Mathieu Dahan
YOU?
Author Swipe
View article: Inspection Game with Location-Specific Detection Capabilities
Inspection Game with Location-Specific Detection Capabilities Open
View article: Inspection Game With Imperfect Detection Technology
Inspection Game With Imperfect Detection Technology Open
In this article, we investigate a generalized two‐player inspection game between an attacker and a defender who allocates multiple resources across a critical system. Specifically, the attacker targets components of the system while the de…
View article: Competitive Service-Level Bid Construction for Urban Parcel Logistics Auctions
Competitive Service-Level Bid Construction for Urban Parcel Logistics Auctions Open
View article: Relay-Hub Network Design for Consolidation Planning Under Demand Variability
Relay-Hub Network Design for Consolidation Planning Under Demand Variability Open
View article: Dynamic Operational Planning in Warfare: A Stochastic Game Approach to Military Campaigns
Dynamic Operational Planning in Warfare: A Stochastic Game Approach to Military Campaigns Open
We study a two‐player discounted zero‐sum stochastic game model for dynamic operational planning in military campaigns. At each stage, the players manage multiple commanders who order military actions on objectives that have an open line o…
View article: Multi-Period Stochastic Logistic Hub Capacity Planning for Relay Transportation
Multi-Period Stochastic Logistic Hub Capacity Planning for Relay Transportation Open
This study focuses on relay transport carriers (RTCs) that contract with hub providers to lease hub capacity and employ relay transportation via hubs. It enables long-haul freight shipments to be transported by multiple short-haul drivers …
View article: Assessing and Enhancing Readiness in Hyperconnected Supply Chains
Assessing and Enhancing Readiness in Hyperconnected Supply Chains Open
This paper investigates the resilience of supply chains (SCs) against a backdrop of escalating disruptions, developing a quantitative, performance-oriented metric to evaluate SC readiness and the efficacy of Physical Internet (PI) concepts…
View article: Inspection Game with Location-Specific Detection Capabilities: Exact and Approximate Algorithms for Strategic Resource Coordination
Inspection Game with Location-Specific Detection Capabilities: Exact and Approximate Algorithms for Strategic Resource Coordination Open
We consider a zero-sum inspection game, in which a defender positions detectors across a critical system to detect multiple attacks caused by an attacker. We assume that detection is imperfect, and each detector location is associated with…
View article: Dynamic Operational Planning in Warfare: A Stochastic Game Approach to Military Campaigns
Dynamic Operational Planning in Warfare: A Stochastic Game Approach to Military Campaigns Open
We study a two-player discounted zero-sum stochastic game model for dynamic operational planning in military campaigns. At each stage, the players manage multiple commanders who order military actions on objectives that have an open line o…
View article: Stochastic Service Network Design with Different Operational Patterns for Hyperconnected Relay Transportation
Stochastic Service Network Design with Different Operational Patterns for Hyperconnected Relay Transportation Open
Hyperconnected relay transportation enables using a relay system of short-haul drivers to deliver long-haul shipments collectively, which helps address root causes of trucker shortage issues by transforming working conditions with potentia…
View article: Strategic Monitoring of Networked Systems With Heterogeneous Security Levels
Strategic Monitoring of Networked Systems With Heterogeneous Security Levels Open
We consider a strategic network monitoring problem involving the operator of a networked system and an attacker. The operator aims to randomize the placement of multiple protected sensors to monitor and protect components that are vulnerab…
View article: Strategic Monitoring of Networked Systems with Heterogeneous Security Levels
Strategic Monitoring of Networked Systems with Heterogeneous Security Levels Open
We consider a strategic network monitoring problem involving the operator of a networked system and an attacker. The operator aims to randomize the placement of multiple protected sensors to monitor and protect components that are vulnerab…
View article: Network Inspection Using Heterogeneous Sensors for Detecting Strategic Attacks
Network Inspection Using Heterogeneous Sensors for Detecting Strategic Attacks Open
We consider a two-player network inspection game, in which a defender allocates sensors with potentially heterogeneous detection capabilities in order to detect multiple attacks caused by a strategic attacker. The objective of the defender…
View article: Hide-and-Seek Game with Capacitated Locations and Imperfect Detection
Hide-and-Seek Game with Capacitated Locations and Imperfect Detection Open
