{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:26:47Z","timestamp":1763458007871,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T00:00:00Z","timestamp":1616630400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T00:00:00Z","timestamp":1616630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Optim Lett"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11590-021-01717-0","type":"journal-article","created":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T23:40:09Z","timestamp":1616715609000},"page":"1081-1103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A resiliency analysis of information distribution policies over mobile ad hoc networks"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2045-0979","authenticated-orcid":false,"given":"Ningji","family":"Wei","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8258-7532","authenticated-orcid":false,"given":"Jose L.","family":"Walteros","sequence":"additional","affiliation":[]},{"given":"McKenzie R.","family":"Worden","sequence":"additional","affiliation":[]},{"given":"H\u00e9ctor J.","family":"Ortiz-Pe\u00f1a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,25]]},"reference":[{"issue":"11","key":"1717_CR1","doi-asserted-by":"publisher","first-page":"27783","DOI":"10.3390\/s151127783","volume":"15","author":"G Avellar","year":"2015","unstructured":"Avellar, G., Pereira, G., Pimenta, L., Iscold, P.: Multi-UAV routing for area coverage and remote sensing with minimum time. Sensors 15(11), 27783\u201327803 (2015)","journal-title":"Sensors"},{"key":"1717_CR2","volume-title":"Practical Bilevel Optimization: Algorithms and Applications","author":"JF Bard","year":"2013","unstructured":"Bard, J.F.: Practical Bilevel Optimization: Algorithms and Applications, vol. 30. Springer, Berlin (2013)"},{"key":"1717_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/0471656895","volume-title":"Mobile Ad Hoc Networking","author":"S Basagni","year":"2004","unstructured":"Basagni, S., Conti, M., Giordano, S., Stojmenovic, I.: Mobile Ad Hoc Networking. Wiley, London (2004)"},{"key":"1717_CR4","unstructured":"Bathrun, J., Manju, R., Darshana, R., Kathiravan, K.: Remote surveillance system over manet. In: 2009 First International Conference on Computational Intelligence, Communication Systems and Networks, pp. 476\u2013481. IEEE (2009)"},{"issue":"3","key":"1717_CR5","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1016\/j.adhoc.2012.12.004","volume":"11","author":"I Bekmezci","year":"2013","unstructured":"Bekmezci, I., Sahingoz, O.K., Temel, \u015e.: Flying ad-hoc networks (FANETS): a survey. Ad Hoc Netw. 11(3), 1254\u20131270 (2013)","journal-title":"Ad Hoc Netw."},{"key":"1717_CR6","unstructured":"Bellingham, J.S.: Coordination and control of UAV fleets using mixed-integer linear programming. Ph.D. thesis, Massachusetts Institute of Technology (2002)"},{"issue":"4","key":"1717_CR7","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/TRO.2010.2048610","volume":"26","author":"E Besada-Portas","year":"2010","unstructured":"Besada-Portas, E., de la Torre, L., Jesus, M., de Andr\u00e9s-Toro, B.: Evolutionary trajectory planner for multiple UAVs in realistic scenarios. IEEE Trans. Rob. 26(4), 619\u2013634 (2010)","journal-title":"IEEE Trans. Rob."},{"key":"1717_CR8","unstructured":"Caselli, S., Reggiani, M., Rocchi, R.: Heuristic methods for randomized path planning in potential fields. In: Proceedings 2001 IEEE International Symposium on Computational Intelligence in Robotics and Automation (Cat. No. 01EX515), pp. 426\u2013431. IEEE (2001)"},{"issue":"23","key":"1717_CR9","doi-asserted-by":"publisher","first-page":"5463","DOI":"10.1088\/0031-9155\/50\/23\/003","volume":"50","author":"M Chu","year":"2005","unstructured":"Chu, M., Zinchenko, Y., Henderson, S.G., Sharpe, M.B.: Robust optimization for intensity modulated radiation therapy treatment planning under uncertainty. Phys. Med. Biol. 50(23), 5463 (2005)","journal-title":"Phys. Med. Biol."},{"issue":"1","key":"1717_CR10","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s10479-007-0176-2","volume":"153","author":"B Colson","year":"2007","unstructured":"Colson, B., Marcotte, P., Savard, G.: An overview of bilevel optimization. Ann. Oper. Res. 153(1), 235\u2013256 (2007)","journal-title":"Ann. Oper. Res."