=Paper=
{{Paper
|id=Vol-3741/paper72
|storemode=property
|title=Max Flow Vulnerability of Undirected Planar Networks
|pdfUrl=https://ceur-ws.org/Vol-3741/paper72.pdf
|volume=Vol-3741
|authors=Lorenzo Balzotti,Paolo G. Franciosa
|dblpUrl=https://dblp.org/rec/conf/sebd/BalzottiF24
}}
==Max Flow Vulnerability of Undirected Planar Networks==
Max Flow Vulnerability of Undirected Planar Networks Lorenzo Balzotti1,* , Paolo G. Franciosa2 1 Department of Computer, Control, and Management Engineering βAntonio Rubertiβ, Sapienza University of Rome, Via Ariosto 25, 00185, Rome, Italy. 2 Department of Statistical Science, Sapienza University of Rome, p.le Aldo Moro 5, 00185 Rome, Italy. Abstract In the real world, planar networks commonly model utility distribution networks such as gas pipelines, water distribution, cityβs electric grid, and transportation networks like railways and highways. Eval- uating the vulnerability of these networks is crucial on several point of view: in a military context in order to prevent terrorist attack, or for maintenance to prevent wear and tear or natural disasters from inflicting extremely severe damage. This work aims to evaluate the vulnerability of undirected planar network studying the decrease of maximum π π‘-flow when an edge or a vertex is removed, that is, we propose algorithms for computing the max flow vitality of edges and vertices. Our algorithms are applied to real world scenarios, and we prove that high vitality values are well approximated in time close to the time currently required to compute π π‘-max flow π(π log log π). All our algorithms work in π(π) space. Keywords planar networks, undirected networks, max flow, vitality, vulnerability 1. Introduction The design and construction of networks are important topics in todayβs world. Establishing the vulnerability of a network is crucial to prevent severe damage. There is no universal definition of vulnerability, as the same network can be assessed using different metrics, resulting in it being deemed vulnerable or robust depending on the metric used [2, 3]. In this paper, we focus on undirected planar networks and study vulnerability with respect to the maximum flow. Itβs worth noting that planar networks find commonly application in urban science for representing, either directly or with high accuracy, various infrastructure networks [4], as water distribution networks [5, 6] and lots of streets patterns [7, 8]. The cities structure are the subject of many studies [9, 10, 11, 12] based on their planar aspects; see [13, 14] for a complete bibliography. We focus our study on the π π‘-maximum flow vitality, that is the π π‘-max flow decrease when an edge or a vertex is removed, where π and π‘ are two fixed vertices. A practical metric for assessing the overall vulnerability of a network may involve considering the count of SEBD 2024: 32nd Symposium on Advanced Database Systems, June 23-26, 2024, Villasimius, Sardinia, Italy β A preliminary version of this paper appeared in [1]. * Corresponding author. $ lorenzo.balzotti@uniroma1.it (L. Balzotti); paolo.franciosa@uniroma1.it (P. G. Franciosa) 0000-0001-6191-9801 (L. Balzotti); 0000-0002-5464-4069 (P. G. Franciosa) Β© 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR ceur-ws.org Workshop ISSN 1613-0073 Proceedings edges/vertices exhibiting high vitality, that is, elements whose deletion implies serious damage to the π π‘-maximum flow value. Thus, if all edges and vertices have low vitality, the network can be deemed robust. We refer to [15, 16, 17] for surveys on several kind of robustness and vulnerability problems discussed by an algorithmic point of view. In networks algorithms, the effect of edges removal/damage on the max flow value has been studied since 1963, only a few years after the pioneering paper by Ford and Fulkerson [18] in 1956. Wollmer [19] presented an algorithm for determining the most vital edge in a railway network, and other studies about max flow interdiction were carried out on the planar Russian railway [20, 21] reported in Figure 1. According to Schrijver [22], in those year the study of vitality and interdiction on maximum flow problem arose from the US Air Forceβs desire to disrupt the transportation capabilities of their adversaries. Figure 1: An