An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression
Author
Abstract
Suggested Citation
DOI: 10.1002/nav.21792
Download full text from publisher
References listed on IDEAS
- Max A. Moritz & Enric Batllori & Ross A. Bradstock & A. Malcolm Gill & John Handmer & Paul F. Hessburg & Justin Leonard & Sarah McCaffrey & Dennis C. Odion & Tania Schoennagel & Alexandra D. Syphard, 2014. "Learning to coexist with wildfire," Nature, Nature, vol. 515(7525), pages 58-66, November.
- P. M. Ghare & D. C. Montgomery & W. C. Turner, 1971. "Optimal interdiction policy for a flow network," Naval Research Logistics Quarterly, John Wiley & Sons, vol. 18(1), pages 37-45, March.
- Barry Charles Ezell, 2007. "Infrastructure Vulnerability Assessment Model (I‐VAM)," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 571-583, June.
- Jessica R. Haas & David E. Calkin & Matthew P. Thompson, 2015. "Wildfire Risk Transmission in the Colorado Front Range, USA," Risk Analysis, John Wiley & Sons, vol. 35(2), pages 226-240, February.
- Nedialko B. Dimitrov & David P. Morton, 2013. "Interdiction Models and Applications," International Series in Operations Research & Management Science, in: Jeffrey W. Herrmann (ed.), Handbook of Operations Research for Homeland Security, edition 127, chapter 0, pages 73-103, Springer.
- Rashidi, Eghbal & Medal, Hugh & Gordon, Jason & Grala, Robert & Varner, Morgan, 2017. "A maximal covering location-based model for analyzing the vulnerability of landscapes to wildfires: Assessing the worst-case scenario," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1095-1105.
- Aaron B. Hoskins & Hugh R. Medal & Eghbal Rashidi, 2017. "Satellite constellation design for forest fire monitoring via a stochastic programing approach," Naval Research Logistics (NRL), John Wiley & Sons, vol. 64(8), pages 642-661, December.
- Nada Petrovic & David L Alderson & Jean M Carlson, 2012. "Dynamic Resource Allocation in Disaster Response: Tradeoffs in Wildfire Suppression," PLOS ONE, Public Library of Science, vol. 7(4), pages 1-9, April.
- Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Karwowski, Jan & Mańdziuk, Jacek, 2019. "A Monte Carlo Tree Search approach to finding efficient patrolling schemes on graphs," European Journal of Operational Research, Elsevier, vol. 277(1), pages 255-268.
- Avci, Mualla Gonca & Avci, Mustafa & Battarra, Maria & Erdoğan, Güneş, 2024. "The wildfire suppression problem with multiple types of resources," European Journal of Operational Research, Elsevier, vol. 316(2), pages 488-502.
- Bhuiyan, Tanveer Hossain & Moseley, Maxwell C. & Medal, Hugh R. & Rashidi, Eghbal & Grala, Robert K., 2019. "A stochastic programming model with endogenous uncertainty for incentivizing fuel reduction treatment under uncertain landowner behavior," European Journal of Operational Research, Elsevier, vol. 277(2), pages 699-718.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- David L. Alderson & Gerald G. Brown & W. Matthew Carlyle & R. Kevin Wood, 2018. "Assessing and Improving the Operational Resilience of a Large Highway Infrastructure System to Worst-Case Losses," Transportation Science, INFORMS, vol. 52(4), pages 1012-1034, August.
- Yi‐Ping Fang & Giovanni Sansavini & Enrico Zio, 2019. "An Optimization‐Based Framework for the Identification of Vulnerabilities in Electric Power Grids Exposed to Natural Hazards," Risk Analysis, John Wiley & Sons, vol. 39(9), pages 1949-1969, September.
- Wei, Ningji & Walteros, Jose L., 2022. "Integer programming methods for solving binary interdiction games," European Journal of Operational Research, Elsevier, vol. 302(2), pages 456-469.
- Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
- Ketkov, Sergey S. & Prokopyev, Oleg A., 2020. "On greedy and strategic evaders in sequential interdiction settings with incomplete information," Omega, Elsevier, vol. 92(C).
- Smith, J. Cole & Song, Yongjia, 2020. "A survey of network interdiction models and algorithms," European Journal of Operational Research, Elsevier, vol. 283(3), pages 797-811.
- Alan A. Ager & Palaiologos Palaiologou & Cody R. Evers & Michelle A. Day & Ana M. G. Barros, 2018. "Assessing Transboundary Wildfire Exposure in the Southwestern United States," Risk Analysis, John Wiley & Sons, vol. 38(10), pages 2105-2127, October.
- Claudio Contardo & Jorge A. Sefair, 2022. "A Progressive Approximation Approach for the Exact Solution of Sparse Large-Scale Binary Interdiction Games," INFORMS Journal on Computing, INFORMS, vol. 34(2), pages 890-908, March.
- Karin L. Riley & Matthew P. Thompson & Joe H. Scott & Julie W. Gilbertson-Day, 2018. "A Model-Based Framework to Evaluate Alternative Wildfire Suppression Strategies," Resources, MDPI, vol. 7(1), pages 1-26, January.
- Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
- Andrea Baggio & Margarida Carvalho & Andrea Lodi & Andrea Tramontani, 2021. "Multilevel Approaches for the Critical Node Problem," Operations Research, INFORMS, vol. 69(2), pages 486-508, March.
- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
- Chan Y. Han & Brian J. Lunday & Matthew J. Robbins, 2016. "A Game Theoretic Model for the Optimal Location of Integrated Air Defense System Missile Batteries," INFORMS Journal on Computing, INFORMS, vol. 28(3), pages 405-416, August.
- David Simchi-Levi & Nikolaos Trichakis & Peter Yun Zhang, 2019. "Designing Response Supply Chain Against Bioattacks," Operations Research, INFORMS, vol. 67(5), pages 1246-1268, September.
- Alexander Shiroky & Andrey Kalashnikov, 2021. "Mathematical Problems of Managing the Risks of Complex Systems under Targeted Attacks with Known Structures," Mathematics, MDPI, vol. 9(19), pages 1-11, October.
- Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017.
"Optimal design and defense of networks under link attacks,"
Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2015. "Optimal design and defense of networks under link attacks," Working Papers 1519, Groupe d'Analyse et de Théorie Economique Lyon St-Étienne (GATE Lyon St-Étienne), Université de Lyon.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2017. "Optimal Design and Defense of Networks Under Link Attacks," Post-Print hal-01384998, HAL.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2016. "Optimal design and defense of networks under link attacks," Post-Print halshs-01411520, HAL.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2015. "Optimal design and defense of networks under link attacks," Working Papers halshs-01176928, HAL.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Górriz-Mifsud, Elena & Burns, Matthew & Marini Govigli, Valentino, 2019. "Civil society engaged in wildfires: Mediterranean forest fire volunteer groupings," Forest Policy and Economics, Elsevier, vol. 102(C), pages 119-129.
- Laan, Corine M. & van der Mijden, Tom & Barros, Ana Isabel & Boucherie, Richard J. & Monsuur, Herman, 2017. "An interdiction game on a queueing network with multiple intruders," European Journal of Operational Research, Elsevier, vol. 260(3), pages 1069-1080.
- Foad Mahdavi Pajouh, 2020. "Minimum cost edge blocker clique problem," Annals of Operations Research, Springer, vol. 294(1), pages 345-376, November.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:navres:v:65:y:2018:i:2:p:120-134. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1002/(ISSN)1520-6750 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.