{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T13:14:14Z","timestamp":1770988454444,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,6,14]],"date-time":"2012-06-14T00:00:00Z","timestamp":1339632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s10479-012-1170-x","type":"journal-article","created":{"date-parts":[[2012,6,13]],"date-time":"2012-06-13T12:49:56Z","timestamp":1339591796000},"page":"345-365","source":"Crossref","is-referenced-by-count":50,"title":["The stochastic interdiction median problem with disruption intensity levels"],"prefix":"10.1007","volume":"201","author":[{"given":"Chaya","family":"Losada","sequence":"first","affiliation":[]},{"given":"M. Paola","family":"Scaparra","sequence":"additional","affiliation":[]},{"given":"Richard L.","family":"Church","sequence":"additional","affiliation":[]},{"given":"Mark S.","family":"Daskin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,6,14]]},"reference":[{"key":"1170_CR1","doi-asserted-by":"crossref","first-page":"1364","DOI":"10.1016\/j.cor.2011.08.006","volume":"39","author":"D. Aksen","year":"2012","unstructured":"Aksen, D., & Aras, N. (2012). A bilevel fixed charge location model for facilities under imminent attack. Computers & Operations Research, 39, 1364\u20131381.","journal-title":"Computers & Operations Research"},{"key":"1170_CR2","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s10100-009-0110-6","volume":"18","author":"D. Aksen","year":"2010","unstructured":"Aksen, D., Piyade, N., & Aras, N. (2010). The budget constrained r-interdiction median problem with capacity expansion. Central European Journal of Operations Research, 18, 269\u2013291.","journal-title":"Central European Journal of Operations Research"},{"key":"1170_CR3","author":"D. Aksen","year":"2011","unstructured":"Aksen, D., Aras, N., & Piyade, N. (2011). A bilevel p-median model for the planning and protection of critical facilities. Journal of Heuristics. doi: 10.1007\/s10732-011-9163-5 .","journal-title":"Journal of Heuristics"},{"key":"1170_CR4","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TPWRS.2005.846198","volume":"20","author":"J. M. Arroyo","year":"2005","unstructured":"Arroyo, J. M., & Galiana, F. D. (2005). On the solution of the bilevel programming formulation of the terrorist threat problem. IEEE Transactions on Power Systems, 20, 789\u2013797.","journal-title":"IEEE Transactions on Power Systems"},{"key":"1170_CR5","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1002\/net.20236","volume":"52","author":"H. Bayrak","year":"2008","unstructured":"Bayrak, H., & Bailey, M. D. (2008). Shortest path network interdiction with asymmetric information. Networks, 52, 133\u2013140.","journal-title":"Networks"},{"key":"1170_CR6","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1111\/j.1475-3995.2009.00660.x","volume":"16","author":"O. Berman","year":"2009","unstructured":"Berman, O., Drezner, T., Drezner, Z., & Wesolowsky, G. O. (2009). A defensive maximal covering problem on a network. International Transactions in Operational Research, 16, 69\u201386.","journal-title":"International Transactions in Operational Research"},{"key":"1170_CR7","volume-title":"Introduction to stochastic programming","author":"J. R. Birge","year":"1997","unstructured":"Birge, J. R., & Louveaux, F. (1997). Introduction to stochastic programming. New York: Springer."},{"key":"1170_CR8","unstructured":"Boros, E., Borys, K., Gurvich, V., & Rudolf, G. (2006). Inapproximability bounds for shortest-path network interdiction problems (DIMACS Technical Report 13)."