Network Inspection for Detecting Strategic Attacks Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.1287/opre.2021.2180
Ensuring the security of critical infrastructures is crucial for the society’s welfare and prosperity. However, these infrastructure networks are inherently vulnerable to both intentional and unintentional threats. In “Network Inspection for Detecting Strategic Attacks,” Dahan, Sela, and Amin study a strategic network inspection problem, formulated as a large-scale bilevel optimization problem, in which a utility seeks to determine an inspection strategy with minimum number of smart detectors that ensures a desirable expected detection performance under worst-case attacks. The authors derive structural properties of optimal solutions and show that the problem can be solved using Nash equilibria of a large-scale zero-sum game. Their analysis leads to a computationally tractable and operationally feasible solution approach with theoretical guarantees based on combinatorial objects that capture the nature of equilibrium inspection and attack strategies. Their computational study indicates that utilities can achieve a high level of protection in large-scale networks by strategically positioning a small number of detectors.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- https://doi.org/10.1287/opre.2021.2180
- OA Status
- green
- Cited By
- 3
- References
- 65
- Related Works
- 20
- OpenAlex ID
- https://openalex.org/W2798830613
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2798830613Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1287/opre.2021.2180Digital Object Identifier
- Title
-
Network Inspection for Detecting Strategic AttacksWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-01-28Full publication date if available
- Authors
-
Mathieu Dahan, Lina Sela, Saurabh AminList of authors in order
- Landing page
-
https://doi.org/10.1287/opre.2021.2180Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/1705.00349Direct OA link when available
- Concepts
-
Scalability, Leverage (statistics), Benchmark (surveying), Computer science, Detector, Set (abstract data type), Set cover problem, Mathematical optimization, Generalization, Network security, Column generation, Set packing, Construct (python library), Mathematics, Artificial intelligence, Computer security, Computer network, Telecommunications, Geography, Mathematical analysis, Programming language, Geodesy, DatabaseTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
3Total citation count in OpenAlex
- Citations by year (recent)
-
2021: 1, 2019: 1, 2017: 1Per-year citation counts (last 5 years)
- References (count)
-
65Number of works referenced by this work
- Related works (count)
-
20Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2798830613 |
|---|---|
| doi | https://doi.org/10.1287/opre.2021.2180 |
| ids.doi | https://doi.org/10.48550/arxiv.1705.00349 |
| ids.mag | 2798830613 |
| ids.openalex | https://openalex.org/W2798830613 |
| fwci | 0.0 |
| type | preprint |
| title | Network Inspection for Detecting Strategic Attacks |
| biblio.issue | 2 |
| biblio.volume | 70 |
| biblio.last_page | 1024 |
| biblio.first_page | 1008 |
| topics[0].id | https://openalex.org/T11220 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9926000237464905 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2205 |
| topics[0].subfield.display_name | Civil and Structural Engineering |
| topics[0].display_name | Water Systems and Optimization |
| topics[1].id | https://openalex.org/T11807 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9897000193595886 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2205 |
| topics[1].subfield.display_name | Civil and Structural Engineering |
| topics[1].display_name | Infrastructure Resilience and Vulnerability Analysis |
| topics[2].id | https://openalex.org/T10969 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9807999730110168 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2212 |
| topics[2].subfield.display_name | Ocean Engineering |
| topics[2].display_name | Water resources management and optimization |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C48044578 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6875439286231995 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q727490 |
| concepts[0].display_name | Scalability |
| concepts[1].id | https://openalex.org/C153083717 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6702724099159241 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q6535263 |
| concepts[1].display_name | Leverage (statistics) |
| concepts[2].id | https://openalex.org/C185798385 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6158137321472168 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1161707 |
