{"id":"https://openalex.org/W1993771871","doi":"https://doi.org/10.1109/milcom.2011.6127492","title":"Precise structural vulnerability assessment via mathematical programming","display_name":"Precise structural vulnerability assessment via mathematical programming","publication_year":2011,"publication_date":"2011-11-01","ids":{"openalex":"https://openalex.org/W1993771871","doi":"https://doi.org/10.1109/milcom.2011.6127492","mag":"1993771871"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2011.6127492","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127492","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010321059","display_name":"Thang N. Dinh","orcid":"https://orcid.org/0000-0003-4847-8356"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Thang N. Dinh","raw_affiliation_strings":["Computer & Information Science & Engineering, University of Florida, Gainesville, FL, USA","Computer & Information Science & Engineering, University of Florida, Gainesville, 32611, USA"],"affiliations":[{"raw_affiliation_string":"Computer & Information Science & Engineering, University of Florida, Gainesville, FL, USA","institution_ids":["https://openalex.org/I33213144"]},{"raw_affiliation_string":"Computer & Information Science & Engineering, University of Florida, Gainesville, 32611, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005663679","display_name":"My T. Thai","orcid":"https://orcid.org/0000-0003-0503-2012"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"My T. Thai","raw_affiliation_strings":["Computer & Information Science & Engineering, University of Florida, Gainesville, FL, USA","Computer & Information Science & Engineering, University of Florida, Gainesville, 32611, USA"],"affiliations":[{"raw_affiliation_string":"Computer & Information Science & Engineering, University of Florida, Gainesville, FL, USA","institution_ids":["https://openalex.org/I33213144"]},{"raw_affiliation_string":"Computer & Information Science & Engineering, University of Florida, Gainesville, 32611, USA","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5010321059"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":3.2888,"has_fulltext":false,"cited_by_count":46,"citation_normalized_percentile":{"value":0.91985717,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1351","last_page":"1356"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6715283989906311},{"id":"https://openalex.org/keywords/integer-programming","display_name":"Integer programming","score":0.6444783806800842},{"id":"https://openalex.org/keywords/betweenness-centrality","display_name":"Betweenness centrality","score":0.6385753154754639},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5789597034454346},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4834250211715698},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.47951605916023254},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.45494604110717773},{"id":"https://openalex.org/keywords/linear-programming","display_name":"Linear programming","score":0.430185467004776},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.4219732880592346},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.4193270206451416},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3100314140319824},{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.2612823247909546},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2505080997943878},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1039828360080719},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0885699987411499}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6715283989906311},{"id":"https://openalex.org/C56086750","wikidata":"https://www.wikidata.org/wiki/Q6042592","display_name":"Integer programming","level":2,"score":0.6444783806800842},{"id":"https://openalex.org/C117045392","wikidata":"https://www.wikidata.org/wiki/Q4899215","display_name":"Betweenness centrality","level":3,"score":0.6385753154754639},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5789597034454346},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4834250211715698},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.47951605916023254},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.45494604110717773},{"id":"https://openalex.org/C41045048","wikidata":"https://www.wikidata.org/wiki/Q202843","display_name":"Linear programming","level":2,"score":0.430185467004776},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.4219732880592346},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.4193270206451416},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3100314140319824},{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.2612823247909546},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2505080997943878},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1039828360080719},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0885699987411499},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/milcom.2011.6127492","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127492","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.259.1375","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.1375","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cise.ufl.edu/%7Emythai/files/disruptor_exact.