - … Research Part D …, 2020 - Elsevier
A potential solution to reduce greenhouse gas (GHG) emissions in the transport sector is the
use of alternative fuel vehicles (AFV). As global GHG emission standards have been in …