Interdiction Models and Applications
Nedialko B. Dimitrov and
David P. Morton
Additional contact information
Nedialko B. Dimitrov: Naval Postgraduate School
David P. Morton: The University of Texas at Austin
Chapter Chapter 4 in Handbook of Operations Research for Homeland Security, 2013, pp 73-103 from Springer
Abstract:
Abstract Through interdiction models, we infer the vulnerabilities inherent in an operational system. This chapter presents four applications of interdiction modeling: (a) to delay an adversary’s development of a first nuclear weapon; (b) to understand vulnerabilities in an electric power system; (c) to locate sensors in a municipal water network; and (d) to secure a border against a nuclear smuggler. In each case, we detail and interpret the mathematical model and characterize insights gained from solving instances of the model. We point to special structures that sometimes arise in interdiction models and the associated implications for analyses. From these examples, themes emerge on how one should model, and defend against, an intelligent adversary.
Keywords: International Atomic Energy Agency; Nuclear Weapon; Sensor Location; Electric Power Grid; Threat Scenario (search for similar items in EconPapers)
Date: 2013
References: Add references at CitEc
Citations: View citations in EconPapers (5)
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:isochp:978-1-4614-5278-2_4
Ordering information: This item can be ordered from
http://www.springer.com/9781461452782
DOI: 10.1007/978-1-4614-5278-2_4
Access Statistics for this chapter
More chapters in International Series in Operations Research & Management Science from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().