The mixed integer linear bilevel programming problem
Operations Research
A bilevel model of taxation and its application to optimal highway pricing
Management Science
Stochastic Network Interdiction
Operations Research
Designing a Road Network for Hazardous Materials Transportation
Transportation Science
Defending Critical Infrastructure
Interfaces
Survivable network design under optimal and heuristic interdiction scenarios
Journal of Global Optimization
A bilevel mixed-integer program for critical infrastructure protection planning
Computers and Operations Research
Solving the hazmat transport network design problem
Computers and Operations Research
Shortest path network interdiction with asymmetric information
Networks - Games, Interdiction, and Human Interaction Problems on Networks
Modeling the gateway location problem for multicommodity flow rerouting
INOC'11 Proceedings of the 5th international conference on Network optimization
Measuring and maximizing resilience of freight transportation networks
Computers and Operations Research
Computers and Industrial Engineering
Hi-index | 0.00 |
This article introduces a game-theoretic approach for allocating protection resources among the components of a network so as to maximize its robustness to external disruptions. Specifically, we consider shortest-path networks where disruptions may result in traffic flow delays through the affected components or even in the complete loss of some elements. A multilevel program is proposed to identify the set of components to harden so as to minimize the length of the shortest path between a supply node and a demand node after a worst-case disruption of some unprotected components. An implicit enumeration algorithm is then developed to solve the multilevel problem to optimality. The approach is streamlined by solving the lower-level interdiction problem heuristically at each node of an enumeration tree and by using some variable fixing rules to reduce the dimension of the lower-level problems. A thorough computational investigation demonstrates that the proposed solution method is able to identify optimal protection strategies for networks of significant size. The paper is concluded with a study of the sensitivity of the solution approach to variations of the problem parameters such as the level of disruption and protective resources and the distribution of the arc lengths and delays.