illustrative real-world instance of a planar maximum flow problem is depicted in the schematic diagram of the railway network spanning the Western Soviet Union and Eastern European countries, as presented by Harris and Ross [20]. Ratliff and Sicilia [23] describe an algorithm for the π most vital edges, where the removal of these edge is simultaneous. Wood [24] showed that this problem is NP-hard in the strong sense, while its approximability has been studied in [25, 26]. Other interdiction problems studied in the literature include: shortest paths [27], minimum spanning tree [28, 29, 30], maximum matching [31, 32] and connectivity [33]. Previous work A recent survey on exact π π‘-max flow algorithms can be found in [34]. The best know algorithms for general graphs solve the problem in π(ππ) time [35, 36]. For undirected planar graphs a better result in π(π log log π) is presented by Italiano et al. [37], while for planar directed graphs Borradaile and Klein [38] propose an π(π log π) time algorithm. The easier π π‘-planar case (that is when π and π‘ are in the same face of a planar embedding) is reduced by Hassin [39] to the computation of a single source shortest paths; that can be solved in π(π) time [40]. Finally, Eisenstat and Klein [41] illustrate how to compute the max flow in undirected unweighted planar graphs in optimal π(π) time. There are a few results focused on max flow vitality. In [42] the vitality of each edge and vertex is computed in optimal π(π) time in the π π‘-planar case. The dynamic max flow algorithms presented in [37, 43] allow also to computed edge and vertex vitality for undirected planar graphs, we remind to Theorem 3 for a more in-depth discussion. Our contribution We present fast algorithms for computing an additive guaranteed approxi- mation of the π π‘-max flow vitality for both edges and vertices with capacities below a chosen threshold πΆ. In Section 4 we explain how to use our results in real world scenarios. Let πΊ be an undirected planar graphs, let πΈ(πΊ) and π (πΊ) be its set of edges and vertices, respectively, and let π and π‘ be two fixed vertices. Let us denote by MFπΊ or MF if no confusion arises, its π π‘-max flow. Let π : πΈ(πΊ) β R+ be the edge capacity function, we define the capacity π(π£) of a vertex π£ as the sum of the capacities of all edges incident on π£. Formally, the π π‘-max flow vitality of a set π β (π (πΊ) β {π , π‘}) βͺ πΈ(πΊ), denoted by π£ππ‘(π), corresponds to MFπΊ β MFπΊβπ , where πΊ β π is the graph derived from πΊ by deleting set π. Our main results are summarized in the following two theorems. We show that we can compute an approximated value of both edge and vertex vitalities with an additive error lower than πΏ > 0, where πΏ is an arbitrarily fixed vitality. All our algorithms work in π(π) space. Theorem 1. Let πΊ be a planar graph with positive edge capacities. Then for any πΆ, πΏ > 0, we can compute a value π£ππ‘πΏ (π) β (π£ππ‘(π) β πΏ, π£ππ‘(π)] for each π β πΈ(πΊ) satisfying π(π) β€ πΆ, in π( πΆπΏ π + π log log π) time. Theorem 2. Let πΊ be a planar graph with positive edge capacities. Then for any πΆ, πΏ > 0, we can compute a value π£ππ‘πΏ (π£) β (π£ππ‘(π£) β πΏ, π£ππ‘(π£)] for each π£ β π (πΊ) satisfying π(π£) β€ πΆ, in π( πΆπΏ π + π log π) time. In the full version of the paper [1], results in the cases of integer and bounded capacities and are presented. Those results are obtained thanks to better algorithm for computing distances in these particular cases [44, 45]. In what follows, we focus only on edge vitality, and we refer to the full version for results and approach regarding vertex vitality. Outline Our procedure is split into two parts. We start from the approach introduced by Itai and Shiloachβs [46] for computing the π π‘-max flow in undirected planar graphs, see Section 2. They translate the max flow computation into finding non-crossing shortest paths in graph π·, which is derived from the dual graph of πΊ. We use this construction to prove that edge vitalities can be inferred by knowing some distances in π·, see Proposition 1. In the second part, which is exposed in Section 3, we compute required distances by introducing a divide-and-conquer strategy, which consists in slicing π· via non-crossing shortest paths, see Lemma 1. In Section 4 we apply our results to real world scenario, and in Section 5 conclusions and open problems are presented. 