A defender-attacker-defender approach to the optimal fortification of a rail intermodal terminal network

被引:15
|
作者
Sarhadi H. [1 ]
Tulett D.M. [1 ]
Verma M. [2 ]
机构
[1] Memorial University, St John’s
[2] DeGroote School of Business, McMaster University, Hamilton
基金
加拿大自然科学与工程研究理事会;
关键词
Fortification; Heuristic; Intentional attacks; Intermodal transportation; Leader-follower; Mixed-integer programming;
D O I
10.1007/s12198-014-0152-4
中图分类号
学科分类号
摘要
A crucial issue in modern supply chains is to guarantee continuity and efficiency in the event of natural and man-made threats. This task is challenging, especially given the finite resources and the complexity of the transportation infrastructure. We make use of a defender-attacker-defender framework to determine the optimal strategy for fortifying a given number of rail-truck intermodal terminals, such that the losses (or inefficiencies) resulting from an intentional attack is minimized. The proposed tri-level optimization model, used to study a realistic size case study from published literature, is solved using three distinct solution techniques. Finally, we present some managerial insights and directions of future research. © 2014, Springer Science+Business Media New York.
引用
收藏
页码:17 / 32
页数:15
相关论文
共 41 条
  • [1] Optimal power grid protection through a defender-attacker-defender model
    Yuan, Wei
    Zhao, Long
    Zeng, Bo
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2014, 121 : 83 - 89
  • [2] A decomposition approach for solving tri-level defender-attacker-defender problems
    Ghorbani-Renani, Nafiseh
    Gonzalez, Andres D.
    Barker, Kash
    COMPUTERS & INDUSTRIAL ENGINEERING, 2021, 153
  • [3] A decomposition approach for solving tri-level defender-attacker-defender problems
    Ghorbani-Renani, Nafiseh
    González, Andrés D.
    Barker, Kash
    Computers and Industrial Engineering, 2021, 153
  • [4] Power system resilience through defender-attacker-defender models with uncertainty: an overview
    Oster, Matthew
    Chatterjee, Samrat
    Pan, Feng
    Bakker, Craig
    Bhattacharya, Arnab
    Perkins, Casey
    2020 RESILIENCE WEEK (RWS), 2020, : 11 - 17
  • [5] Solving the Defender-Attacker-Defender Constrained Shortest Path Problem with Lagrangian Relaxation
    Lazzaro, Gary
    Carlyle, W. Matthew
    MILITARY OPERATIONS RESEARCH, 2023, 28 (01) : 73 - 95
  • [6] A Novel Defender-Attacker-Defender Model for Resilient Distributed Generator Planning with Network Reconfiguration and Demand Response
    Ji W.
    Tu T.
    Ma N.
    Energy Engineering: Journal of the Association of Energy Engineering, 2024, 121 (05): : 1223 - 1243
  • [7] An Improved Defender-Attacker-Defender Model for Transmission Line Defense Considering Offensive Resource Uncertainties
    Xiang, Yingmeng
    Wang, Lingfeng
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (03) : 2534 - 2546
  • [8] Cost-effective power grid protection through defender-attacker-defender model with corrective network topology control
    Yuan, Wei
    Zeng, Bo
    ENERGY SYSTEMS-OPTIMIZATION MODELING SIMULATION AND ECONOMIC ASPECTS, 2020, 11 (04): : 811 - 837
  • [9] DGM approach to network attacker and defender strategies
    Kayode, Alese Boniface
    Babatunde, Iwasokun Gabriel
    Israel, Haruna Danjuma
    2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, 2013, : 313 - 320
  • [10] DGM Approach to Network Attacker and Defender Strategies
    Alese, Boniface Kayode
    Babatunde, Iwasokun Gabriel
    Israel, Haruna Danjuma
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 313 - 320