},{"issue":"2","key":"1717_CR11","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1287\/opre.46.2.184","volume":"46","author":"KJ Cormican","year":"1998","unstructured":"Cormican, K.J., Morton, D.P., Wood, R.K.: Stochastic network interdiction. Oper. Res. 46(2), 184\u2013197 (1998)","journal-title":"Oper. Res."},{"key":"1717_CR12","doi-asserted-by":"crossref","unstructured":"Costa, F.G., Ueyama, J., Braun, T., Pessin, G., Os\u00f3rio, F.S., Vargas, P.A.: The use of unmanned aerial vehicles and wireless sensor network in agricultural applications. In: 2012 IEEE International Geoscience and Remote Sensing Symposium, pp. 5045\u20135048. IEEE (2012)","DOI":"10.1109\/IGARSS.2012.6352477"},{"key":"1717_CR13","doi-asserted-by":"crossref","unstructured":"Enright, J.J., Frazzoli, E.: UAV routing in a stochastic, time-varying environment. In: IFAC Proceedings Volumes 38(1), 295\u2013300 (2005). 16th IFAC World Congress","DOI":"10.3182\/20050703-6-CZ-1902.02010"},{"issue":"1","key":"1717_CR14","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1109\/TAES.2013.6404117","volume":"49","author":"H Ergezer","year":"2013","unstructured":"Ergezer, H., Leblebicioglu, K.: Path planning for UAVs for maximum information collection. IEEE Trans. Aerosp. Electron. Syst. 49(1), 502\u2013520 (2013)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"3","key":"1717_CR15","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3905\/jpm.2007.684751","volume":"33","author":"FJ Fabozzi","year":"2007","unstructured":"Fabozzi, F.J., Kolm, P.N., Pachamanova, D.A., Focardi, S.M.: Robust portfolio optimization. J. Portfolio Manag. 33(3), 40\u201348 (2007)","journal-title":"J. Portfolio Manag."},{"issue":"5","key":"1717_CR16","first-page":"269","volume":"1","author":"A Gagandeep","year":"2012","unstructured":"Gagandeep, A., Kumar, P.: Analysis of different security attacks in manets on protocol stack a-review. Int. J. Eng. Adv. Technol. 1(5), 269\u201375 (2012)","journal-title":"Int. J. Eng. Adv. Technol."},{"key":"1717_CR17","doi-asserted-by":"crossref","unstructured":"Huertas, J.A., Duque, D., Segura-Dur\u00e1n, E., Akhavan-Tabatabaei, R., Medaglia, A.L.: Evacuation dynamics: a modeling and visualization framework. OR Spectrum pp. 1\u201331 (2019)","DOI":"10.1007\/s00291-019-00548-x"},{"issue":"8","key":"1717_CR18","doi-asserted-by":"publisher","first-page":"3490","DOI":"10.1109\/TVT.2012.2209690","volume":"61","author":"F Knorr","year":"2012","unstructured":"Knorr, F., Baselt, D., Schreckenberg, M., Mauve, M.: Reducing traffic jams via vanets. IEEE Trans. Veh. Technol. 61(8), 3490\u20133498 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1717_CR19","doi-asserted-by":"crossref","unstructured":"K\u00f6hler, E., Langkau, K., Skutella, M.: Time-expanded graphs for flow-dependent transit times. In: European symposium on algorithms, pp. 599\u2013611. Springer, Berlin (2002)","DOI":"10.1007\/3-540-45749-6_53"},{"issue":"10","key":"1717_CR20","doi-asserted-by":"publisher","first-page":"2831","DOI":"10.1109\/TAC.2015.2461851","volume":"60","author":"Y Li","year":"2015","unstructured":"Li, Y., Shi, L., Cheng, P., Chen, J., Quevedo, D.E.: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach. IEEE Trans. Autom. Control 60(10), 2831\u20132836 (2015)","journal-title":"IEEE Trans. Autom. Control"},{"key":"1717_CR21","doi-asserted-by":"crossref","unstructured":"Lien, Y.N., Jang, H.C., Tsai, T.C.: A manet based emergency communication and information system for catastrophic natural disasters. In: 2009 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 412\u2013417. IEEE (2009)","DOI":"10.1109\/ICDCSW.2009.72"},{"issue":"11","key":"1717_CR22","doi-asserted-by":"publisher","first-page":"2387","DOI":"10.1016\/S0165-1684(03)00191-9","volume":"83","author":"P Melchior","year":"2003","unstructured":"Melchior, P., Orsoni, B., Lavialle, O., Poty, A., Oustaloup, A.: Consideration of obstacle danger level in path planning using a* and fast-marching optimisation: comparative study. Signal Process. 83(11), 2387\u20132396 (2003)","journal-title":"Signal Process."