{"id":"https://openalex.org/W1978425349","doi":"https://doi.org/10.1109/acc.2012.6315444","title":"Stochastic dynamic network interdiction games","display_name":"Stochastic dynamic network interdiction games","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W1978425349","doi":"https://doi.org/10.1109/acc.2012.6315444","mag":"1978425349"},"language":"en","primary_location":{"id":"doi:10.1109/acc.2012.6315444","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acc.2012.6315444","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 American Control Conference (ACC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035901955","display_name":"Jiefu Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiefu Zheng","raw_affiliation_strings":["Systems Engineering, Boston University, USA","Systems Engineering, Boston University"],"affiliations":[{"raw_affiliation_string":"Systems Engineering, Boston University, USA","institution_ids":["https://openalex.org/I111088046"]},{"raw_affiliation_string":"Systems Engineering, Boston University","institution_ids":["https://openalex.org/I111088046"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103073490","display_name":"David A. Casta\u00f1\u00f3n","orcid":"https://orcid.org/0000-0002-9635-9776"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"D. A. Castanon","raw_affiliation_strings":["Electrical and Computer Engineering, Boston University, USA","Electrical and Computer Engineering, Boston University"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, Boston University, USA","institution_ids":["https://openalex.org/I111088046"]},{"raw_affiliation_string":"Electrical and Computer Engineering, Boston University","institution_ids":["https://openalex.org/I111088046"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035901955"],"corresponding_institution_ids":["https://openalex.org/I111088046"],"apc_list":null,"apc_paid":null,"fwci":4.0981,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.92475993,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1838","last_page":"1844"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10928","display_name":"Probabilistic and Robust Engineering Design","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interdiction","display_name":"Interdiction","score":0.9809780120849609},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7461655139923096},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.6109980344772339},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.516024112701416},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.473898321390152},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4515704810619354},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.43609780073165894},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3178909420967102},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.123816579580307},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08861333131790161}],"concepts":[{"id":"https://openalex.org/C124119293","wikidata":"https://www.wikidata.org/wiki/Q6046081","display_name":"Interdiction","level":2,"score":0.9809780120849609},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7461655139923096},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.6109980344772339},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.516024112701416},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.473898321390152},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4515704810619354},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.43609780073165894},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3178909420967102},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.123816579580307},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08861333131790161},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acc.2012.6315444","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acc.2012.6315444","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 American Control Conference (ACC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1752958389","https://openalex.org/W1975387421","https://openalex.org/W1996684664","https://openalex.org/W2000953623","https://openalex.org/W2016305567","https://openalex.org/W2038426159","https://openalex.org/W2044121814","https://openalex.org/W2045640143","https://openalex.org/W2053569226","https://openalex.org/W2086832561","https://openalex.org/W2091364465","https://openalex.org/W2094463866","https://openalex.org/W2100387313","https://openalex.org/W2106321966","https://openalex.org/W2117972428","https://openalex.org/W2133494553","https://openalex.org/W2138336119","https://openalex.org/W2156245899","https://openalex.org/W3151643035","https://openalex.org/W4240374930"],"related_works":["https://openalex.org/W2011893084","https://openalex.org/W878290859","https://openalex.org/W3129432682","https://openalex.org/W2092143804","https://openalex.org/W2043774727","https://openalex.org/W2045321170","https://openalex.org/W325242609","https://openalex.org/W21922278","https://openalex.org/W4353003365","https://openalex.org/W238664624"],"abstract_inverted_index":{"Network":[0],"interdiction":[1,66,88],"problems":[2,49,62],"consist":[3],"of":[4,31,109,127,164,192],"games":[5,89],"between":[6],"an":[7,10],"attacker":[8,15,92],"and":[9,50,68,102,129,159,178],"intelligent":[11],"network,":[12,101],"where":[13,90],"the":[14,22,29,32,54,60,70,79,91,100,107,113,146,150,183,193],"seeks":[16],"to":[17,27,44,47,72,74,98,154,187],"degrade":[18],"network":[19,23,51,65,87],"operations":[20,26],"while":[21],"adapts":[24],"its":[25,45],"counteract":[28],"effects":[30],"attacker.":[33],"This":[34],"problem":[35],"has":[36,93],"received":[37],"significant":[38],"attention":[39],"in":[40,145,204],"recent":[41],"years":[42],"due":[43],"relevance":[46],"military":[48],"security.":[52],"When":[53],"attacker's":[55],"actions":[56],"achieve":[57],"uncertain":[58],"effects,":[59],"resulting":[61],"become":[63],"stochastic":[64,86],"problems,":[67],"allow":[69],"players":[71],"adapt":[73],"new":[75,120,162,194],"information":[76,105],"collected":[77],"during":[78],"game.":[80],"In":[81],"this":[82,168],"paper,":[83],"we":[84,117],"study":[85],"one":[94],"or":[95],"two":[96,156,188],"stages":[97],"attack":[99],"can":[103],"collect":[104],"on":[106,124],"outcomes":[108],"previous":[110,143,205],"attacks.":[111],"For":[112],"single":[114,151,184],"stage":[115,152,157,185],"problem,":[116],"develop":[118,160],"a":[119,155,161,175],"solution":[121],"algorithm,":[122],"based":[123],"parsimonious":[125],"integration":[126],"branch":[128,177],"bound":[130,179],"techniques":[131],"with":[132,201],"increasingly":[133],"accurate":[134],"lower":[135],"bounds,":[136],"that":[137,181],"obtains":[138],"solutions":[139],"significantly":[140],"faster":[141],"than":[142],"approaches":[144],"literature.":[147],"We":[148,170],"extend":[149],"formulation":[153],"formulation,":[158],"set":[163],"performance":[165],"bounds":[166,173],"for":[167],"problem.":[169],"integrate":[171],"these":[172],"into":[174],"modified":[176],"procedure":[180],"extends":[182],"approach":[186],"stages.":[189],"The":[190],"efficacy":[191],"algorithms":[195],"is":[196],"shown":[197],"using":[198],"simulated":[199],"experiments":[200],"networks":[202],"studied":[203],"papers.":[206]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