| concepts[2].display_name | Benchmark (surveying) |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.6046788692474365 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C94915269 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5657235383987427 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1834857 |
| concepts[4].display_name | Detector |
| concepts[5].id | https://openalex.org/C177264268 |
| concepts[5].level | 2 |
| concepts[5].score | 0.49562299251556396 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1514741 |
| concepts[5].display_name | Set (abstract data type) |
| concepts[6].id | https://openalex.org/C100808899 |
| concepts[6].level | 3 |
| concepts[6].score | 0.48568734526634216 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1192100 |
| concepts[6].display_name | Set cover problem |
| concepts[7].id | https://openalex.org/C126255220 |
| concepts[7].level | 1 |
| concepts[7].score | 0.4760165810585022 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q141495 |
| concepts[7].display_name | Mathematical optimization |
| concepts[8].id | https://openalex.org/C177148314 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4702044129371643 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q170084 |
| concepts[8].display_name | Generalization |
| concepts[9].id | https://openalex.org/C182590292 |
| concepts[9].level | 2 |
| concepts[9].score | 0.4508965015411377 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[9].display_name | Network security |
| concepts[10].id | https://openalex.org/C168956720 |
| concepts[10].level | 2 |
| concepts[10].score | 0.44018301367759705 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q3123181 |
| concepts[10].display_name | Column generation |
| concepts[11].id | https://openalex.org/C134516590 |
| concepts[11].level | 3 |
| concepts[11].score | 0.4131214916706085 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q475603 |
| concepts[11].display_name | Set packing |
| concepts[12].id | https://openalex.org/C2780801425 |
| concepts[12].level | 2 |
| concepts[12].score | 0.4117348790168762 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q5164392 |
| concepts[12].display_name | Construct (python library) |
| concepts[13].id | https://openalex.org/C33923547 |
| concepts[13].level | 0 |
| concepts[13].score | 0.19424867630004883 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[13].display_name | Mathematics |
| concepts[14].id | https://openalex.org/C154945302 |
| concepts[14].level | 1 |
| concepts[14].score | 0.18471738696098328 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[14].display_name | Artificial intelligence |
| concepts[15].id | https://openalex.org/C38652104 |
| concepts[15].level | 1 |
| concepts[15].score | 0.10528150200843811 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[15].display_name | Computer security |
| concepts[16].id | https://openalex.org/C31258907 |
| concepts[16].level | 1 |
| concepts[16].score | 0.09750750660896301 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[16].display_name | Computer network |
| concepts[17].id | https://openalex.org/C76155785 |
| concepts[17].level | 1 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[17].display_name | Telecommunications |
| concepts[18].id | https://openalex.org/C205649164 |
| concepts[18].level | 0 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q1071 |
| concepts[18].display_name | Geography |
| concepts[19].id | https://openalex.org/C134306372 |
| concepts[19].level | 1 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[19].display_name | Mathematical analysis |
| concepts[20].id | https://openalex.org/C199360897 |
| concepts[20].level | 1 |
| concepts[20].score | 0.0 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[20].display_name | Programming language |
| concepts[21].id | https://openalex.org/C13280743 |
| concepts[21].level | 1 |
| concepts[21].score | 0.0 |
| concepts[21].wikidata | https://www.wikidata.org/wiki/Q131089 |
| concepts[21].display_name | Geodesy |
| concepts[22].id | https://openalex.org/C77088390 |
| concepts[22].level | 1 |
| concepts[22].score | 0.0 |
| concepts[22].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[22].display_name | Database |
| keywords[0].id | https://openalex.org/keywords/scalability |
| keywords[0].score | 0.6875439286231995 |
| keywords[0].display_name | Scalability |
| keywords[1].id | https://openalex.org/keywords/leverage |
| keywords[1].score | 0.6702724099159241 |
| keywords[1].display_name | Leverage (statistics) |
| keywords[2].id | https://openalex.org/keywords/benchmark |
