Author:
Soleimani-Alyar Maryam,Ghaffari-Hadigheh Alireza
Publisher
Springer Science and Business Media LLC
Reference24 articles.
1. Department of Homeland Security (DHS). A roadmap for cybersecurity research. Department of Homeland Security (DHS), Technical Report, November, 2009
2. Allende, G.B., Still, G. Solving bilevel programs with the KKT-approach. Math. Program., Ser. A, 138: 309–332 (2013)
3. Chang, C.T. An efficient linearization approach for mixed-integer problems. European Journal of Operational Research, 123(3): 652–659 (2000)
4. Corely, H.W., Sha, D.Y. Most vital links and nodes in weighted network. Operations Research Letters, 1: 157–160 (1982)
5. Cormican, K.J., Morton, D.P., Wood, R.K. Stochastic network interdiction. Operations Research, 46: 184–197 (1998)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献