[1] Zhang J, Zhuang J, Behlendorf B.Stochastic Shortest Path Network Interdiction with a Case Study of Arizona-Mexico Border[J]. Reliability Engineering & System Safety (S0951-8320), 2018, 179: 62-73. [2] Tsai J, Qian Y, Vorobeychik Y, et al.Tambe, Bayesian Security Games for Controlling Contagion[C]. 2013 International Conference on Social Computing. Alexandria, VA: IEEE Computer Society, 2013: 33-38. [3] Washburn A.Network Interdiction[M]. Washburn A. Two-Person Zero-Sum Games. Dordrecht: Springer, 2014: 123-141. [4] Sinha A, Fang F, An B, et al.Stackelberg Security Games: Looking Beyond a Decade of Success[C]. Twenty-Seventh International Joint Conference on Artificial Intelligence (IJCAI-18). Stockholm, Sweden: IJCAI, 2018: 5494-5501. [5] Pita J, Jain M, Marecki J, et al.Deployed ARMOR Protection: the Application of a Game Theoretic Model for Security at the Los Angeles International Airport[C]. 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006). Estoril, Portugal: DBLP, 2008. [6] Paruchuri P, Tambe M, Fernando Ordóez, et al.Security in Multiagent Systems by Policy Randomization[C]. 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006). Hakodate, Japan: ACM, 2006. [7] Jain M, Korzhyk D, Vanek O, et al.A Double Oracle Algorithm for Zero-sum Security Games on Graphs[C]. 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011). Taipei, Taiwan: International Foundation for Autonomous Agents and Multiagent Systems, 2011: 1-3. [8] Fudenberg D, Tirole J.Game Theory[J]. Economica (S0013-0427), 1992, 60(238): 841-846. [9] Washburn A, Wood K.Two-person Zero-sum Games for Network Interdiction[J]. Operations Research (S0030-364X), 1995, 43(2): 243-251. [10] Pan F, Morton D P.Minimizing a Stochastic Maximum-reliability Path[J]. Networks (S0028-3045), 2010, 52(3): 111-119. [11] Xiao K, Zhu C, Zhang W, et al.The Bi-objective Shortest Path Network Interdiction Problem: Subgraph Algorithm and Saturation Property[J]. IEEE Access (S2169-3536), 2020, 8: 1-1. [12] Liu C.Generalized Network Flow Model with Application to Power Supply-demand Problems[R]. United States: Operations Research Center, 1982. [13] Waxman B M.Routing of multipoint connections[J]. IEEE J. Select. Areas Commun (S0733-8716), 1988, 6(9): 1617-1622. [14] Gastner M T, Newman M E J. The Spatial Structure of Networks[J]. The European Physical Journal B-Condensed Matter and Complex Systems (S1434-6028), 2006, 49(2): 247-252. [15] Nguyen T H, Kar D, Brown M, et al.Towards a Science of Security Games[M]. Mathematical Sciences with Multidisciplinary Applications. Cham, Switzerland: Springer International Publishing, 2016. |