Assessing the vulnerability of military theater distribution routes

PurposeThis paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing over roads and railways subject to enemy interdiction.Design/methodology/approachGraph theory, a heuristic and a bi...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Journal of Defense Analytics and Logistics Ročník 3; číslo 1; s. 60 - 82
Hlavní autori: Muckensturm, Joshua R., Longhorn, Dave C.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Bingley Emerald Group Publishing Limited 09.07.2019
Emerald Publishing
Predmet:
ISSN:2399-6439, 2399-6447
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract PurposeThis paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing over roads and railways subject to enemy interdiction.Design/methodology/approachGraph theory, a heuristic and a binary integer program are used in this paper.FindingsThis work allows transportation analysts at the United States Transportation Command to identify a relatively small number of roads or railways that, if interdicted by an enemy, could disrupt the flow of military cargo within any theater of operation.Research limitations/implicationsThis research does not capture aspects of time, such as the reality that cargo requirements and enemy threats may fluctuate each day of the contingency.Practical implicationsThis work provides military logistics planners and decision-makers with a vulnerability assessment of theater distribution routes, including insights into which specific roads and railways may require protection to ensure the successful delivery of cargo from ports of debarkation to final destinations.Originality/valueThis work merges network connectivity and flow characteristics with enemy threat assessments to identify militarily-useful roads and railways most vulnerable to enemy interdictions. A geographic combatant command recently used this specific research approach to support their request for rapid rail repair capability.
AbstractList PurposeThis paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing over roads and railways subject to enemy interdiction.Design/methodology/approachGraph theory, a heuristic and a binary integer program are used in this paper.FindingsThis work allows transportation analysts at the United States Transportation Command to identify a relatively small number of roads or railways that, if interdicted by an enemy, could disrupt the flow of military cargo within any theater of operation.Research limitations/implicationsThis research does not capture aspects of time, such as the reality that cargo requirements and enemy threats may fluctuate each day of the contingency.Practical implicationsThis work provides military logistics planners and decision-makers with a vulnerability assessment of theater distribution routes, including insights into which specific roads and railways may require protection to ensure the successful delivery of cargo from ports of debarkation to final destinations.Originality/valueThis work merges network connectivity and flow characteristics with enemy threat assessments to identify militarily-useful roads and railways most vulnerable to enemy interdictions. A geographic combatant command recently used this specific research approach to support their request for rapid rail repair capability.
Purpose – This paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing over roads and railways subject to enemy interdiction. Design/methodology/approach – Graph theory, a heuristic and a binary integer program are used in this paper. Findings – This work allows transportation analysts at the United States Transportation Command to identify a relatively small number of roads or railways that, if interdicted by an enemy, could disrupt the flow of military cargo within any theater of operation. Research limitations/implications – This research does not capture aspects of time, such as the reality that cargo requirements and enemy threats may fluctuate each day of the contingency. Practical implications – This work provides military logistics planners and decision-makers with a vulnerability assessment of theater distribution routes, including insights into which specific roads and railways may require protection to ensure the successful delivery of cargo from ports of debarkation to final destinations. Originality/value – This work merges network connectivity and flow characteristics with enemy threat assessments to identify militarily-useful roads and railways most vulnerable to enemy interdictions. A geographic combatant command recently used this specific research approach to support their request for rapid rail repair capability.
Author Longhorn, Dave C.
Muckensturm, Joshua R.
Author_xml – sequence: 1
  givenname: Joshua R.
  surname: Muckensturm
  fullname: Muckensturm, Joshua R.
– sequence: 2
  givenname: Dave C.
  surname: Longhorn
  fullname: Longhorn, Dave C.