| keywords[2].score | 0.6158137321472168 |
| keywords[2].display_name | Benchmark (surveying) |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.6046788692474365 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/detector |
| keywords[4].score | 0.5657235383987427 |
| keywords[4].display_name | Detector |
| keywords[5].id | https://openalex.org/keywords/set |
| keywords[5].score | 0.49562299251556396 |
| keywords[5].display_name | Set (abstract data type) |
| keywords[6].id | https://openalex.org/keywords/set-cover-problem |
| keywords[6].score | 0.48568734526634216 |
| keywords[6].display_name | Set cover problem |
| keywords[7].id | https://openalex.org/keywords/mathematical-optimization |
| keywords[7].score | 0.4760165810585022 |
| keywords[7].display_name | Mathematical optimization |
| keywords[8].id | https://openalex.org/keywords/generalization |
| keywords[8].score | 0.4702044129371643 |
| keywords[8].display_name | Generalization |
| keywords[9].id | https://openalex.org/keywords/network-security |
| keywords[9].score | 0.4508965015411377 |
| keywords[9].display_name | Network security |
| keywords[10].id | https://openalex.org/keywords/column-generation |
| keywords[10].score | 0.44018301367759705 |
| keywords[10].display_name | Column generation |
| keywords[11].id | https://openalex.org/keywords/set-packing |
| keywords[11].score | 0.4131214916706085 |
| keywords[11].display_name | Set packing |
| keywords[12].id | https://openalex.org/keywords/construct |
| keywords[12].score | 0.4117348790168762 |
| keywords[12].display_name | Construct (python library) |
| keywords[13].id | https://openalex.org/keywords/mathematics |
| keywords[13].score | 0.19424867630004883 |
| keywords[13].display_name | Mathematics |
| keywords[14].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[14].score | 0.18471738696098328 |
| keywords[14].display_name | Artificial intelligence |
| keywords[15].id | https://openalex.org/keywords/computer-security |
| keywords[15].score | 0.10528150200843811 |
| keywords[15].display_name | Computer security |
| keywords[16].id | https://openalex.org/keywords/computer-network |
| keywords[16].score | 0.09750750660896301 |
| keywords[16].display_name | Computer network |
| language | en |
| locations[0].id | doi:10.1287/opre.2021.2180 |
| locations[0].is_oa | False |
| locations[0].source.id | https://openalex.org/S125775545 |
| locations[0].source.issn | 0030-364X, 1526-5463 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 0030-364X |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Operations Research |
| locations[0].source.host_organization | https://openalex.org/P4310315699 |
| locations[0].source.host_organization_name | Institute for Operations Research and the Management Sciences |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310315699 |
| locations[0].source.host_organization_lineage_names | Institute for Operations Research and the Management Sciences |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Operations Research |
| locations[0].landing_page_url | https://doi.org/10.1287/opre.2021.2180 |
| locations[1].id | pmh:oai:arXiv.org:1705.00349 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | https://arxiv.org/pdf/1705.00349 |
| locations[1].version | submittedVersion |
| locations[1].raw_type | text |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | http://arxiv.org/abs/1705.00349 |
| locations[2].id | mag:2798830613 |
| locations[2].is_oa | True |
| locations[2].source.id | https://openalex.org/S4306400194 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | True |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | arXiv (Cornell University) |
| locations[2].source.host_organization | https://openalex.org/I205783295 |
| locations[2].source.host_organization_name | Cornell University |
| locations[2].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[2].license | |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | |
| locations[2].license_id | |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | arXiv (Cornell University) |
| locations[2].landing_page_url | https://arxiv.org/pdf/1705.00349 |
| locations[3].id | pmh:oai:dspace.mit.edu:1721.1/148394 |
| locations[3].is_oa | True |
| locations[3].source.id | https://openalex.org/S4306400425 |
| locations[3].source.issn | |
| locations[3].source.type | repository |
| locations[3].source.is_oa | False |
| locations[3].source.issn_l | |
| locations[3].source.is_core | False |
| locations[3].source.is_in_doaj | False |
| locations[3].source.display_name | DSpace@MIT (Massachusetts Institute of Technology) |
| locations[3].source.host_organization | https://openalex.org/I63966007 |