We consider a variant of the hide-and-seek game in which a seeker inspects multiple hiding locations to find multiple items hidden by a hider. Each hiding location has a maximum hiding capacity and a probability of detecting its hidden ite…
View article: An Asset-Based Causal Loop Model to Improve Corporate Value
An Asset-Based Causal Loop Model to Improve Corporate Value Open
View article: Network Inspection for Detecting Strategic Attacks
Network Inspection for Detecting Strategic Attacks Open
Ensuring the security of critical infrastructures is crucial for the society’s welfare and prosperity. However, these infrastructure networks are inherently vulnerable to both intentional and unintentional threats. In “Network Inspection f…
View article: Network Inspection Using Heterogeneous Sensors for Detecting Strategic Attacks
Network Inspection Using Heterogeneous Sensors for Detecting Strategic Attacks Open
We consider a two-player network inspection game, in which a defender positions heterogeneous sensors according to a probability distribution in order to detect multiple attacks caused by a strategic attacker. We assume the defender has ac…
View article: Probability Distributions on Partially Ordered Sets and Network Interdiction Games
Probability Distributions on Partially Ordered Sets and Network Interdiction Games Open
This article poses the following problem: Does there exist a probability distribution over subsets of a finite partially ordered set (poset), such that a set of constraints involving marginal probabilities of the poset’s elements and maxim…
View article: Design of a Simulation-Based Experiment for Assessing the Relevance of the Physical Internet Concept for Humanitarian Supply Chains
Design of a Simulation-Based Experiment for Assessing the Relevance of the Physical Internet Concept for Humanitarian Supply Chains Open
The challenges faced in delivering relief items to victims of natural disasters and the growing external pressures urge humanitarian supply chain organizations to initiate some change. In this regard, the physical internet concept can offe…
View article: Toward an Innovative Risk- and Opportunity- Oriented System for SMEs’ Decision-Makers
Toward an Innovative Risk- and Opportunity- Oriented System for SMEs’ Decision-Makers Open
International audience
View article: A Network Monitoring Game with Heterogeneous Component Criticality Levels
A Network Monitoring Game with Heterogeneous Component Criticality Levels Open
We consider an attacker-operator game for monitoring a large-scale network that is comprised on components that differ in their criticality levels. In this zero-sum game, the operator seeks to position a limited number of sensors to monito…
View article: A Network Monitoring Game with Heterogeneous Component Criticality\n Levels
A Network Monitoring Game with Heterogeneous Component Criticality\n Levels Open
We consider an attacker-operator game for monitoring a large-scale network\nthat is comprised on components that differ in their criticality levels. In\nthis zero-sum game, the operator seeks to position a limited number of sensors\nto mon…
View article: Strategic and analytics-driven inspection operations for critical infrastructure resilience
Strategic and analytics-driven inspection operations for critical infrastructure resilience Open
Thesis: Ph. D. in Civil Engineering and Computation, Massachusetts Institute of Technology, Department of Civil and Environmental Engineering, 2019
View article: Probability Distributions on Partially Ordered Sets and Network Security Games.
Probability Distributions on Partially Ordered Sets and Network Security Games. Open
We consider the following problem: Does there exist a probability distribution over subsets of a finite partially ordered set (poset), such that a set of constraints involving marginal probabilities of the poset's elements and maximal chai…
View article: Network Monitoring under Strategic Disruptions.
Network Monitoring under Strategic Disruptions. Open
This article considers a resource allocation problem for monitoring infrastructure networks facing strategic disruptions. The network operator is interested in determining the minimum number of sensors and a sensing strategy, to ensure a d…
View article: Security Games in Network Flow Problems
Security Games in Network Flow Problems Open
This article considers a two-player strategic game for network routing under link disruptions. Player 1 (defender) routes flow through a network to maximize her value of effective flow while facing transportation costs. Player 2 (attacker)…
View article: Network flow routing under strategic link disruptions
Network flow routing under strategic link disruptions Open
This paper considers a 2-player strategic game for network routing under link disruptions. Player 1 (defender) routes flow through a network to maximize her value of effective flow while facing transportation costs. Player 2 (attacker) sim…