2. From vitalities to distances The first part of our approach is based on the work by Itai and Shiloach [46], that computes the π π‘-maximum flow of πΊ via π π‘-separating cycle in its dual graph πΊ* . They build an auxiliary graph π·πΊ (if no confusion arises, denoted as π·) where the π π‘-separating cycles correspond to non-crossing shortest paths between pairs vertices on the external face of π·. Starting from π·, we explain how computing edge vitalities of πΊ by finding some distances in π·, this is our main result of this section and it is exposed in Proposition 1. Now we describe into details the construction of π· by Itai and Shiloach [46]. We observe that every vertex in πΊ* corresponds to a face in πΊ. In Figure 2 on the left, there is graph πΊ in black continuous edges, and graph πΊ* in red dashed edges. In [46], the authors first fix a shortest path π from π£π * to π£π‘* , where π£π * to π£π‘* are the vertices in πΊ* corresponding to faces in πΊ containing π and π‘, respectively. Without loss of generality, we assume that π = {π£1* , π£2* , . . . , π£π* }, with π£1* = π£π * and π£π* = π£π‘* . Path π is represented in green in Figure 2 on the left. Then they βcutβ πΊ* along π obtaining graph π·πΊ (for convenience we refer to it as graph π·) represented in Figure 2 on the right. They double path π into the paths ππ₯ and ππ¦ , the first has vertices {π₯1 , . . . , π₯π } and the latter {π¦1 , . . . , π¦π }. In order to split the graph πΊ* into two, π has to split the whole plane into two parts. To obtain this, they add two dummy vertices πΌ and π½, and they connect them to π£π * and π£π‘* , respectively. If πΌ is inside the face containing π and π½ inside the face containing π‘, then the edges πΌπ£π * and π½π£π‘* can be extended to the infinity, splitting the whole plane where πΊ* is embedded into two arbitrarily parts π΄ and π΅; without loss of generality we say that π΄ is the part βaboveβ π and π΅ the part βbelowβ π. Now we can explain how to build graph π·. For any π β [π], where [π] = {1, . . . , π}, edges in πΊ* incident on each π£π* from below π are moved to π¦π and edges incident on π£π* from above π are moved to π₯π . For each π* β π in πΊ* , in π· the copy of π* in ππ₯ is denoted by π*π₯ , and the copy of π* in ππ¦ is denoted by π*π¦ . Note that every vertex π£ in πΊ generates a face ππ£* in πΊ* , that still remains a face in π·, still denoted by ππ£* . If π* in πΊ* does not belong to π, then we still denote the corresponding edge in π· by π* . Similarly, if ππ* in πΊ* does not belong to π, then we still denote the corresponding vertex in π· by π£π* (this happens when π > π). * π£β π¦1 π¦2 π¦3 π¦4 π π π π π£1* ππ* π£2* π£5* π π£4* π£7* π£6* πΌ π πβ* π ππ* π½ π£8* ππ* π£3* π£6* π£5* * π‘ π£β ππ* π£8* π£7* ππ* π π ππ* ππ* β π₯1 π₯2 π₯3 π₯4 Figure 2: on the left graph πΊ in black continuous line, πΊ in red dashed lines, shortest path π from π£π * * (π£1* ) to π£π‘* (π£π* ) in green, πΌ and π½ are dummy vertices. On the right graph π·. For π β [π], we define ππ = distπ· (π₯π , π¦π ). Itai and Shiloach [46] proved that MF = minπβ[π] ππ , that is, the π π‘-maximum flow is equal to the minimum π π‘-separating cycle. We observe that the removal of an edge π in πΊ corresponds to contracting vertices of π* in πΊ* into one, and so some ππ βs may be shorten. For this reason, for π* β π (π·) and π β [π] we define ππ (π* ) = min{ππ , distπ· (π₯π , π* ) + distπ· (π¦π , π* )}. Note that ππ (π* ) represents the distance in π· from π₯π to π¦π if all vertices of π* are contracted into one. For π β πΈ(πΊ) we define MFπ as the π π‘-maximum flow in graph πΊ β π. It follows that π£ππ‘(π) = MF β MFπ and, trivially, π£ππ‘(π) > 0 if and only if MFπ < MF. In the following proposition we translate the problem of computing edge vitality in πΊ into computing distances in π·. * * * * {οΈ π of πΊ, if* π ΜΈβ π* in}οΈπΊ , then MFπ = minπβ[π] {ππ (π )}. If π β π Proposition 1. For every edge * in πΊ , then MFπ = minπβ[π] min{ππ (ππ₯ ), ππ (ππ¦ )} . 