},{"key":"1170_CR9","doi-asserted-by":"crossref","first-page":"67","DOI":"10.5711\/morj.4.1.67","volume":"4","author":"A. Brooks","year":"1999","unstructured":"Brooks, A., Bennett, B., & Bankes, B. (1999). An application of exploratory analysis: the weapon mix problem. Military Operations Research, 4, 67\u201380.","journal-title":"Military Operations Research"},{"issue":"6","key":"1170_CR10","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1287\/inte.1060.0252","volume":"36","author":"G. Brown","year":"2006","unstructured":"Brown, G., Carlyle, M., Salmeron, J., & Wood, K. (2006). Defending critical infrastructure. Interfaces, 36(6), 530\u2013544.","journal-title":"Interfaces"},{"issue":"4","key":"1170_CR11","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1287\/opre.1080.0643","volume":"57","author":"G. G. Brown","year":"2009","unstructured":"Brown, G. G., Carlyle, W. M., Harney, R. C., Skroch, E. M., & Wood, R. K. (2009). Interdicting a nuclear-weapons project. Operations Research, 57(4), 866\u2013877.","journal-title":"Operations Research"},{"key":"1170_CR12","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1287\/trsc.1100.0340","volume":"45","author":"P. Cappanera","year":"2011","unstructured":"Cappanera, P., & Scaparra, P. M. (2011). Optimal allocation of protective resources in shortest-path networks. Transportation Science, 45, 64\u201380.","journal-title":"Transportation Science"},{"key":"1170_CR13","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s10107-005-0689-x","volume":"107","author":"R. D. Carr","year":"2005","unstructured":"Carr, R. D., Greenberg, H. J., Hart, W. E., Konjevod, G., Lauer, E., Lin, H., Morrison, T., & Phillips, C. A. (2005). Robust optimization of contaminant sensor placement for community water systems. Mathematical Programming, 107, 337\u2013356.","journal-title":"Mathematical Programming"},{"key":"1170_CR14","volume-title":"Reliability and vulnerability in critical infrastructure: a quantitative geographic perspective","author":"R. L. Church","year":"2007","unstructured":"Church, R. L., & Scaparra, M. P. (2007). Analysis of facility systems\u2019 reliability when subject to attack or a natural disaster. In: Reliability and vulnerability in critical infrastructure: a quantitative geographic perspective. Berlin: Springer."},{"issue":"3","key":"1170_CR15","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1111\/j.1467-8306.2004.00410.x","volume":"94","author":"R. L. Church","year":"2004","unstructured":"Church, R. L., Scaparra, M. P., & Middleton, R. S. (2004). Identifying critical infrastructure: the median and covering facility interdiction problems. Annals of the Association of the American Geographers, 94(3), 491\u2013502.","journal-title":"Annals of the Association of the American Geographers"},{"issue":"2","key":"1170_CR16","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1287\/opre.46.2.184","volume":"46","author":"K. J. Cormican","year":"1998","unstructured":"Cormican, K. J., Morton, D. P., & Wood, R. K. (1998). Stochastic network interdiction. Operations Research, 46(2), 184\u2013197.","journal-title":"Operations Research"},{"issue":"4","key":"1170_CR17","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1287\/opre.1090.0801","volume":"58","author":"T. Cui","year":"2010","unstructured":"Cui, T., Ouyang, Y., & Shen, Z. M. (2010). Reliable facility location design under the risk of disruptions. Operations Research, 58(4), 998\u20131011.","journal-title":"Operations Research"},{"key":"1170_CR18","volume-title":"Foundations of bilevel programming","author":"S. Dempe","year":"2002","unstructured":"Dempe, S. (2002). Foundations of bilevel programming. The Netherlands: Kluwer Academic."},{"issue":"1","key":"1170_CR19","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/s10479-009-0677-2","volume":"187","author":"N. B. Dimitrov","year":"2011","unstructured":"Dimitrov, N. B., Michalopoulos, D. P., Morton, D. P., Nehme, M. V., Pan, F., Popova, E., Schneider, E. A., & Thoreson, G. G. (2011). Network deployment of radiation detectors with physics-based detection probability calculations. Annals of Operations Research, 187(1), 207\u2013228.","journal-title":"Annals of Operations Research"},{"key":"1170_CR20","series-title":"Lecture notes in economics and mathematical systems","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-95696-6","volume-title":"Stochastic two-stage programming","author":"K. Frauendorfer","year":"1992","unstructured":"Frauendorfer, K. (1992). Lecture notes in economics and mathematical systems: Vol.\u00a0392. Stochastic two-stage programming. Berlin: Springer."