[1] C.Turnitsa, C.Blais, A.Tolk, "Simulation and Wargaming", 1th ed, Wiley, 2022.
[2] A.R.Washburn, "Two-person zero-sum games", 4th ed, Springer, 2014.
[3] H.Bigdeli, H.Hassanpour, "A satisfactory strategy of multiobjective two person matrix games with fuzzy payoffs", Iranian Journal of Fuzzy Systems, 2016; 13(4): 17-33. doi: 10.22111/ijfs.2016.2593.
[4] H.Bigdeli, H.Hassanpour, "Solving Defender-Attacker Game with Multiple Decision Makers Using Expected-Value Model", Caspian Journal of Mathematical Sciences (CJMS), 2020; 11(2): 368-380. doi: 10.22080/cjms.2020.18275.1466.
[5] H.Bigdeli, H.Hassanpour, J.Tayyebi, "Constrained Bimatrix Games with Fuzzy Goals and its Application in Nuclear Negotiations", Iranian Journal of Numerical Analysis and Optimization, 2018; 8(1): 81-110. doi: 10.22067/ijnao.v8i1.55385.
[6] H.Bigdeli, H.Hassanpour, J.Tayyebi, "Multiobjective security game with fuzzy payoffs", Iranian Journal of Fuzzy Systems, 2019; 16(1): 89-101. doi: 10.22111/ijfs.2019.4486.
[7] Smith, J.C., and Song, Y., "A survey of network interdiction models and algorithms", European Journal of Operational Research, 2020,Vol. 283, , pp. 797-811.
[8] Fulkerson, D.R., and Harding, G.C., "Maximizing the minimum source-sink path subject to a budget constraint", Mathematical Programming, Vol. 13, 1977, pp. 116-118.
[9] Altner, D.S., Ergun, Ö., and Uhan, N.A., "The maximum flow network interdiction problem: valid inequalities, integrality gaps, and approximability", Operations Research Letters, Vol. 38, 2010, pp. 33-38.
[10] Church, R.L., Scaparra, M.P., and Middleton, R.S., "Identifying critical infrastructure: the median and covering facility interdiction problems", Annals of the Association of American Geographers, Vol. 94, 2004, pp. 491-502.
[11] von Stackelberg, H., "The Theory of the Market Economy (translated from German) ", William Hodge & Co., London, UK ,1952.
[12] عباس کاری مجید آباد، مرضیه مظفری و علی نعیمی صدیق، "تعادل استکلبرگ-نش در بازی مکانیابی رقابتی تسهیلات میان یک امتیازدهنده و دو سرمایهگذار"، نشریه مدلسازی در مهندسی، دوره 12، شماره 57، تابستان 1398، صفحه 111- 125.
[13] Wollmer, R., "Removing arcs from a network", Operations Research, Vol. 12, 1964, pp. 934-940.
[14] Morton, D.P., Pan, F., and Saeger, K.J., "Models for nuclear smuggling interdiction", IIE Transactions, Vol. 39, 2007, pp. 3-14.
[15] Delgadillo, A., Arroyo, J.M., and Alguacil, N., "Analysis of electric grid interdiction with line switching", IEEE Transactions on Power Systems, Vol. 25, 2009, pp. 633-641.
[16] Whiteman, P.S.B., "Improving single strike effectiveness for network interdiction", Military Operations Research, 1999, pp. 15-30.
[17] Israeli, E., and Wood, R.K., "Shortest‐path network interdiction", Networks: An International Journal, Vol. 40, 2002, pp. 97-111.
[18] Zhang, J., Zhuang, J., and Behlendorf, B., "Stochastic shortest path network interdiction with a case study of arizona–mexico border", Reliability Engineering & System Safety, Vol. 179, 2018,pp. 62-73.
[19] Sadeghi, S., Seifi, A., and Azizi, E., "Trilevel shortest path network interdiction with partial fortification", Computers & Industrial Engineering, Vol. 106, 2017, pp. 400-411.
[20] Pollack, M., "Letter to the editor-the maximum capacity through a network", Operations Research, Vol. 8, 1960, pp. 733-736.
[21] Shacham, N., “Multicast routing of hierarchical data,” Discovering a New World of Communications, IEEE, 1992, pp. 1217-1221.
[22] Wang, Z., and Crowcroft, J., “Bandwidth-delay based routing algorithms,” GLOBECOM'95, IEEE, 1995, pp. 2129-2133.
[23] Ullah, E., Lee, K., and Hassoun, S., “An algorithm for identifying dominant-edge metabolic pathways,” Proceeding of. IEEE/ACM International Conference on Computer-Aided Design-Digest of Technical Papers, IEEE, 2009, pp. 144-150.
[24] Mohammadi, A., and Tayyebi, J., "Maximum capacity path interdiction problem with fixed costs", Asia-Pacific Journal of Operational Research, Vol. 36, 2019, pp. 1950018-1-1950018-21.
[25] Dijkstra, E.W., "A note on two problems in connexion with graphs", Numerische mathematik, Vol. 1, 1959, pp. 269-271.
[26] عرفان بابایی تیر کلایی، ایرج مهدوی و میر مهدی سید اصفهانی، "حل مسأله مسیریابی وسایل نقلیه با در نظر گرفتن سفرهای چندگانه و پنجرههای زمانی در مدیریت پسماند شهری با استفاده از الگوریتم بهینهسازی گرگ خاکستری"، نشریه مدلسازی در مهندسی، دوره 17، شماره 57، تابستان 1398، صفحه 93- 110.
[27] سید مهدی حسینی مطلق، محمد رضا قطره سامانی و عباس جوکار، "ارائه یک مدل ریاضی و روش حل ابتکاری برای مسئله مکانیابی-مسیریابی دوسطحی با در نظر گرفتن شرایط گذاشت و برداشت در حالت عدم قطعیت"، نشریه مدلسازی در مهندسی، دوره 16، شماره 53، تابستان 1397، صفحه 339- 361.
[28] Sinha, A., Malo, P., and Deb, K., "A review on bilevel optimization: from classical to evolutionary approaches and applications", IEEE Transactions on Evolutionary Computation, Vol. 22, 2017, pp. 276-295.
[29] Hansen, P., Jaumard, B., and Savard, G., "New branch-and-bound rules for linear bilevel programming", SIAM Journal on scientific and Statistical Computing, Vol. 13, 1992, pp. 1194-1217.
[30] Vicente, L., Savard, G., and Júdice, J., "Descent approaches for quadratic bilevel programming", Journal of optimization theory and applications, Vol. 81, 1994, pp. 379-399.
[31] Wei, K., Gao, Y., Zhang, W., and Lin, S., “A modified Dijkstra’s algorithm for solving the problem of finding the maximum load path”, Proceeding of 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT), IEEE, 2019, pp. 10-13.
[32] Siddique, N., and Adeli, H., "Simulated annealing, its variants and engineering applications", International Journal on Artificial Intelligence Tools, Vol. 25, No. 06, 2016, 1630001.
[33] Yang, J., Borrero, J.S., Prokopyev, O.A., and Sauré, D., "Sequential shortest path interdiction with incomplete information and limited feedback", Decision Analysis, Vol. 18, 2021, pp. 218-244.
[34] Abdolahzadeh, A., Aman, M., and Tayyebi, J., "Minimum st-cut interdiction problem", Computers & Industrial Engineering, Vol. 148, 2020, 106708.
[35] Sinha, A., Malo, P., Frantsev, A., and Deb, K., "Finding optimal strategies in a multi-period multi-leader–follower Stackelberg game using an evolutionary algorithm", Computers & operations research, Vol. 41, 2014, pp. 374-385.