@inbook{bc8912f8dcb64896ae2dbd33c1afda61,
title = "Bounding network interdiction vulnerability through cutset identification",
abstract = "Assessing the vulnerability of network infrastructure to disruptive events is recognized as an important component of network planning and analysis. Motivations for this type of research range from searching for the most effective/ efficient means of disrupting a network (e.g., preventing drug trafficking — see Wood 1993) to assessing possible threats to critical network infrastructures so that adequate protective measures can be devised to limit potential disruption (see Wu 1992). In such analysis, the disruptive activity being examined, whether due to natural disaster, accident, or sabotage, can be generically referred to as network interdiction.",
author = "Matisziw, {Timothy C.} and Murray, {Alan T.} and Grubesic, {Tony H.}",
note = "Funding Information: Project funding for Matisziw and Murray is provided through the Center for Urban and Regional Analysis at The Ohio State University. Publisher Copyright: {\textcopyright} 2007, Springer-Verlag Berlin Heidelberg.",
year = "2007",
doi = "10.1007/978-3-540-68056-7_12",
language = "English (US)",
series = "Advances in Spatial Science",
publisher = "Springer International Publishing",
number = "9783540680550",
pages = "243--256",
booktitle = "Advances in Spatial Science",
edition = "9783540680550",
}