Graph protection under multiple simultaneous attacks: A heuristic approach

IF 7.6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Knowledge-Based Systems Pub Date : 2025-01-30 Epub Date: 2024-11-28 DOI:10.1016/j.knosys.2024.112791
Marko Djukanović , Stefan Kapunac , Aleksandar Kartelj , Dragan Matić
{"title":"Graph protection under multiple simultaneous attacks: A heuristic approach","authors":"Marko Djukanović ,&nbsp;Stefan Kapunac ,&nbsp;Aleksandar Kartelj ,&nbsp;Dragan Matić","doi":"10.1016/j.knosys.2024.112791","DOIUrl":null,"url":null,"abstract":"<div><div>This work focuses on developing a meta-heuristic approach to protect network nodes from simultaneous attacks, specifically addressing the <span><math><mi>k</mi></math></span>-strong Roman domination problem. The objective is to assign integer weights to the nodes, representing the number of stationed armies, to meet protection constraints while minimizing the total number of armies. A network is protected if it can repel any simultaneous attack on <span><math><mi>k</mi></math></span> nodes. A node is protected if it can defend itself or if a neighboring node provides an army while retaining at least one army for self-defense. This problem formulation can be used in practical scenarios, e.g. developing counter-terrorism strategies or in coping with supply chain disruptions. The problem is difficult as even verifying the feasibility of a single solution generally requires an exponential time. Two exact approaches are proposed in the literature but applicable to small random graphs. For larger graphs, we propose an effective variable neighborhood search, where the feasibility of a solution is verified by introducing the concept of relaxed feasibility. Experiments are conducted with random networks from the literature and two introduced ad-hoc wireless and real-world networks. Extensive experimental evaluations show the robustness of the proposed approach compared to the existing approaches from the literature by significantly outperforming them in all three benchmark sets. Furthermore, we demonstrate the practical application of the proposed variable neighborhood search approach, where its solution is used to position fire stations within the city so that simultaneous fires can be extinguished efficiently while reducing the number of required fire trucks.</div></div>","PeriodicalId":49939,"journal":{"name":"Knowledge-Based Systems","volume":"309 ","pages":"Article 112791"},"PeriodicalIF":7.6000,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Knowledge-Based Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0950705124014254","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2024/11/28 0:00:00","PubModel":"Epub","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

This work focuses on developing a meta-heuristic approach to protect network nodes from simultaneous attacks, specifically addressing the k-strong Roman domination problem. The objective is to assign integer weights to the nodes, representing the number of stationed armies, to meet protection constraints while minimizing the total number of armies. A network is protected if it can repel any simultaneous attack on k nodes. A node is protected if it can defend itself or if a neighboring node provides an army while retaining at least one army for self-defense. This problem formulation can be used in practical scenarios, e.g. developing counter-terrorism strategies or in coping with supply chain disruptions. The problem is difficult as even verifying the feasibility of a single solution generally requires an exponential time. Two exact approaches are proposed in the literature but applicable to small random graphs. For larger graphs, we propose an effective variable neighborhood search, where the feasibility of a solution is verified by introducing the concept of relaxed feasibility. Experiments are conducted with random networks from the literature and two introduced ad-hoc wireless and real-world networks. Extensive experimental evaluations show the robustness of the proposed approach compared to the existing approaches from the literature by significantly outperforming them in all three benchmark sets. Furthermore, we demonstrate the practical application of the proposed variable neighborhood search approach, where its solution is used to position fire stations within the city so that simultaneous fires can be extinguished efficiently while reducing the number of required fire trucks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
多重同时攻击下的图保护:一种启发式方法
这项工作的重点是开发一种元启发式方法来保护网络节点免受同时攻击,特别是解决k-strong罗马统治问题。目标是为节点分配整数权重,代表驻扎军队的数量,以满足保护约束,同时最小化军队总数。如果一个网络能够击退对k个节点的任何同时攻击,那么它就是受保护的。如果一个节点能够自我防御,或者相邻节点提供了一支军队,同时保留了至少一支军队用于自卫,则该节点受到保护。这种问题的表述可以用于实际场景,例如制定反恐战略或应对供应链中断。这个问题很困难,因为即使验证单个解的可行性通常也需要指数时间。在文献中提出了两种精确的方法,但适用于小随机图。对于较大的图,我们提出了一种有效的变量邻域搜索,其中通过引入放松可行性的概念来验证解的可行性。实验用文献中的随机网络和两个引入的自组织无线网络和现实世界的网络进行。广泛的实验评估表明,与文献中现有的方法相比,所提出的方法的鲁棒性在所有三个基准集上都明显优于它们。此外,我们演示了所提出的可变社区搜索方法的实际应用,该方法的解决方案用于在城市内定位消防站,以便有效地扑灭同时发生的火灾,同时减少所需消防车的数量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Knowledge-Based Systems
Knowledge-Based Systems 工程技术-计算机:人工智能
CiteScore
14.80
自引率
12.50%
发文量
1245
审稿时长
7.8 months
期刊介绍: Knowledge-Based Systems, an international and interdisciplinary journal in artificial intelligence, publishes original, innovative, and creative research results in the field. It focuses on knowledge-based and other artificial intelligence techniques-based systems. The journal aims to support human prediction and decision-making through data science and computation techniques, provide a balanced coverage of theory and practical study, and encourage the development and implementation of knowledge-based intelligence models, methods, systems, and software tools. Applications in business, government, education, engineering, and healthcare are emphasized.
期刊最新文献
Polarization information restoration for visual reflection removal via cross dual-stream network Bidirectional accelerated adaptive moment estimation for deep neural networks DABD: Direction alignment–based backdoor defense with sign consensus in federated learning CASE-TCR: Content aware and sparse selection attention driven learning framework for pan-cancer prediction using T-cell receptor sequences Towards attribute-Augmented course recommendation: An LLM-Driven model-Agnostic representation learning framework
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1