Bounding network interdiction vulnerability through cutset identification

Timothy C. Matisziw, Alan T. Murray, Tony H. Grubesic

Research output: Chapter in Book/Report/Conference proceedingChapter

21 Scopus citations

Abstract

Assessing the vulnerability of network infrastructure to disruptive events is recognized as an important component of network planning and analysis. Motivations for this type of research range from searching for the most effective/ efficient means of disrupting a network (e.g., preventing drug trafficking — see Wood 1993) to assessing possible threats to critical network infrastructures so that adequate protective measures can be devised to limit potential disruption (see Wu 1992). In such analysis, the disruptive activity being examined, whether due to natural disaster, accident, or sabotage, can be generically referred to as network interdiction.

Original languageEnglish (US)
Title of host publicationAdvances in Spatial Science
PublisherSpringer International Publishing
Pages243-256
Number of pages14
Edition9783540680550
DOIs
StatePublished - 2007

Publication series

NameAdvances in Spatial Science
Number9783540680550
ISSN (Print)1430-9602
ISSN (Electronic)2197-9375

ASJC Scopus subject areas

  • Geography, Planning and Development
  • Economics and Econometrics

Fingerprint

Dive into the research topics of 'Bounding network interdiction vulnerability through cutset identification'. Together they form a unique fingerprint.

Cite this