| locations[3].source.host_organization_name | Massachusetts Institute of Technology |
| locations[3].source.host_organization_lineage | https://openalex.org/I63966007 |
| locations[3].license | cc-by-nc-sa |
| locations[3].pdf_url | |
| locations[3].version | submittedVersion |
| locations[3].raw_type | http://purl.org/eprint/type/JournalArticle |
| locations[3].license_id | https://openalex.org/licenses/cc-by-nc-sa |
| locations[3].is_accepted | False |
| locations[3].is_published | False |
| locations[3].raw_source_name | arXiv |
| locations[3].landing_page_url | https://hdl.handle.net/1721.1/148394 |
| locations[4].id | doi:10.48550/arxiv.1705.00349 |
| locations[4].is_oa | True |
| locations[4].source.id | https://openalex.org/S4306400194 |
| locations[4].source.issn | |
| locations[4].source.type | repository |
| locations[4].source.is_oa | True |
| locations[4].source.issn_l | |
| locations[4].source.is_core | False |
| locations[4].source.is_in_doaj | False |
| locations[4].source.display_name | arXiv (Cornell University) |
| locations[4].source.host_organization | https://openalex.org/I205783295 |
| locations[4].source.host_organization_name | Cornell University |
| locations[4].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[4].license | |
| locations[4].pdf_url | |
| locations[4].version | |
| locations[4].raw_type | article-journal |
| locations[4].license_id | |
| locations[4].is_accepted | False |
| locations[4].is_published | |
| locations[4].raw_source_name | |
| locations[4].landing_page_url | https://doi.org/10.48550/arxiv.1705.00349 |
| indexed_in | arxiv, crossref, datacite |
| authorships[0].author.id | https://openalex.org/A5067459518 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-0973-6973 |
| authorships[0].author.display_name | Mathieu Dahan |
| authorships[0].countries | US |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I130701444 |
| authorships[0].affiliations[0].raw_affiliation_string | #N#‡#N#Georgia Institute of Technology#N# |
| authorships[0].institutions[0].id | https://openalex.org/I130701444 |
| authorships[0].institutions[0].ror | https://ror.org/01zkghx44 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I130701444 |
| authorships[0].institutions[0].country_code | US |
| authorships[0].institutions[0].display_name | Georgia Institute of Technology |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Mathieu Dahan |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | #N#‡#N#Georgia Institute of Technology#N# |
| authorships[1].author.id | https://openalex.org/A5064849371 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-5834-8451 |
| authorships[1].author.display_name | Lina Sela |
| authorships[1].countries | US |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I86519309 |
| authorships[1].affiliations[0].raw_affiliation_string | University of Texas at Austin |
| authorships[1].institutions[0].id | https://openalex.org/I86519309 |
| authorships[1].institutions[0].ror | https://ror.org/00hj54h04 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I86519309 |
| authorships[1].institutions[0].country_code | US |
| authorships[1].institutions[0].display_name | The University of Texas at Austin |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Lina Sela |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | University of Texas at Austin |
| authorships[2].author.id | https://openalex.org/A5112133200 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-1554-015X |
| authorships[2].author.display_name | Saurabh Amin |
| authorships[2].countries | US |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I63966007 |
| authorships[2].affiliations[0].raw_affiliation_string | Massachusetts Institute Of Technology#TAB# |
| authorships[2].institutions[0].id | https://openalex.org/I63966007 |
| authorships[2].institutions[0].ror | https://ror.org/042nb2s44 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I63966007 |
| authorships[2].institutions[0].country_code | US |
| authorships[2].institutions[0].display_name | Massachusetts Institute of Technology |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Saurabh Amin |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Massachusetts Institute Of Technology#TAB# |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/1705.00349 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Network Inspection for Detecting Strategic Attacks |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11220 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9926000237464905 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2205 |
| primary_topic.subfield.display_name | Civil and Structural Engineering |