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.724.3536","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.724.3536","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.people.vcu.edu/%7Etndinh/papers/milcom11_disruptorExact.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1489279788","https://openalex.org/W1854214752","https://openalex.org/W1966279959","https://openalex.org/W1975492545","https://openalex.org/W2004841112","https://openalex.org/W2055747219","https://openalex.org/W2057504236","https://openalex.org/W2072919599","https://openalex.org/W2077510448","https://openalex.org/W2088298388","https://openalex.org/W2088773777","https://openalex.org/W2104692292","https://openalex.org/W2107673345","https://openalex.org/W2112090702","https://openalex.org/W2113344319","https://openalex.org/W2117495845","https://openalex.org/W2121035174","https://openalex.org/W2123806189","https://openalex.org/W2127405101","https://openalex.org/W2153561032","https://openalex.org/W2248754878","https://openalex.org/W2295665070","https://openalex.org/W2914959486","https://openalex.org/W3145128584","https://openalex.org/W4233802931","https://openalex.org/W4246219036"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2062873522","https://openalex.org/W2947584067","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2789975780"],"abstract_inverted_index":{"Network":[0],"vulnerability":[1,50,108],"assessment":[2,16,109],"is":[3,80],"an":[4,102,112,134],"indispensable":[5],"component":[6],"of":[7,85,122,130,179,185],"attack":[8],"risk":[9],"reduction":[10],"and":[11,57,144,164,207],"proactive":[12],"response.":[13],"However,":[14],"traditional":[15],"methods":[17],"simply":[18],"assume":[19],"the":[20,36,62,70,78,83,94,107,118,123,131,154,157,183,186],"attacks":[21],"only":[22],"target":[23],"at":[24],"nodes":[25],"with":[26,88],"high":[27],"degree":[28],"or":[29],"betweenness":[30],"centrality,":[31],"thus":[32],"fail":[33],"to":[34,60,72,116,193,203],"capture":[35],"worst-case":[37],"scenarios":[38],"under":[39],"simultaneous":[40],"failures.":[41],"In":[42,97],"our":[43,169],"previous":[44],"work,":[45],"we":[46,100],"formulated":[47],"assessing":[48],"network":[49,71,180],"as":[51,82],"optimization":[52,209],"problems,":[53],"so-called":[54],"\u03b2-edge":[55],"disruptor":[56],"\u03b2-vertex":[58,124],"disruptor,":[59],"identify":[61],"minimum":[63],"cost":[64],"critical":[65],"infrastructures":[66],"that":[67,152,168],"removal":[68],"expose":[69],"a":[73,147,172,176],"certain":[74],"disruption":[75,79],"level.":[76],"Here,":[77],"measured":[81],"fraction":[84],"node":[86],"pairs":[87],"no":[89],"paths":[90],"between":[91],"them":[92],"in":[93],"residual":[95],"network.":[96],"this":[98],"paper,":[99],"present":[101],"exact":[103,113],"analytical":[104],"solution":[105],"for":[106],"problems":[110],"i.e.":[111],"branch-and-cut":[114],"algorithm":[115,170],"solve":[117],"integer":[119],"programming":[120],"formulation":[121],"disruptor.":[125],"The":[126],"two":[127],"intriguing":[128],"aspects":[129],"algorithms":[132],"are":[133],"efficient":[135],"Mixed":[136],"Integer":[137],"Programming":[138],"(MIP)":[139],"formulation,":[140],"called":[141],"sparse":[142],"metric,":[143],"vertex-cut":[145],"inequalities,":[146],"specialized":[148],"cutting":[149],"plane":[150],"procedure":[151],"tightens":[153],"bound":[155],"on":[156,161,175],"optimal":[158],"solutions.":[159],"Experiments":[160],"both":[162],"synthetic":[163],"real-world":[165],"networks":[166],"suggest":[167],"yields":[171],"significant":[173],"improvement":[174],"large":[177],"variety":[178],"instances,":[181],"raising":[182],"size":[184],"largest":[187],"instance":[188],"solved":[189],"from":[190],"several":[191,194],"dozen":[192],"hundred":[195],"nodes.":[196],"Our":[197],"techniques":[198],"can":[199],"be":[200],"easily":[201],"extended":[202],"many":[204],"graph":[205],"partitioning":[206],"connectivity":[208],"problems.":[210]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