},{"key":"1170_CR21","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/BF01584329","volume":"13","author":"D. R. Fulkerson","year":"1977","unstructured":"Fulkerson, D. R., & Harding, G. C. (1977). Maximizing the minimum source-sink path subject to a budget constraint. Mathematical Programming, 13, 116\u2013118.","journal-title":"Mathematical Programming"},{"issue":"2\u20133","key":"1170_CR22","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/s10107-006-0715-7","volume":"108","author":"V. Goel","year":"2006","unstructured":"Goel, V., & Grossmann, I. E. (2006). A class of stochastic programs with decision dependent uncertainty. Mathematical Programming, 108(2\u20133), 355\u2013394.","journal-title":"Mathematical Programming"},{"key":"1170_CR23","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1002\/nav.3800250412","volume":"25","author":"B. Golden","year":"1978","unstructured":"Golden, B. (1978). A problem of network interdiction. Naval Research Logistics Quarterly, 25, 711\u2013713.","journal-title":"Naval Research Logistics Quarterly"},{"key":"1170_CR24","first-page":"544","volume":"113","author":"S. L. Hakimi","year":"1964","unstructured":"Hakimi, S. L. (1964). Optimum location of switching centers and the absolute centers and medians of a graph. Operations Research, 113, 544\u2013559.","journal-title":"Operations Research"},{"key":"1170_CR25","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1007\/s10732-005-3122-y","volume":"11","author":"H. Held","year":"2005","unstructured":"Held, H., & Woodruff, D. L. (2005). Heuristics for multi-stage interdiction of stochastic networks. Journal of Heuristics, 11, 483\u2013500.","journal-title":"Journal of Heuristics"},{"key":"1170_CR26","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1002\/nav.20079","volume":"52","author":"H. Held","year":"2005","unstructured":"Held, H., Hemmecke, R., & Woodruff, D. L. (2005). A decomposition algorithm applied to planning the interdiction of stochastic networks. Naval Research Logistics, 52, 321\u2013328.","journal-title":"Naval Research Logistics"},{"key":"1170_CR27","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/0-306-48109-X_4","volume-title":"Network interdiction and stochastic integer programming","author":"R. Hemmecke","year":"2003","unstructured":"Hemmecke, R., Schultz, R., & Woodruff, D. L. (2003). Interdiction stochastic networks with binary interdiction effort. In D. L. Woodruff (Ed.), Network interdiction and stochastic integer programming (pp.\u00a069\u201384). Boston: Kluwer."},{"key":"1170_CR28","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4115-8","volume-title":"Stochastic decomposition: a statistical method for large scale stochastic linear programming","author":"J. L. Higle","year":"1996","unstructured":"Higle, J. L., & Sen, S. (1996). Stochastic decomposition: a statistical method for large scale stochastic linear programming. Norwell: Kluwer Academic."},{"issue":"1","key":"1170_CR29","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TPWRS.2006.889080","volume":"22","author":"A. J. Holmgren","year":"2007","unstructured":"Holmgren, A. J., Jenelius, E., & Westin, J. (2007). Evaluating strategies for defending electric power networks against antagonistic attacks. IEEE Transactions on Power Systems, 22(1), 76\u201384.","journal-title":"IEEE Transactions on Power Systems"},{"issue":"2","key":"1170_CR30","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1002\/net.10039","volume":"40","author":"E. Israeli","year":"2002","unstructured":"Israeli, E., & Wood, R. K. (2002). Shortest-path network interdiction. Networks, 40(2), 97\u2013111.","journal-title":"Networks"},{"key":"1170_CR31","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1002\/net.20237","volume":"52","author":"U. Janjarassuk","year":"2008","unstructured":"Janjarassuk, U., & Linderoth, J. (2008). Reformulation and sampling to solve a stochastic network interdiction problem. Networks, 52, 120\u2013132.","journal-title":"Networks"},{"key":"1170_CR32","volume-title":"Numerical techniques for stochastic optimization","author":"P. Kall","year":"1988","unstructured":"Kall, P., Ruszczy\u0144ski, A., & Frauendorfer, K. (1988). Approximation techniques in stochastic programming. In Y. Ermoliev & R. J.