Assessing the vulnerability of military theater distribution routes
PurposeThis paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing over roads and railways subject to enemy interdiction.Design/methodology/approachGraph theory, a heuristic and a bi...
Uložené v:
| Vydané v: | Journal of Defense Analytics and Logistics Ročník 3; číslo 1; s. 60 - 82 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Bingley
Emerald Group Publishing Limited
09.07.2019
Emerald Publishing |
| Predmet: | |
| ISSN: | 2399-6439, 2399-6447 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | PurposeThis paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing over roads and railways subject to enemy interdiction.Design/methodology/approachGraph theory, a heuristic and a binary integer program are used in this paper.FindingsThis work allows transportation analysts at the United States Transportation Command to identify a relatively small number of roads or railways that, if interdicted by an enemy, could disrupt the flow of military cargo within any theater of operation.Research limitations/implicationsThis research does not capture aspects of time, such as the reality that cargo requirements and enemy threats may fluctuate each day of the contingency.Practical implicationsThis work provides military logistics planners and decision-makers with a vulnerability assessment of theater distribution routes, including insights into which specific roads and railways may require protection to ensure the successful delivery of cargo from ports of debarkation to final destinations.Originality/valueThis work merges network connectivity and flow characteristics with enemy threat assessments to identify militarily-useful roads and railways most vulnerable to enemy interdictions. A geographic combatant command recently used this specific research approach to support their request for rapid rail repair capability. |
|---|---|
| AbstractList | PurposeThis paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing over roads and railways subject to enemy interdiction.Design/methodology/approachGraph theory, a heuristic and a binary integer program are used in this paper.FindingsThis work allows transportation analysts at the United States Transportation Command to identify a relatively small number of roads or railways that, if interdicted by an enemy, could disrupt the flow of military cargo within any theater of operation.Research limitations/implicationsThis research does not capture aspects of time, such as the reality that cargo requirements and enemy threats may fluctuate each day of the contingency.Practical implicationsThis work provides military logistics planners and decision-makers with a vulnerability assessment of theater distribution routes, including insights into which specific roads and railways may require protection to ensure the successful delivery of cargo from ports of debarkation to final destinations.Originality/valueThis work merges network connectivity and flow characteristics with enemy threat assessments to identify militarily-useful roads and railways most vulnerable to enemy interdictions. A geographic combatant command recently used this specific research approach to support their request for rapid rail repair capability. Purpose – This paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing over roads and railways subject to enemy interdiction. Design/methodology/approach – Graph theory, a heuristic and a binary integer program are used in this paper. Findings – This work allows transportation analysts at the United States Transportation Command to identify a relatively small number of roads or railways that, if interdicted by an enemy, could disrupt the flow of military cargo within any theater of operation. Research limitations/implications – This research does not capture aspects of time, such as the reality that cargo requirements and enemy threats may fluctuate each day of the contingency. Practical implications – This work provides military logistics planners and decision-makers with a vulnerability assessment of theater distribution routes, including insights into which specific roads and railways may require protection to ensure the successful delivery of cargo from ports of debarkation to final destinations. Originality/value – This work merges network connectivity and flow characteristics with enemy threat assessments to identify militarily-useful roads and railways most vulnerable to enemy interdictions. A geographic combatant command recently used this specific research approach to support their request for rapid rail repair capability. |
| Author | Longhorn, Dave C. Muckensturm, Joshua R. |
| Author_xml | – sequence: 1 givenname: Joshua R. surname: Muckensturm fullname: Muckensturm, Joshua R. – sequence: 2 givenname: Dave C. surname: Longhorn fullname: Longhorn, Dave C. |
| BookMark | eNp1UctOwzAQtFCRKKUfwC0S54BfsZ1jVV5FlbjA2bIdp7hK42I7SP17HAockDh5Pbszmt05B5Pe9xaASwSvEYLi5ul2sS4hLzFEooQQ4RMwxaSuS0Ypn_zWpD4D8xidhhnOPyamYLmI0Was3xTpzRYfQ9fboLTrXDoUvi12Y6XCYeyqZEPRuJiC00Nyvi-CH5KNF-C0VV208-93Bl7v716Wj-X6-WG1zNYMIQKXmBFEKVEVpARhYriukDZcWCI0UhRirHXNGyjqilSkIYRXgitGGYOGQqPJDKyOuo1XW7kPbpeNSa-c_AJ82EgVkjOdlS3WuOZaIIIEVSIrM1MxDFWLLVONyFpXR6198O-DjUlu_RD6bF_iCjLBRF3jPMWPUyb4GINtpcnXGFdPQblOIijHAOQYgIRcjgHIMYDMRH-YP37_53wCeYWITg |
| CitedBy_id | crossref_primary_10_1002_tjo3_70002 crossref_primary_10_31374_sjms_330 crossref_primary_10_1007_s10479_025_06590_z crossref_primary_10_1108_JDAL_09_2021_0006 crossref_primary_10_1108_JDAL_04_2020_0008 |
| Cites_doi | 10.1109/TNET.2011.2170849 10.1016/j.tranpol.2012.09.007 10.1016/j.cor.2018.04.012 10.1016/j.cosrev.2018.02.002 10.1007/s00500-016-2303-y 10.1016/j.ijdrr.2015.01.009 10.1002/jgt.3190120114 10.1111/j.1467-9671.2008.01086.x 10.1007/s11067-014-9260-8 10.1016/S0377-2217(03)00135-8 10.1016/j.cor.2011.02.016 10.1109/TNET.2012.2215882 10.1016/S0967-070X(02)00011-2 10.1007/s00168-008-0235-x 10.1016/j.cor.2008.08.016 10.1016/j.disopt.2012.07.001 10.1007/s10878-014-9730-4 10.1186/s40649-015-0010-y 10.1016/j.cor.2007.09.004 10.1007/s10109-006-0039-4 |
| ContentType | Journal Article |
| Copyright | In accordance with section 105 of the US Copyright Act, this work has been produced by a US government employee and shall be considered a public domain work, as copyright protection is not available. 2019 |
| Copyright_xml | – notice: In accordance with section 105 of the US Copyright Act, this work has been produced by a US government employee and shall be considered a public domain work, as copyright protection is not available. 2019 |
| DBID | AAYXX CITATION 7TB 8FD FR3 H8D L7M DOA |
| DOI | 10.1108/JDAL-07-2018-0012 |
| DatabaseName | CrossRef Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database Aerospace Database Advanced Technologies Database with Aerospace DOAJ: Directory of Open Access Journal (DOAJ) |
| DatabaseTitle | CrossRef Aerospace Database Engineering Research Database Technology Research Database Mechanical & Transportation Engineering Abstracts Advanced Technologies Database with Aerospace |
| DatabaseTitleList | Aerospace Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Military & Naval Science |
| EISSN | 2399-6447 |
| EndPage | 82 |
| ExternalDocumentID | oai_doaj_org_article_f2b297b813184a82bb6c5620af2e6ad8 10_1108_JDAL_07_2018_0012 |
| GroupedDBID | AAGBP AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION H13 7TB 8FD ADBBV AFKRA AUCOK BCNDV BENPR CCPQU EBS EJD FR3 GEI GROUPED_DOAJ H8D L7M OK1 PHGZM PHGZT PIMPY PUEGO XDTOA AAFWJ ABJCF AFPKN BGLVJ M7S PQGLB PTHSS |
| ID | FETCH-LOGICAL-c3382-2631443a5043123c7b51bc78e38b1a4022bb97d0895353d337587a64660c40cb3 |
| IEDL.DBID | DOA |
| ISSN | 2399-6439 |
| IngestDate | Fri Oct 03 12:45:27 EDT 2025 Sat Sep 06 07:30:37 EDT 2025 Sat Nov 29 07:41:29 EST 2025 Tue Nov 18 20:49:49 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | https://www.emerald.com/insight/site-policies |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c3382-2631443a5043123c7b51bc78e38b1a4022bb97d0895353d337587a64660c40cb3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://doaj.org/article/f2b297b813184a82bb6c5620af2e6ad8 |
| PQID | 2506868992 |
| PQPubID | 4931631 |
| PageCount | 23 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_f2b297b813184a82bb6c5620af2e6ad8 proquest_journals_2506868992 crossref_citationtrail_10_1108_JDAL_07_2018_0012 crossref_primary_10_1108_JDAL_07_2018_0012 |
| PublicationCentury | 2000 |
| PublicationDate | 2019-07-09 |
| PublicationDateYYYYMMDD | 2019-07-09 |
| PublicationDate_xml | – month: 07 year: 2019 text: 2019-07-09 day: 09 |
| PublicationDecade | 2010 |
| PublicationPlace | Bingley |
| PublicationPlace_xml | – name: Bingley |
| PublicationTitle | Journal of Defense Analytics and Logistics |
| PublicationYear | 2019 |
| Publisher | Emerald Group Publishing Limited Emerald Publishing |
| Publisher_xml | – name: Emerald Group Publishing Limited – name: Emerald Publishing |
| References | US Joint Chiefs of Staff (key2020021709564530300_ref032) 2017 (key2020021709564530300_ref010) 2012 US Joint Chiefs of Staff (key2020021709564530300_ref030) 2013 (key2020021709564530300_ref002) 2016 key2020021709564530300_ref029 (key2020021709564530300_ref009) 2017 key2020021709564530300_ref028 (key2020021709564530300_ref026) 2012; 9 (key2020021709564530300_ref021) 2016; 5 (key2020021709564530300_ref001) 2009; 36 (key2020021709564530300_ref007) 2011; 38 (key2020021709564530300_ref019) 2004; 156 (key2020021709564530300_ref020) 2018; 97 (key2020021709564530300_ref025) 1988; 12 (key2020021709564530300_ref033) 2015; 2 (key2020021709564530300_ref027) 2013; 21 US Joint Chiefs of Staff (key2020021709564530300_ref031) 2016 (key2020021709564530300_ref014) 2018; 28 (key2020021709564530300_ref018) 2007; 9 (key2020021709564530300_ref015) 2009; 36 (key2020021709564530300_ref036) 2016 (key2020021709564530300_ref035) 2009 (key2020021709564530300_ref016) 2009; 43 (key2020021709564530300_ref011) 2016 (key2020021709564530300_ref006) 2008; 12 (key2020021709564530300_ref012) 2015; 12 (key2020021709564530300_ref024) 2015; 15 (key2020021709564530300_ref008) 2012; 20 (key2020021709564530300_ref017) 2015; 81 (key2020021709564530300_ref034) 2014; 28 (key2020021709564530300_ref013) 2014 (key2020021709564530300_ref005) 2006; 1695 (key2020021709564530300_ref037) 2017; 21 (key2020021709564530300_ref004) 2002; 9 (key2020021709564530300_ref022) 2013; 28 (key2020021709564530300_ref038) 2018; 64 (key2020021709564530300_ref023) 2015; 81 (key2020021709564530300_ref003) 2016 |
| References_xml | – volume: 20 start-page: 609 issue: 2 year: 2012 ident: key2020021709564530300_ref008 article-title: On new approaches of assessing network vulnerability: hardness and approximation publication-title: IEEE/ACM Transactions on Networking doi: 10.1109/TNET.2011.2170849 – volume: 28 start-page: 63 year: 2013 ident: key2020021709564530300_ref022 article-title: Network resilience for transport security: some methodological considerations publication-title: Transport Policy doi: 10.1016/j.tranpol.2012.09.007 – volume: 97 start-page: 48 year: 2018 ident: key2020021709564530300_ref020 article-title: Improved formulations for minimum connectivity network interdiction problems publication-title: Computers and Operations Research doi: 10.1016/j.cor.2018.04.012 – year: 2017 ident: key2020021709564530300_ref009 article-title: Data.table: extension of ‘data.frame – volume: 28 start-page: 92 year: 2018 ident: key2020021709564530300_ref014 article-title: The critical node detection problem in networks: a survey publication-title: Computer Science Review doi: 10.1016/j.cosrev.2018.02.002 – volume: 21 start-page: 5621 issue: 19 year: 2017 ident: key2020021709564530300_ref037 article-title: Critical node identification for complex network based on a novel minimum connected dominating set publication-title: Soft Computing doi: 10.1007/s00500-016-2303-y – volume: 12 start-page: 234 year: 2015 ident: key2020021709564530300_ref012 article-title: Transportation network vulnerability analysis for the case of a catastrophic earthquake publication-title: International Journal of Disaster Risk Reduction doi: 10.1016/j.ijdrr.2015.01.009 – volume: 12 start-page: 133 issue: 1 year: 1988 ident: key2020021709564530300_ref025 article-title: An historical note: Euler’s Königsberg letters publication-title: Journal of Graph Theory doi: 10.1002/jgt.3190120114 – ident: key2020021709564530300_ref028 – volume: 64 issue: 1 year: 2018 ident: key2020021709564530300_ref038 article-title: Route planning for military ground vehicles in road networks under uncertain battlefield environment publication-title: Journal of Advanced Transportation – volume: 12 start-page: 61 issue: 1 year: 2008 ident: key2020021709564530300_ref006 article-title: Identifying critical locations in a spatial network with graph theory publication-title: Transactions in GIS doi: 10.1111/j.1467-9671.2008.01086.x – year: 2017 ident: key2020021709564530300_ref032 article-title: Joint publication 4-01 – volume: 15 start-page: 397 issue: 2 year: 2015 ident: key2020021709564530300_ref024 article-title: The evaluation of road network vulnerability in mountainous areas: a case study publication-title: Networks and Spatial Economics doi: 10.1007/s11067-014-9260-8 – volume: 156 start-page: 579 issue: 3 year: 2004 ident: key2020021709564530300_ref019 article-title: A cutting plane algorithm for computing k-edge survivability of a network publication-title: European Journal of Operational Research doi: 10.1016/S0377-2217(03)00135-8 – volume: 38 start-page: 1766 issue: 12 year: 2011 ident: key2020021709564530300_ref007 article-title: Complexity of the critical node problem over trees publication-title: Computers and Operations Research doi: 10.1016/j.cor.2011.02.016 – volume: 21 start-page: 963 issue: 3 year: 2013 ident: key2020021709564530300_ref027 article-title: On the discovery of critical links and nodes for assessing network vulnerability publication-title: IEEE/ACM Transactions on Networking doi: 10.1109/TNET.2012.2215882 – volume-title: ggplot2: elegant Graphics for Data Analysis year: 2009 ident: key2020021709564530300_ref035 – volume: 9 start-page: 117 issue: 2 year: 2002 ident: key2020021709564530300_ref004 article-title: An introduction to road vulnerability: what has been done, is done and should be done publication-title: Transport Policy doi: 10.1016/S0967-070X(02)00011-2 – volume: 1695 start-page: 1 issue: 5 year: 2006 ident: key2020021709564530300_ref005 article-title: The igraph software package for complex network research publication-title: InterJournal, Complex Systems – start-page: 232 volume-title: 2012 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (ICQR2MSE) year: 2012 ident: key2020021709564530300_ref010 article-title: Study on travel time reliability of military transportation network – volume: 43 start-page: 307 issue: 2 year: 2009 ident: key2020021709564530300_ref016 article-title: Exploring the vulnerability of network infrastructure to disruption publication-title: The Annals of Regional Science doi: 10.1007/s00168-008-0235-x – year: 2016 ident: key2020021709564530300_ref002 article-title: Mapdata: extra map databases – volume: 36 start-page: 2193 issue: 7 year: 2009 ident: key2020021709564530300_ref001 article-title: Detecting critical nodes in sparse graphs publication-title: Computers and Operations Research doi: 10.1016/j.cor.2008.08.016 – volume-title: Statistical Analysis of Network Data with R year: 2014 ident: key2020021709564530300_ref013 – volume: 9 start-page: 172 issue: 3 year: 2012 ident: key2020021709564530300_ref026 article-title: Exact interdiction models and algorithms for disconnecting networks via node deletions publication-title: Discrete Optimization doi: 10.1016/j.disopt.2012.07.001 – volume: 28 start-page: 233 issue: 1 year: 2014 ident: key2020021709564530300_ref034 article-title: An integer programming framework for critical elements detection in graphs publication-title: Journal of Combinatorial Optimization doi: 10.1007/s10878-014-9730-4 – year: 2016 ident: key2020021709564530300_ref003 article-title: Maps: draw geographical maps – volume: 2 start-page: 6 issue: 1 year: 2015 ident: key2020021709564530300_ref033 article-title: Efficiently identifying critical nodes in large complex networks publication-title: Computational Social Networks doi: 10.1186/s40649-015-0010-y – volume: 81 start-page: 4 year: 2015 ident: key2020021709564530300_ref023 article-title: Transport resilience and vulnerability: the role of connectivity publication-title: Transportation Research Part A: Policy and Practice – year: 2016 ident: key2020021709564530300_ref031 article-title: Joint publication 3-03 – year: 2016 ident: key2020021709564530300_ref011 article-title: Geosphere: spherical trigonometry – ident: key2020021709564530300_ref029 – year: 2016 ident: key2020021709564530300_ref036 article-title: Dplyr: a grammar of data manipulation – volume: 5 start-page: 1 issue: 3 year: 2016 ident: key2020021709564530300_ref021 article-title: Heuristic algorithm for identifying critical nodes in graphs publication-title: Advances in Computer Science: An International Journal – year: 2013 ident: key2020021709564530300_ref030 article-title: Joint publication 3-35 – volume: 36 start-page: 16 issue: 1 year: 2009 ident: key2020021709564530300_ref015 article-title: Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure publication-title: Computers and Operations Research doi: 10.1016/j.cor.2007.09.004 – volume: 81 start-page: 16 year: 2015 ident: key2020021709564530300_ref017 article-title: Vulnerability and resilience of transport systems-a discussion of recent research publication-title: Transportation Research Part A: Policy and Practice – volume: 9 start-page: 103 issue: 2 year: 2007 ident: key2020021709564530300_ref018 article-title: Critical network infrastructure analysis: interdiction and system flow publication-title: Journal of Geographical Systems doi: 10.1007/s10109-006-0039-4 |
| SSID | ssib044743968 ssib051819139 ssj0002213673 |
| Score | 2.1229408 |
| Snippet | PurposeThis paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability... Purpose – This paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the... |
| SourceID | doaj proquest crossref |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database |
| StartPage | 60 |
| SubjectTerms | Algorithms betweenness binary integer programming Cargo Contingency Decision making Flow characteristics Graph theory Heuristic methods heuristics Logistics Military military route vulnerability Railways Roads & highways shortest path Theater Threat evaluation Transportation |
| Title | Assessing the vulnerability of military theater distribution routes |
| URI | https://www.proquest.com/docview/2506868992 https://doaj.org/article/f2b297b813184a82bb6c5620af2e6ad8 |
| Volume | 3 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2399-6447 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002213673 issn: 2399-6439 databaseCode: DOA dateStart: 20170101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources (ISSN International Center) customDbUrl: eissn: 2399-6447 dateEnd: 99991231 omitProxy: false ssIdentifier: ssib044743968 issn: 2399-6439 databaseCode: M~E dateStart: 20170101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 2399-6447 dateEnd: 20211231 omitProxy: false ssIdentifier: ssj0002213673 issn: 2399-6439 databaseCode: P5Z dateStart: 20180101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 2399-6447 dateEnd: 20211231 omitProxy: false ssIdentifier: ssj0002213673 issn: 2399-6439 databaseCode: M7S dateStart: 20180101 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2399-6447 dateEnd: 20211231 omitProxy: false ssIdentifier: ssj0002213673 issn: 2399-6439 databaseCode: BENPR dateStart: 20180101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 2399-6447 dateEnd: 20211231 omitProxy: false ssIdentifier: ssj0002213673 issn: 2399-6439 databaseCode: PIMPY dateStart: 20180101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEBYhzaGX0uZBtkkXHUoOAROvJOtxzGNDWpLF5AFJL0KSbUhId4OzG8ilv70zsjYPAumlF2NsCdvjkef7pPE3hHxvnJDCVU1WGSdwtkplHjAc7HktGoXdYtWSYzUa6ctLU74o9YU5YZ08cGe4nYZ5ZpTXA3A-4TTzXgaI2blrWC1dFX_zBdTzgkyBJwmBOPsZSBcD5CVJ__Imir6gVBmPleeMyTAspyVPLIvz82D3GOfvIDjqDAHBq6AVtf3ffLpjPDr8TD4lIEl3uwf4Qhbq8TJZP4mi2-0j3aIjB05E09hdIfvd8i5EKgqYjz7MblFvOqbGPtJJQ3_Pe07x81y3tEJJ3VQNi7aTGWDSVXJxODzfP8pSBYUsAPVkGZMcCBN3KFMGISooXwx8ULrm2g8cUEcwp1FVrk3BC15xDuxBOSmkzIPIg-drZHE8GdfrhGosaFQ3ggMkRxEwXzFfOCB7SgZA6LxH8rmJbEjy4ljl4tZGmpFri1a1ubJoVUylYz2y_dTlrtPWeK_xHtr9qSHKYscD4Cw2OYv9l7P0yOb8rdk0Vu8tgECpJfBO9vV_XGODfISbNjGl12ySxWk7q7-RpfAwvb5v--TD3nBUnvaju_Yx0_QMt3-GsC2LX3C-_HFSXv0FpZvpNw |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Assessing+the+vulnerability+of+military+theater+distribution+routes&rft.jtitle=Journal+of+defense+analytics+and+logistics&rft.au=Muckensturm%2C+Joshua+R&rft.au=Longhorn%2C+Dave+C&rft.date=2019-07-09&rft.pub=Emerald+Group+Publishing+Limited&rft.eissn=2399-6447&rft.volume=3&rft.issue=1&rft.spage=60&rft.epage=82&rft_id=info:doi/10.1108%2FJDAL-07-2018-0012&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2399-6439&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2399-6439&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2399-6439&client=summon |