| primary_topic.display_name | Water Systems and Optimization |
| related_works | https://openalex.org/W2035842218, https://openalex.org/W1664863697, https://openalex.org/W2887097609, https://openalex.org/W3128303728, https://openalex.org/W3120102739, https://openalex.org/W2745667342, https://openalex.org/W2784007778, https://openalex.org/W2808033007, https://openalex.org/W2949429791, https://openalex.org/W2348110992, https://openalex.org/W2754603669, https://openalex.org/W2253167492, https://openalex.org/W2963400974, https://openalex.org/W2810942778, https://openalex.org/W2967893579, https://openalex.org/W3110154020, https://openalex.org/W3201195753, https://openalex.org/W2277285615, https://openalex.org/W3122283508, https://openalex.org/W3138798898 |
| cited_by_count | 3 |
| counts_by_year[0].year | 2021 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2019 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2017 |
| counts_by_year[2].cited_by_count | 1 |
| locations_count | 5 |
| best_oa_location.id | pmh:oai:arXiv.org:1705.00349 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/1705.00349 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/1705.00349 |
| primary_location.id | doi:10.1287/opre.2021.2180 |
| primary_location.is_oa | False |
| primary_location.source.id | https://openalex.org/S125775545 |
| primary_location.source.issn | 0030-364X, 1526-5463 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 0030-364X |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Operations Research |
| primary_location.source.host_organization | https://openalex.org/P4310315699 |
| primary_location.source.host_organization_name | Institute for Operations Research and the Management Sciences |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310315699 |
| primary_location.source.host_organization_lineage_names | Institute for Operations Research and the Management Sciences |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Operations Research |
| primary_location.landing_page_url | https://doi.org/10.1287/opre.2021.2180 |
| publication_date | 2022-01-28 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W1934657228, https://openalex.org/W2736734025, https://openalex.org/W111309269, https://openalex.org/W2914141035, https://openalex.org/W1966962864, https://openalex.org/W2073269881, https://openalex.org/W1738845896, https://openalex.org/W1965775355, https://openalex.org/W2161055501, https://openalex.org/W2165512347, https://openalex.org/W2149259182, https://openalex.org/W2157054705, https://openalex.org/W2117972428, https://openalex.org/W2105560970, https://openalex.org/W2047408737, https://openalex.org/W1988685189, https://openalex.org/W617539859, https://openalex.org/W3124866767, https://openalex.org/W2071534363, https://openalex.org/W2013228821, https://openalex.org/W2079104779, https://openalex.org/W3004344782, https://openalex.org/W2011145472, https://openalex.org/W1986039199, https://openalex.org/W2051401044, https://openalex.org/W2158018794, https://openalex.org/W2792796684, https://openalex.org/W1835792195, https://openalex.org/W2135964850, https://openalex.org/W2156212817, https://openalex.org/W2039658938, https://openalex.org/W2151056235, https://openalex.org/W2791886476, https://openalex.org/W2249566516, https://openalex.org/W2119404840, https://openalex.org/W2000050888, https://openalex.org/W2283568894, https://openalex.org/W2933192800, https://openalex.org/W2047736339, https://openalex.org/W2009784329, https://openalex.org/W2067050450, https://openalex.org/W1519207151, https://openalex.org/W2104125800, https://openalex.org/W2030506634, https://openalex.org/W2148534455, https://openalex.org/W2493312408, https://openalex.org/W2802966486, https://openalex.org/W3100003759, https://openalex.org/W2626946166, https://openalex.org/W1968669498, https://openalex.org/W2604420937, https://openalex.org/W2611804663, https://openalex.org/W2109209963, https://openalex.org/W2052306804, https://openalex.org/W217831350, https://openalex.org/W2072064573, https://openalex.org/W2131824593, https://openalex.org/W3046916097, https://openalex.org/W2277615250, https://openalex.org/W2588295707, https://openalex.org/W2103446323, https://openalex.org/W2131967794, https://openalex.org/W2597406875, https://openalex.org/W2640631472, https://openalex.org/W2007572995 |
| referenced_works_count | 65 |
| abstract_inverted_index.a | 39, 46, 53, 69, 97, 105, 138, 149 |
| abstract_inverted_index.In | 27 |
| abstract_inverted_index.an | 58 |
| abstract_inverted_index.as | 45 |
| abstract_inverted_index.be | 91 |
| abstract_inverted_index.by | 146 |
| abstract_inverted_index.in | 51, 143 |
| abstract_inverted_index.is | 6 |
| abstract_inverted_index.of | 3, 64, 82, 96, 124, 141, 152 |