-B. Wets (Eds.), Numerical techniques for stochastic optimization, Berlin: Springer."},{"key":"1170_CR33","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1007\/s00224-007-9025-6","volume":"43","author":"I. Khachiyan","year":"2008","unstructured":"Khachiyan, I., Boros, E., Borys, K., Elbassioni, K., Gurvich, V., Rudolf, G., & Zhao, J. (2008). On shortest paths interdiction problems: total and node-wise limited interdiction. Theory of Computing Systems, 43, 204\u2013233.","journal-title":"Theory of Computing Systems"},{"key":"1170_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/00045608.2010.532739","volume":"101","author":"F. Liberatore","year":"2011","unstructured":"Liberatore, F., & Scaparra, M. P. (2011). Optimizing protection strategies for supply chains: comparing classic decision making criteria in an uncertain environment. Annals of the Association of American Geographers, 101, 1\u201317.","journal-title":"Annals of the Association of American Geographers"},{"issue":"1","key":"1170_CR35","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.cor.2010.06.002","volume":"38","author":"F. Liberatore","year":"2011","unstructured":"Liberatore, F., Scaparra, M. P., & Daskin, M. S. (2011). Analysis of facility protection strategies against an uncertain number of attacks: the stochastic r-interdiction median problem with fortification. Computers & Operations Research, 38(1), 357\u2013366.","journal-title":"Computers & Operations Research"},{"issue":"1","key":"1170_CR36","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.omega.2011.03.003","volume":"40","author":"F. Liberatore","year":"2012","unstructured":"Liberatore, F., Scaparra, M. P., & Daskin, M. (2012). Optimization methods for hedging against disruptions with ripple effects in location analysis. Omega, 40(1), 21\u201330.","journal-title":"Omega"},{"key":"1170_CR37","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1080\/07408170600729192","volume":"39","author":"C. Lim","year":"2007","unstructured":"Lim, C., & Smith, L. C. (2007). Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Transactions, 39, 15\u201326.","journal-title":"IIE Transactions"},{"key":"1170_CR38","unstructured":"Losada, C., Scaparra, M. P., & Church, R. L. (2009). Interdiction of p-median systems with facility recovery time and disruptions frequency: analysis of resiliency (Working Paper No. 220). University of Kent, Kent Business School, Canterbury, Kent, UK."},{"key":"1170_CR39","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.ejor.2011.09.044","volume":"217","author":"C. Losada","year":"2012","unstructured":"Losada, C., Scaparra, M. P., & O\u2019Hanley, J. R. (2012). Optimizing system resilience: a facility protection model with recovery time. European Journal of Operational Research, 217, 519\u2013530.","journal-title":"European Journal of Operational Research"},{"issue":"6","key":"1170_CR40","doi-asserted-by":"crossref","first-page":"786","DOI":"10.1287\/mnsc.1030.0164","volume":"50","author":"G. Lulli","year":"2004","unstructured":"Lulli, G., & Sen, S. (2004). A branch-and-price algorithm for multistage stochastic integer programming with application to stochastic batch-sizing problems. Management Science, 50(6), 786\u2013796.","journal-title":"Management Science"},{"issue":"1","key":"1170_CR41","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s10852-009-9118-0","volume":"9","author":"G. Lulli","year":"2010","unstructured":"Lulli, G., Messina, E., Archetti, F., & Lanzeni, S. (2010). A mathematical model for optimal functional disruption of biochemical networks. Journal of Mathematical Modelling and Algorithms, 9(1), 19\u201337.","journal-title":"Journal of Mathematical Modelling and Algorithms"},{"key":"1170_CR42","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s11067-009-9123-x","volume":"10","author":"T. C. Matisziw","year":"2010","unstructured":"Matisziw, T. C., Murray, A. T., & Grubesic, T. H. (2010). Strategic network restoration. Networks and Spatial Economics, 10, 