Bounding network interdiction vulnerability through cutset identification

Timothy C. Matisziw, Alan T. Murray, Tony H. Grubesic

Research output: Chapter in Book/Report/Conference proceedingChapter

21 Scopus citations


Assessing the vulnerability of network infrastructure to disruptive events is recognized as an important component of network planning and analysis. Motivations for this type of research range from searching for the most effective/ efficient means of disrupting a network (e.g., preventing drug trafficking — see Wood 1993) to assessing possible threats to critical network infrastructures so that adequate protective measures can be devised to limit potential disruption (see Wu 1992). In such analysis, the disruptive activity being examined, whether due to natural disaster, accident, or sabotage, can be generically referred to as network interdiction.

Original languageEnglish (US)
Title of host publicationAdvances in Spatial Science
PublisherSpringer International Publishing
Number of pages14
StatePublished - 2007

Publication series

NameAdvances in Spatial Science
ISSN (Print)1430-9602
ISSN (Electronic)2197-9375

ASJC Scopus subject areas

  • Geography, Planning and Development
  • Economics and Econometrics


Dive into the research topics of 'Bounding network interdiction vulnerability through cutset identification'. Together they form a unique fingerprint.

Cite this