| abstract_inverted_index.on | 117 |
| abstract_inverted_index.to | 21, 56, 104 |
| abstract_inverted_index.The | 77 |
| abstract_inverted_index.and | 12, 24, 36, 85, 108, 127 |
| abstract_inverted_index.are | 18 |
| abstract_inverted_index.can | 90, 136 |
| abstract_inverted_index.for | 8, 30 |
| abstract_inverted_index.the | 1, 9, 88, 122 |
| abstract_inverted_index.Amin | 37 |
| abstract_inverted_index.Nash | 94 |
| abstract_inverted_index.both | 22 |
| abstract_inverted_index.high | 139 |
| abstract_inverted_index.show | 86 |
| abstract_inverted_index.that | 67, 87, 120, 134 |
| abstract_inverted_index.with | 61, 113 |
| abstract_inverted_index.Sela, | 35 |
| abstract_inverted_index.Their | 101, 130 |
| abstract_inverted_index.based | 116 |
| abstract_inverted_index.game. | 100 |
| abstract_inverted_index.leads | 103 |
| abstract_inverted_index.level | 140 |
| abstract_inverted_index.seeks | 55 |
| abstract_inverted_index.small | 150 |
| abstract_inverted_index.smart | 65 |
| abstract_inverted_index.study | 38, 132 |
| abstract_inverted_index.these | 15 |
| abstract_inverted_index.under | 74 |
| abstract_inverted_index.using | 93 |
| abstract_inverted_index.which | 52 |
| abstract_inverted_index.Dahan, | 34 |
| abstract_inverted_index.attack | 128 |
| abstract_inverted_index.derive | 79 |
| abstract_inverted_index.nature | 123 |
| abstract_inverted_index.number | 63, 151 |
| abstract_inverted_index.solved | 92 |
| abstract_inverted_index.achieve | 137 |
| abstract_inverted_index.authors | 78 |
| abstract_inverted_index.bilevel | 48 |
| abstract_inverted_index.capture | 121 |
| abstract_inverted_index.crucial | 7 |
| abstract_inverted_index.ensures | 68 |
| abstract_inverted_index.minimum | 62 |
| abstract_inverted_index.network | 41 |
| abstract_inverted_index.objects | 119 |
| abstract_inverted_index.optimal | 83 |
| abstract_inverted_index.problem | 89 |
| abstract_inverted_index.utility | 54 |
| abstract_inverted_index.welfare | 11 |
| abstract_inverted_index.Ensuring | 0 |
| abstract_inverted_index.However, | 14 |
| abstract_inverted_index.analysis | 102 |
| abstract_inverted_index.approach | 112 |
| abstract_inverted_index.attacks. | 76 |
| abstract_inverted_index.critical | 4 |
| abstract_inverted_index.expected | 71 |
| abstract_inverted_index.feasible | 110 |
| abstract_inverted_index.networks | 17, 145 |
| abstract_inverted_index.problem, | 43, 50 |
| abstract_inverted_index.security | 2 |
| abstract_inverted_index.solution | 111 |
| abstract_inverted_index.strategy | 60 |
| abstract_inverted_index.threats. | 26 |
| abstract_inverted_index.zero-sum | 99 |
| abstract_inverted_index.Detecting | 31 |
| abstract_inverted_index.Strategic | 32 |
| abstract_inverted_index.desirable | 70 |
| abstract_inverted_index.detection | 72 |
| abstract_inverted_index.detectors | 66 |
| abstract_inverted_index.determine | 57 |
| abstract_inverted_index.indicates | 133 |
| abstract_inverted_index.solutions | 84 |
| abstract_inverted_index.strategic | 40 |
| abstract_inverted_index.tractable | 107 |
| abstract_inverted_index.utilities | 135 |
| abstract_inverted_index.Inspection | 29 |
| abstract_inverted_index.detectors. | 153 |
| abstract_inverted_index.equilibria | 95 |
| abstract_inverted_index.formulated | 44 |
| abstract_inverted_index.guarantees | 115 |
| abstract_inverted_index.inherently | 19 |
| abstract_inverted_index.inspection | 42, 59, 126 |
| abstract_inverted_index.properties | 81 |
| abstract_inverted_index.protection | 142 |
| abstract_inverted_index.structural | 80 |
| abstract_inverted_index.vulnerable | 20 |
| abstract_inverted_index.worst-case | 75 |
| abstract_inverted_index.“Network | 28 |
| abstract_inverted_index.Attacks,” | 33 |
| abstract_inverted_index.equilibrium | 125 |
| abstract_inverted_index.intentional | 23 |
| abstract_inverted_index.large-scale | 47, 98, 144 |
| abstract_inverted_index.performance | 73 |
| abstract_inverted_index.positioning | 148 |
| abstract_inverted_index.prosperity. | 13 |
| abstract_inverted_index.society’s | 10 |
| abstract_inverted_index.strategies. | 129 |
| abstract_inverted_index.theoretical | 114 |
| abstract_inverted_index.optimization | 49 |
| abstract_inverted_index.combinatorial | 118 |
| abstract_inverted_index.computational | 131 |
| abstract_inverted_index.operationally | 109 |
| abstract_inverted_index.strategically | 147 |
| abstract_inverted_index.unintentional | 25 |
| abstract_inverted_index.infrastructure | 16 |
| abstract_inverted_index.computationally | 106 |
| abstract_inverted_index.infrastructures | 5 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.00086462 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |