A survey of network interdiction models and algorithms
This paper discusses the development of interdiction optimization models and algorithms,
with an emphasis on mathematical programming techniques and future research challenges …
with an emphasis on mathematical programming techniques and future research challenges …
Edgecooper: Network-aware cooperative lidar perception for enhanced vehicular awareness
Autonomous driving vehicle (ADV) that is ready to transform our society and economy, is in
desperate need of precise positioning over itself as well as surrounding environments …
desperate need of precise positioning over itself as well as surrounding environments …
An arc cover–path-cover formulation and strategic analysis of alternative-fuel station locations
In this study, we present a new formulation of the generalized flow-refueling location model
that takes vehicle range and trips between origin–destination pairs into account. The new …
that takes vehicle range and trips between origin–destination pairs into account. The new …
A tri-level location-allocation model for forward/reverse supply chain
AMF Fard, M Hajaghaei-Keshteli - Applied Soft Computing, 2018 - Elsevier
The design of supply chain network usually directly influences the performance of location-
allocation of facilities, especially for the main parties. This paper firstly addresses the tri-level …
allocation of facilities, especially for the main parties. This paper firstly addresses the tri-level …
Hedging against disruptions with ripple effects in location analysis
Supply systems are subject to disruptions whose impact may not remain confined, but might
actually propagate across the network. We consider the problem of optimally protecting a …
actually propagate across the network. We consider the problem of optimally protecting a …
Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications
Human trafficking is a complex transnational problem for society and the global economy.
While researchers have studied this topic in a variety of contexts, including the criminology …
While researchers have studied this topic in a variety of contexts, including the criminology …
[HTML][HTML] Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs
MHR Khouzani, Z Liu, P Malacaria - European Journal of Operational …, 2019 - Elsevier
We present a framework to efficiently solve a multi-objective optimisation problem for cyber-
security defence. Facing an attacker who can mount a multi-stage attack (modelled using …
security defence. Facing an attacker who can mount a multi-stage attack (modelled using …
Strategies for protecting supply chain networks against facility and transportation disruptions: an improved Benders decomposition approach
Disruptions rarely occur in supply chains, but their negative financial and technical impacts
make the recovery process very slow. In this paper, we propose a capacitated supply chain …
make the recovery process very slow. In this paper, we propose a capacitated supply chain …
[HTML][HTML] Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies
Abstract In recent years, Industrial Control Systems (ICS) have become increasingly
exposed to a wide range of cyber-physical attacks, having massive destructive …
exposed to a wide range of cyber-physical attacks, having massive destructive …
[HTML][HTML] Optimal development of alternative fuel station networks considering node capacity restrictions
A potential solution to reduce greenhouse gas (GHG) emissions in the transport sector is the
use of alternative fuel vehicles (AFV). As global GHG emission standards have been in …
use of alternative fuel vehicles (AFV). As global GHG emission standards have been in …