BookMark eNp1UctOwzAQtFCRKKUfwC0S54BfsZ1jVV5FlbjA2bIdp7hK42I7SP17HAockDh5Pbszmt05B5Pe9xaASwSvEYLi5ul2sS4hLzFEooQQ4RMwxaSuS0Ypn_zWpD4D8xidhhnOPyamYLmI0Was3xTpzRYfQ9fboLTrXDoUvi12Y6XCYeyqZEPRuJiC00Nyvi-CH5KNF-C0VV208-93Bl7v716Wj-X6-WG1zNYMIQKXmBFEKVEVpARhYriukDZcWCI0UhRirHXNGyjqilSkIYRXgitGGYOGQqPJDKyOuo1XW7kPbpeNSa-c_AJ82EgVkjOdlS3WuOZaIIIEVSIrM1MxDFWLLVONyFpXR6198O-DjUlu_RD6bF_iCjLBRF3jPMWPUyb4GINtpcnXGFdPQblOIijHAOQYgIRcjgHIMYDMRH-YP37_53wCeYWITg
CitedBy_id crossref_primary_10_1002_tjo3_70002
crossref_primary_10_31374_sjms_330
crossref_primary_10_1007_s10479_025_06590_z
crossref_primary_10_1108_JDAL_09_2021_0006
crossref_primary_10_1108_JDAL_04_2020_0008
Cites_doi 10.1109/TNET.2011.2170849
10.1016/j.tranpol.2012.09.007
10.1016/j.cor.2018.04.012
10.1016/j.cosrev.2018.02.002
10.1007/s00500-016-2303-y
10.1016/j.ijdrr.2015.01.009
10.1002/jgt.3190120114
10.1111/j.1467-9671.2008.01086.x
10.1007/s11067-014-9260-8
10.1016/S0377-2217(03)00135-8
10.1016/j.cor.2011.02.016
10.1109/TNET.2012.2215882
10.1016/S0967-070X(02)00011-2
10.1007/s00168-008-0235-x
10.1016/j.cor.2008.08.016
10.1016/j.disopt.2012.07.001
10.1007/s10878-014-9730-4
10.1186/s40649-015-0010-y
10.1016/j.cor.2007.09.004
10.1007/s10109-006-0039-4
ContentType Journal Article
Copyright In accordance with section 105 of the US Copyright Act, this work has been produced by a US government employee and shall be considered a public domain work, as copyright protection is not available. 2019
Copyright_xml – notice: In accordance with section 105 of the US Copyright Act, this work has been produced by a US government employee and shall be considered a public domain work, as copyright protection is not available. 2019
DBID AAYXX
CITATION
7TB
8FD
FR3
H8D
L7M
DOA
DOI 10.1108/JDAL-07-2018-0012
DatabaseName CrossRef
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
Aerospace Database
Advanced Technologies Database with Aerospace
DOAJ: Directory of Open Access Journal (DOAJ)
DatabaseTitle CrossRef
Aerospace Database
Engineering Research Database
Technology Research Database
Mechanical & Transportation Engineering Abstracts
Advanced Technologies Database with Aerospace
DatabaseTitleList Aerospace Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Military & Naval Science
EISSN 2399-6447
EndPage 82
ExternalDocumentID oai_doaj_org_article_f2b297b813184a82bb6c5620af2e6ad8
10_1108_JDAL_07_2018_0012
GroupedDBID AAGBP
AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
H13
7TB
8FD
ADBBV
AFKRA
AUCOK
BCNDV
BENPR
CCPQU
EBS
EJD
FR3
GEI
GROUPED_DOAJ
H8D
L7M
OK1
PHGZM
PHGZT
PIMPY
PUEGO
XDTOA
AAFWJ
ABJCF
AFPKN
BGLVJ
M7S
PQGLB
PTHSS
ID FETCH-LOGICAL-c3382-2631443a5043123c7b51bc78e38b1a4022bb97d0895353d337587a64660c40cb3
IEDL.DBID DOA
ISSN 2399-6439
IngestDate Fri Oct 03 12:45:27 EDT 2025
Sat Sep 06 07:30:37 EDT 2025
Sat Nov 29 07:41:29 EST 2025
Tue Nov 18 20:49:49 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License https://www.emerald.com/insight/site-policies
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3382-2631443a5043123c7b51bc78e38b1a4022bb97d0895353d337587a64660c40cb3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://doaj.org/article/f2b297b813184a82bb6c5620af2e6ad8
PQID 2506868992
PQPubID 4931631
PageCount 23
ParticipantIDs doaj_primary_oai_doaj_org_article_f2b297b813184a82bb6c5620af2e6ad8
proquest_journals_2506868992
crossref_citationtrail_10_1108_JDAL_07_2018_0012
crossref_primary_10_1108_JDAL_07_2018_0012
PublicationCentury 2000
PublicationDate 2019-07-09
PublicationDateYYYYMMDD 2019-07-09
PublicationDate_xml – month: 07
  year: 2019
  text: 2019-07-09
  day: 09
PublicationDecade 2010
PublicationPlace Bingley
PublicationPlace_xml – name: Bingley
PublicationTitle Journal of Defense Analytics and Logistics
PublicationYear 2019
Publisher Emerald Group Publishing Limited
Emerald Publishing
Publisher_xml – name: Emerald Group Publishing Limited
– name: Emerald Publishing
References US Joint Chiefs of Staff (key2020021709564530300_ref032) 2017
(key2020021709564530300_ref010) 2012
US Joint Chiefs of Staff (key2020021709564530300_ref030) 2013
(key2020021709564530300_ref002) 2016
key2020021709564530300_ref029
(key2020021709564530300_ref009) 2017
key2020021709564530300_ref028
(key2020021709564530300_ref026) 2012; 9
(key2020021709564530300_ref021) 2016; 5
(key2020021709564530300_ref001) 2009; 36
(key2020021709564530300_ref007) 2011; 38
(key2020021709564530300_ref019) 2004; 156
(key2020021709564530300_ref020) 2018; 97
(key2020021709564530300_ref025) 1988; 12
(key2020021709564530300_ref033) 2015; 2
(key2020021709564530300_ref027) 2013; 21
US Joint Chiefs of Staff (key2020021709564530300_ref031) 2016
(key2020021709564530300_ref014) 2018; 28
(key2020021709564530300_ref018) 2007; 9
(key2020021709564530300_ref015) 2009; 36
(key2020021709564530300_ref036) 2016
(key2020021709564530300_ref035) 2009
(key2020021709564530300_ref016) 2009; 43
(key2020021709564530300_ref011) 2016
(key2020021709564530300_ref006) 2008; 12
(key2020021709564530300_ref012) 2015; 12
(key2020021709564530300_ref024) 2015; 15
(key2020021709564530300_ref008) 2012; 20
(key2020021709564530300_ref017) 2015; 81
(key2020021709564530300_ref034) 2014; 28
(key2020021709564530300_ref013) 2014
(key2020021709564530300_ref005) 2006; 1695
(key2020021709564530300_ref037) 2017; 21
(key2020021709564530300_ref004) 2002; 9
(key2020021709564530300_ref022) 2013; 28
(key2020021709564530300_ref038) 2018; 64
(key2020021709564530300_ref023) 2015; 81
(key2020021709564530300_ref003) 2016
References_xml – volume: 20
  start-page: 609
  issue: 2
  year: 2012
  ident: key2020021709564530300_ref008
  article-title: On new approaches of assessing network vulnerability: hardness and approximation
  publication-title: IEEE/ACM Transactions on Networking
  doi: 10.1109/TNET.2011.2170849
– volume: 28
  start-page: 63
  year: 2013
  ident: key2020021709564530300_ref022
  article-title: Network resilience for transport security: some methodological considerations
  publication-title: Transport Policy
  doi: 10.1016/j.tranpol.2012.09.007
– volume: 97
  start-page: 48
  year: 2018
  ident: key2020021709564530300_ref020
  article-title: Improved formulations for minimum connectivity network interdiction problems
  publication-title: Computers and Operations Research
  doi: 10.1016/j.cor.2018.04.012
– year: 2017
  ident: key2020021709564530300_ref009
  article-title: Data.table: extension of ‘data.frame
– volume: 28
  start-page: 92
  year: 2018
  ident: key2020021709564530300_ref014
  article-title: The critical node detection problem in networks: a survey
  publication-title: Computer Science Review
  doi: 10.1016/j.cosrev.2018.02.002
– volume: 21
  start-page: 5621
  issue: 19
  year: 2017
  ident: key2020021709564530300_ref037
  article-title: Critical node identification for complex network based on a novel minimum connected dominating set
  publication-title: Soft Computing
  doi: 10.1007/s00500-016-2303-y
– volume: 12
  start-page: 234
  year: 2015
  ident: key2020021709564530300_ref012
  article-title: Transportation network vulnerability analysis for the case of a catastrophic earthquake
  publication-title: International Journal of Disaster Risk Reduction
  doi: 10.1016/j.ijdrr.2015.01.009
– volume: 12
  start-page: 133
  issue: 1
  year: 1988
  ident: key2020021709564530300_ref025
  article-title: An historical note: Euler’s Königsberg letters
  publication-title: Journal of Graph Theory
  doi: 10.1002/jgt.3190120114
– ident: key2020021709564530300_ref028
– volume: 64
  issue: 1
  year: 2018
  ident: key2020021709564530300_ref038
  article-title: Route planning for military ground vehicles in road networks under uncertain battlefield environment
  publication-title: Journal of Advanced Transportation
– volume: 12
  start-page: 61
  issue: 1
  year: 2008
  ident: key2020021709564530300_ref006
  article-title: Identifying critical locations in a spatial network with graph theory
  publication-title: Transactions in GIS
  doi: 10.1111/j.1467-9671.2008.01086.x
– year: 2017
  ident: key2020021709564530300_ref032
  article-title: Joint publication 4-01
– volume: 15
  start-page: 397
  issue: 2
  year: 2015
  ident: key2020021709564530300_ref024
  article-title: The evaluation of road network vulnerability in mountainous areas: a case study
  publication-title: Networks and Spatial Economics
  doi: 10.1007/s11067-014-9260-8
– volume: 156
  start-page: 579
  issue: 3
  year: 2004
  ident: key2020021709564530300_ref019
  article-title: A cutting plane algorithm for computing k-edge survivability of a network
  publication-title: European Journal of Operational Research
  doi: 10.1016/S0377-2217(03)00135-8
– volume: 38
  start-page: 1766
  issue: 12
  year: 2011
  ident: key2020021709564530300_ref007
  article-title: Complexity of the critical node problem over trees
  publication-title: Computers and Operations Research
  doi: 10.1016/j.cor.2011.02.016
– volume: 21
  start-page: 963
  issue: 3
  year: 2013
  ident: key2020021709564530300_ref027
  article-title: On the discovery of critical links and nodes for assessing network vulnerability
  publication-title: IEEE/ACM Transactions on Networking
  doi: 10.1109/TNET.2012.2215882
– volume-title: ggplot2: elegant Graphics for Data Analysis
  year: 2009
  ident: key2020021709564530300_ref035
– volume: 9
  start-page: 117
  issue: 2
  year: 2002
  ident: key2020021709564530300_ref004
  article-title: An introduction to road vulnerability: what has been done, is done and should be done
  publication-title: Transport Policy
  doi: 10.1016/S0967-070X(02)00011-2
– volume: 1695
  start-page: 1
  issue: 5
  year: 2006
  ident: key2020021709564530300_ref005
  article-title: The igraph software package for complex network research
  publication-title: InterJournal, Complex Systems
– start-page: 232
  volume-title: 2012 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (ICQR2MSE)
  year: 2012
  ident: key2020021709564530300_ref010
  article-title: Study on travel time reliability of military transportation network
– volume: 43
  start-page: 307
  issue: 2
  year: 2009
  ident: key2020021709564530300_ref016
  article-title: Exploring the vulnerability of network infrastructure to disruption
  publication-title: The Annals of Regional Science
  doi: 10.1007/s00168-008-0235-x
– year: 2016
  ident: key2020021709564530300_ref002
  article-title: Mapdata: extra map databases
– volume: 36
  start-page: 2193
  issue: 7
  year: 2009
  ident: key2020021709564530300_ref001
  article-title: Detecting critical nodes in sparse graphs
  publication-title: Computers and Operations Research
  doi: 10.1016/j.cor.2008.08.016
– volume-title: Statistical Analysis of Network Data with R
  year: 2014
  ident: key2020021709564530300_ref013
– volume: 9
  start-page: 172
  issue: 3
  year: 2012
  ident: key2020021709564530300_ref026
  article-title: Exact interdiction models and algorithms for disconnecting networks via node deletions
  publication-title: Discrete Optimization
  doi: 10.1016/j.disopt.2012.07.001
– volume: 28
  start-page: 233
  issue: 1
  year: 2014
  ident: key2020021709564530300_ref034
  article-title: An integer programming framework for critical elements detection in graphs
  publication-title: Journal of Combinatorial Optimization
  doi: 10.1007/s10878-014-9730-4
– year: 2016
  ident: key2020021709564530300_ref003
  article-title: Maps: draw geographical maps
– volume: 2
  start-page: 6
  issue: 1
  year: 2015
  ident: key2020021709564530300_ref033
  article-title: Efficiently identifying critical nodes in large complex networks
  publication-title: Computational Social Networks
  doi: 10.1186/s40649-015-0010-y
– volume: 81
  start-page: 4
  year: 2015
  ident: key2020021709564530300_ref023
  article-title: Transport resilience and vulnerability: the role of connectivity
  publication-title: Transportation Research Part A: Policy and Practice
– year: 2016
  ident: key2020021709564530300_ref031
  article-title: Joint publication 3-03
– year: 2016
  ident: key2020021709564530300_ref011
  article-title: Geosphere: spherical trigonometry
– ident: key2020021709564530300_ref029
– year: 2016
  ident: key2020021709564530300_ref036
  article-title: Dplyr: a grammar of data manipulation
– volume: 5
  start-page: 1
  issue: 3
  year: 2016
  ident: key2020021709564530300_ref021
  article-title: Heuristic algorithm for identifying critical nodes in graphs
  publication-title: Advances in Computer Science: An International Journal
– year: 2013
  ident: key2020021709564530300_ref030
  article-title: Joint publication 3-35
– volume: 36
  start-page: 16
  issue: 1
  year: 2009
  ident: key2020021709564530300_ref015
  article-title: Modeling s-t path availability to support disaster vulnerability assessment of network infrastructure
  publication-title: Computers and Operations Research
  doi: 10.1016/j.cor.2007.09.004
– volume: 81
  start-page: 16
  year: 2015
  ident: key2020021709564530300_ref017
  article-title: Vulnerability and resilience of transport systems-a discussion of recent research
  publication-title: Transportation Research Part A: Policy and Practice
– volume: 9
  start-page: 103
  issue: 2
  year: 2007
  ident: key2020021709564530300_ref018
  article-title: Critical network infrastructure analysis: interdiction and system flow
  publication-title: Journal of Geographical Systems
  doi: 10.1007/s10109-006-0039-4
SSID ssib044743968
ssib051819139
ssj0002213673
Score 2.1229408
Snippet PurposeThis paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability...
Purpose – This paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the...
SourceID doaj
proquest
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 60
SubjectTerms Algorithms
betweenness
binary integer programming
Cargo
Contingency
Decision making
Flow characteristics
Graph theory
Heuristic methods
heuristics
Logistics
Military
military route vulnerability
Railways
Roads & highways
shortest path
Theater
Threat evaluation
Transportation
Title Assessing the vulnerability of military theater distribution routes
URI https://www.proquest.com/docview/2506868992
https://doaj.org/article/f2b297b813184a82bb6c5620af2e6ad8
Volume 3
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2399-6447
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002213673
  issn: 2399-6439
  databaseCode: DOA
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources (ISSN International Center)
  customDbUrl:
  eissn: 2399-6447
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssib044743968
  issn: 2399-6439
  databaseCode: M~E
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 2399-6447
  dateEnd: 20211231
  omitProxy: false
  ssIdentifier: ssj0002213673
  issn: 2399-6439
  databaseCode: P5Z
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Engineering Database
  customDbUrl:
  eissn: 2399-6447
  dateEnd: 20211231
  omitProxy: false
  ssIdentifier: ssj0002213673
  issn: 2399-6439
  databaseCode: M7S
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2399-6447
  dateEnd: 20211231
  omitProxy: false
  ssIdentifier: ssj0002213673
  issn: 2399-6439
  databaseCode: BENPR
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 2399-6447
  dateEnd: 20211231
  omitProxy: false
  ssIdentifier: ssj0002213673
  issn: 2399-6439
  databaseCode: PIMPY
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEBYhzaGX0uZBtkkXHUoOAROvJOtxzGNDWpLF5AFJL0KSbUhId4OzG8ilv70zsjYPAumlF2NsCdvjkef7pPE3hHxvnJDCVU1WGSdwtkplHjAc7HktGoXdYtWSYzUa6ctLU74o9YU5YZ08cGe4nYZ5ZpTXA3A-4TTzXgaI2blrWC1dFX_zBdTzgkyBJwmBOPsZSBcD5CVJ__Imir6gVBmPleeMyTAspyVPLIvz82D3GOfvIDjqDAHBq6AVtf3ffLpjPDr8TD4lIEl3uwf4Qhbq8TJZP4mi2-0j3aIjB05E09hdIfvd8i5EKgqYjz7MblFvOqbGPtJJQ3_Pe07x81y3tEJJ3VQNi7aTGWDSVXJxODzfP8pSBYUsAPVkGZMcCBN3KFMGISooXwx8ULrm2g8cUEcwp1FVrk3BC15xDuxBOSmkzIPIg-drZHE8GdfrhGosaFQ3ggMkRxEwXzFfOCB7SgZA6LxH8rmJbEjy4ljl4tZGmpFri1a1ubJoVUylYz2y_dTlrtPWeK_xHtr9qSHKYscD4Cw2OYv9l7P0yOb8rdk0Vu8tgECpJfBO9vV_XGODfISbNjGl12ySxWk7q7-RpfAwvb5v--TD3nBUnvaju_Yx0_QMt3-GsC2LX3C-_HFSXv0FpZvpNw
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Assessing+the+vulnerability+of+military+theater+distribution+routes&rft.jtitle=Journal+of+defense+analytics+and+logistics&rft.au=Muckensturm%2C+Joshua+R&rft.au=Longhorn%2C+Dave+C&rft.date=2019-07-09&rft.pub=Emerald+Group+Publishing+Limited&rft.eissn=2399-6447&rft.volume=3&rft.issue=1&rft.spage=60&rft.epage=82&rft_id=info:doi/10.1108%2FJDAL-07-2018-0012&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2399-6439&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2399-6439&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2399-6439&client=summon