},{"key":"1717_CR23","unstructured":"Nikolos, I.K., Brintaki, A.N.: Coordinated UAV path planning using differential evolution. In: Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005., pp. 549\u2013556. IEEE (2005)"},{"key":"1717_CR24","doi-asserted-by":"crossref","unstructured":"Nikolos, I.K., Valavanis, K.P., Tsourveloudis, N.C., Kostaras, A.N.: Evolutionary algorithm based offline\/online path planner for UAV navigation. IEEE Trans. Syst. Man Cybern. Part B (Cybernetics) 33(6), 898\u2013912 (2003)","DOI":"10.1109\/TSMCB.2002.804370"},{"key":"1717_CR25","unstructured":"Qu, Y.h., Pan, Q., Yan, J.G.: Flight path planning of UAV based on heuristically search and genetic algorithms. In: 31st Annual Conference of IEEE Industrial Electronics Society, 2005. IECON 2005., pp. 5\u2013pp. IEEE (2005)"},{"key":"1717_CR26","doi-asserted-by":"crossref","unstructured":"Raghunathan, A., Gopal, V., Subramanian, D., Biegler, L., Samad, T.: Dynamic optimization strategies for 3d conflict resolution of multiple aircraft. AIAA J. Guidance Control Dyn. (2003)","DOI":"10.2514\/6.2003-5675"},{"key":"1717_CR27","doi-asserted-by":"crossref","unstructured":"Richards, A., How, J.P.: Aircraft trajectory planning with collision avoidance using mixed integer linear programming. In: Proceedings of the 2002 American Control Conference (IEEE Cat. No. CH37301), vol.\u00a03, pp. 1936\u20131941. IEEE (2002)","DOI":"10.1109\/ACC.2002.1023918"},{"key":"1717_CR28","doi-asserted-by":"crossref","unstructured":"Sniedovich, M.: Wald\u2019s maximin model: a treasure in disguise! J. Risk Finance (2008)","DOI":"10.1108\/15265940810875603"},{"issue":"8","key":"1717_CR29","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1243\/09544054JEM480","volume":"220","author":"M Strano","year":"2006","unstructured":"Strano, M.: Optimization under uncertainty of sheet-metal-forming processes by the finite element method. Proc. Inst. Mech. Eng. Part B: J. Eng. Manuf. 220(8), 1305\u20131315 (2006)","journal-title":"Proc. Inst. Mech. Eng. Part B: J. Eng. Manuf."},{"issue":"4","key":"1717_CR30","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1214\/aoms\/1177732144","volume":"10","author":"A Wald","year":"1939","unstructured":"Wald, A.: Contributions to the theory of statistical estimation and testing hypotheses. Ann. Math. Stat. 10(4), 299\u2013326 (1939)","journal-title":"Ann. Math. Stat."},{"issue":"2","key":"1717_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0895-7177(93)90236-R","volume":"17","author":"RK Wood","year":"1993","unstructured":"Wood, R.K.: Deterministic network interdiction. Math. Comput. Model. 17(2), 1\u201318 (1993)","journal-title":"Math. Comput. Model."},{"key":"1717_CR32","doi-asserted-by":"crossref","unstructured":"Worden, M., Murray, C., Karwan, M.: Optimization of information collection and distribution across a limited communication network (2020)","DOI":"10.2139\/ssrn.3662392"},{"key":"1717_CR33","doi-asserted-by":"crossref","unstructured":"Wu, B., Chen, J., Wu, J., Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Wireless Network Security, pp. 103\u2013135. Springer, Berlin (2007)","DOI":"10.1007\/978-0-387-33112-6_5"},{"issue":"1\u20133","key":"1717_CR34","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/S0925-5273(99)00074-2","volume":"64","author":"CS Yu","year":"2000","unstructured":"Yu, C.S., Li, H.L.: A robust optimization model for stochastic logistic problems. Int. J. Prod. Econ. 64(1\u20133), 385\u2013397 (2000)","journal-title":"Int. J. Prod. Econ."},{"issue":"4","key":"1717_CR35","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","volume":"50","author":"S Zeadally","year":"2012","unstructured":"Zeadally, S., Hunt, R., Chen, Y.S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (vanets): status, results, and challenges. Telecommun. Syst. 50(4), 217\u2013241 (2012)","journal-title":"Telecommun. Syst."},{"issue":"5","key":"1717_CR36","first-page":"540","volume":"3","author":"T Zhuang","year":"2013","unstructured":"Zhuang, T., Baskett, P., Shang, Y.: Managing ad hoc networks of smartphones. Int. J. Inf. Educ. Technol. 3(5), 540 (2013)","journal-title":"Int. J. Inf. Educ. Technol."}],"container-title":["Optimization Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-021-01717-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11590-021-01717-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-021-01717-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T19:13:15Z","timestamp":1620414795000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11590-021-01717-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,25]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["1717"],"URL":"https:\/\/doi.org\/10.1007\/s11590-021-01717-0","relation":{},"ISSN":["1862-4472","1862-4480"],"issn-type":[{"type":"print","value":"1862-4472"},{"type":"electronic","value":"1862-4480"}],"subject":[],"published":{"date-parts":[[2021,3,25]]},"assertion":[{"value":"15 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}