Please use this identifier to cite or link to this item: https://research.matf.bg.ac.rs/handle/123456789/2939
DC FieldValueLanguage
dc.contributor.authorDjukanović, Markoen_US
dc.contributor.authorKapunac, Stefanen_US
dc.contributor.authorKartelj, Aleksandaren_US
dc.contributor.authorMatić, Draganen_US
dc.date.accessioned2025-11-29T12:33:16Z-
dc.date.available2025-11-29T12:33:16Z-
dc.date.issued2025-01-30-
dc.identifier.issn09507051-
dc.identifier.urihttps://research.matf.bg.ac.rs/handle/123456789/2939-
dc.description.abstractThis work focuses on developing a meta-heuristic approach to protect network nodes from simultaneous attacks, specifically addressing the k-strong Roman domination problem. The objective is to assign integer weights to the nodes, representing the number of stationed armies, to meet protection constraints while minimizing the total number of armies. A network is protected if it can repel any simultaneous attack on k nodes. A node is protected if it can defend itself or if a neighboring node provides an army while retaining at least one army for self-defense. This problem formulation can be used in practical scenarios, e.g. developing counter-terrorism strategies or in coping with supply chain disruptions. The problem is difficult as even verifying the feasibility of a single solution generally requires an exponential time. Two exact approaches are proposed in the literature but applicable to small random graphs. For larger graphs, we propose an effective variable neighborhood search, where the feasibility of a solution is verified by introducing the concept of relaxed feasibility. Experiments are conducted with random networks from the literature and two introduced ad-hoc wireless and real-world networks. Extensive experimental evaluations show the robustness of the proposed approach compared to the existing approaches from the literature by significantly outperforming them in all three benchmark sets. Furthermore, we demonstrate the practical application of the proposed variable neighborhood search approach, where its solution is used to position fire stations within the city so that simultaneous fires can be extinguished efficiently while reducing the number of required fire trucks.en_US
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.relation.ispartofKnowledge Based Systemsen_US
dc.subjectAd-hoc wireless networksen_US
dc.subjectGraph domination problemsen_US
dc.subjectSimultaneous attacksen_US
dc.subjectVariable neighborhood searchen_US
dc.titleGraph protection under multiple simultaneous attacks: A heuristic approachen_US
dc.typeArticleen_US
dc.identifier.doi10.1016/j.knosys.2024.112791-
dc.identifier.scopus2-s2.0-85210754574-
dc.identifier.isi001373110200001-
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/85210754574-
dc.contributor.affiliationInformatics and Computer Scienceen_US
dc.contributor.affiliationInformatics and Computer Scienceen_US
dc.relation.issn0950-7051en_US
dc.description.rankM21aen_US
dc.relation.firstpageArticle no. 112791en_US
dc.relation.volume309en_US
item.grantfulltextnone-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairetypeArticle-
crisitem.author.deptInformatics and Computer Science-
crisitem.author.deptInformatics and Computer Science-
crisitem.author.orcid0009-0006-0174-8530-
crisitem.author.orcid0000-0001-9839-6039-
Appears in Collections:Research outputs
Show simple item record

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.