345\u2013361.","journal-title":"Networks and Spatial Economics"},{"issue":"3","key":"1170_CR43","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1002\/nav.3800170302","volume":"17","author":"A. McMasters","year":"1970","unstructured":"McMasters, A., & Mustin, T. M. (1970). Optimal interdiction of a supply network. Naval Research Logistics Quarterly, 17(3), 261\u2013268.","journal-title":"Naval Research Logistics Quarterly"},{"key":"1170_CR44","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1287\/opre.38.5.911","volume":"38","author":"J. T. Moore","year":"1990","unstructured":"Moore, J. T., & Bard, J. F. (1990). The mixed integer linear bilevel programming problem. Operations Research, 38, 911\u2013921.","journal-title":"Operations Research"},{"key":"1170_CR45","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/07408170500488956","volume":"39","author":"D. P. Morton","year":"2007","unstructured":"Morton, D. P., Pan, F., & Saeger, K. J. (2007). Models for nuclear smuggling interdiction. IIE Transactions, 39, 3\u201314.","journal-title":"IIE Transactions"},{"key":"1170_CR46","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-68056-7","volume-title":"Critical infrastructure: reliability and vulnerability","author":"A. T. Murray","year":"2007","unstructured":"Murray, A. T., & Grubesic, T. H. (2007). Critical infrastructure: reliability and vulnerability. Berlin: Springer."},{"key":"1170_CR47","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.ejor.2010.08.030","volume":"209","author":"J. O\u2019Hanley","year":"2011","unstructured":"O\u2019Hanley, J., & Church, R. L. (2011). Designing robust coverage to hedge against worst-case facility losses. European Journal of Operational Research, 209, 23\u201336.","journal-title":"European Journal of Operational Research"},{"key":"1170_CR48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/0-306-48109-X_1","volume-title":"A stochastic program for interdicting smuggled nuclear material","author":"F. Pan","year":"2003","unstructured":"Pan, F., Charlton, W., & Morton, D. (2003). A stochastic program for interdicting smuggled nuclear material (pp. 1\u201320). Dordrecht: Kluwer Academic."},{"issue":"2","key":"1170_CR49","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1287\/ijoc.1060.0191","volume":"19","author":"J. O. Royset","year":"2007","unstructured":"Royset, J. O., & Wood, R. K. (2007). Solving the bi-objective maximum-flow network-interdiction problem. INFORMS Journal on Computing, 19(2), 175\u2013184.","journal-title":"INFORMS Journal on Computing"},{"issue":"2","key":"1170_CR50","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TPWRS.2004.825888","volume":"19","author":"J. Salmeron","year":"2004","unstructured":"Salmeron, J., Wood, R. K., & Baldick, R. (2004). Analysis of electric grid security under terrorist threat. IEEE Transactions on Power Systems, 19(2), 905\u2013912.","journal-title":"IEEE Transactions on Power Systems"},{"key":"1170_CR51","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.ejor.2004.01.046","volume":"167","author":"T. Santoso","year":"2005","unstructured":"Santoso, T., Ahmed, S., Goetschalckx, M., & Shapiro, A. (2005). A stochastic programming approach for supply network design under uncertainty. European Journal of Operational Research, 167, 96\u2013115.","journal-title":"European Journal of Operational Research"},{"key":"1170_CR52","unstructured":"Scaparra, M. P. (2009). Hardening facilities to minimize expected costs given random failures (Working paper, KBS Working Paper No. 185). University of Kent."},{"key":"1170_CR53","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1016\/j.cor.2006.09.019","volume":"35","author":"M. P. Scaparra","year":"2008","unstructured":"Scaparra, M. P., & Church, R. L. (2008a). A bilevel mixed integer program for critical infrastructure protection planning. Computers & Operations Research, 35, 1905\u20131923.","journal-title":"Computers & Operations Research"},{"key":"1170_CR54","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.ejor.2007.05.027","volume":"189","author":"M. P. Scaparra","year":"2008","unstructured":"Scaparra, M. P., & Church, R. L. (2008b). An exact solution approach for the interdiction median problem with fortification. European Journal of Operational Research, 189, 76\u201392.","journal-title":"European Journal of Operational Research"},{"issue":"2","key":"1170_CR55","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/s10107-006-0716-6","volume":"108","author":"E. F. Silva","year":"2006","unstructured":"Silva, E. F., & Wood, R. K. (2006). Solving a class of stochastic mixed-integer programs with branch and price. Mathematical Programming, 108(2), 395\u2013418.","journal-title":"Mathematical Programming"},{"key":"1170_CR56","unstructured":"Singh, K., Philpott, A., & Wood, K. (2005). Column-generation for design of survivable networks (Working Paper). Department of Engineering Science, University of Auckland, Auckland, New Zealand."},{"key":"1170_CR57","volume-title":"The theory of market economy","author":"H. Stackelberg","year":"1952","unstructured":"Stackelberg, H. (1952). The theory of market economy. London: Oxford University Press."},{"key":"1170_CR58","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1137\/0117061","volume":"17","author":"R. M. Slyke Van","year":"1969","unstructured":"Van Slyke, R. M., & Wets, R. J. B. (1969). L-shaped programs with applications to optimal control and stochastic linear programming. SIAM Journal on Applied Mathematics, 17, 638\u2013663.","journal-title":"SIAM Journal on Applied Mathematics"},{"key":"1170_CR59","unstructured":"Waters, N. M. (1977). Methodology for servicing the geography of urban fire: an exploration with special reference to London, Ontario. Unpublished Ph.D. thesis. Department of Geography, University of Western Ontario, London, Ontario, Canada."},{"key":"1170_CR60","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1137\/1016053","volume":"16","author":"R. J.-B. Wets","year":"1974","unstructured":"Wets, R. J.-B. (1974). Stochastic programs with fixed recourse: the equivalent deterministic program. SIAM Review, 16, 309\u2013339.","journal-title":"SIAM Review"},{"key":"1170_CR61","doi-asserted-by":"crossref","first-page":"15","DOI":"10.5711\/morj.4.4.15","volume":"4","author":"P. S. Whiteman","year":"1999","unstructured":"Whiteman, P. S. (1999). Improving single strike effectiveness for network interdiction. Military Operations Research, 4, 15\u201330.","journal-title":"Military Operations Research"},{"issue":"6","key":"1170_CR62","doi-asserted-by":"crossref","first-page":"934","DOI":"10.1287\/opre.12.6.934","volume":"12","author":"R. Wollmer","year":"1964","unstructured":"Wollmer, R. (1964). Removing arcs from a network. Operations Research, 12(6), 934\u2013940.","journal-title":"Operations Research"},{"issue":"2","key":"1170_CR63","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0895-7177(93)90236-R","volume":"17","author":"R. K. Wood","year":"1993","unstructured":"Wood, R. K. (1993). Deterministic network interdiction. Mathematical and Computer Modelling, 17(2), 1\u201318.","journal-title":"Mathematical and Computer Modelling"},{"key":"1170_CR64","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s12198-011-0063-6","volume":"4","author":"J. T. Yates","year":"2011","unstructured":"Yates, J. T., Batta, R., & Karwan, M. (2011). Optimal placement of sensors and interception resource assessment for the protection of regional infrastructure from covert attack. Journal of Transportation Security, 4, 145\u2013169.","journal-title":"Journal of Transportation Security"}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-012-1170-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10479-012-1170-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-012-1170-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T23:28:23Z","timestamp":1561850903000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10479-012-1170-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,14]]},"references-count":64,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["1170"],"URL":"https:\/\/doi.org\/10.1007\/s10479-012-1170-x","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6,14]]}}}