3. Divide-and-conquer strategy In this section we explain our divide-and-conquer strategy that leads to Lemma 1, which is the key to derive Theorem 1. We slice graph π· along shortest non-crossing π₯π π¦π βs paths. From now on, for π β [π] we fix a shortest π₯π π¦π path ππ , and we consider that {ππ }πβ[π] is a set of pairwise single-touch non-crossing shortest paths, where two paths are single-touch if their intersection is still a path. All the ππ βs can be computed in π(π log log π) time by the algorithm in [37], and βοΈ their lengths in π(π) time by the algorithm in [44]. Let π = πβ[π] ππ , see Figure 3(a). The single-touch property assures us that π is a forest. Given an ππ path π and a ππ path π, we define π β π as the (possibly not simple) ππ path obtained by the union of π and π. Each ππ βs splits π· into two parts as shown in the following definition and in Figure 3(b). Definition 1. For every π β [π], we define Leftπ as the subgraph of π· bounded by the cycle ππ¦ [π¦1 , π¦π ] β ππ β ππ₯ [π₯π , π₯1 ] β π, where π is the leftmost π₯1 π¦1 path in π·. Similarly, we define Rightπ as the subgraph of π· bounded by the cycle ππ¦ [π¦π , π¦π ] β π β ππ₯ [π₯π , π₯π ] β ππ , where π is the rightmost π₯π π¦π path in π·. π¦1 π¦2 π¦ π¦ π¦ π¦6 π¦7 π¦8 π¦1 π¦π π¦1 π¦π π¦π 3 4 5 π¦π π¦π Leftπ Rightπ Ξ©π,π π₯1 π₯2 π₯ π₯ π₯5 π₯6 π₯7 π₯8 π₯1 π₯π π₯1 π₯π π₯π 3 4 π₯π π₯π (a) (b) (c) Figure 3: in (a) the graph π in bold and in (b) subgraphs Leftπ and Rightπ are highlighted. In (c) subgraph Ξ©π,π , for some π < π. Based on Definition 1, for every π, π β [π], with π < π, we define Ξ©π,π = Rightπ β© Leftπ , see Figure 3(c). Our divide-and-conquer strategy is based on these slices Ξ©π,π . Now we have to bucket the indices {1, 2, . . . , π} so that these slices have some special distance properties. For every π β N, we define πΏπ = (βπ1 , . . . , βππ§π ) as the ordered list of indices in [π] such that ππ β [MF + πΏπ, MF + πΏ(π + 1)), for all π β πΏπ , and βππ < βππ+1 for all π β [π§π β 1]. If no confusion arises, we omit the superscript π; thus we write βπ in place of βππ . Now we can formulate properly our slicing strategy in the following lemma. Indeed, we note that every edge in π· is always contained in a slice. The following lemma is the key of our slicing strategy. In particular, Lemma 1 can be applied for computing distances required in Proposition 1. Lemma 1. Let π > 0 and let πΏπ = (β1 , β2 , . . . , βπ§ ). Let π* be a vertex in π· and let π β [π§ β 1] satisfy π* β Ξ©βπ ,βπ+1 . Then min πβ (π* ) > min{πβπ (π* ), πβπ+1 (π* )} β πΏ. ββπΏπ Moreover, if π* β Leftβ1 (resp., π* β Rightβπ§ ) then minββπΏπ πβ (π* ) > πβ1 (π* ) β πΏ (resp., minββπΏπ πβ (π* ) > πβπ§ (π* ) β πΏ). An application of Lemma 1 is in Figure 4. By Proposition 1, we need ππ (π* ) for all π β [π] and consider the minimum value. This can be obtained by 2π SSSP instances in π· (one with source π₯π and one with source π¦π for every π β [π]). But we can compute minββπΏπ πβ (π* ) with only 4 SSSP instances focused on the slice of the graph π· containing π* ; in a way, we obtain the minimum among more indices by paying the additive error πΏ. In Figure 4, it holds minββπΏπ πβ (π* ) β₯ min{πβ3 (π* ), πβ4 (π* )} β πΏ. π¦ β1 π¦β3 π¦β4 π¦βπ§β1 π¦βπ§ π¦ β2 Ξ©β2 ,β3 Ξ©β1 ,β2 Ξ©β3 ,β4 Ξ©βπ§β1 ,βπ§ * π Ξ©β2 ,β3 π₯ β1 π₯βπ§β1 π₯βπ§ π₯ β3 π₯ β4 π₯ β2 Figure 4: by Lemma 1, it holds that minββπΏπ πβ (π* ) β₯ min{πβ3 (π* ), πβ4 (π* )} β πΏ. In the full version of this work [1] it is proved how to easily derive Theorem 1 from Lemma 1, moreover, the discussion is extended to vertex vitality, see Theorem 2. 4. Practical utilization in real world scenario In this section we explain how to use the results stated in Theorem 1 and Theorem 2 to real world scenario. In particular we describe how to determine πΆ and πΏ according to the distribution of edge capacities. Note that in real world applications one is usually interested in determining edge and/or vertices with high vitality, that is, edge or vertices whose deletion implies serious damage to the π π‘-maximum flow value. This is strictly linked to evaluating the robustness/vulnerability of the network. Before arguing with our theorems, we report here the best algorithm for computing edge vitalities stated in [37, 43]. Theorem 3 ([37, 43]). Let πΊ be a planar graph with positive edge capacities. Then it is possible to βπ compute the vitality of β single edges or the vitality of a set of β edges in π(min{ log π +π log log π, βπ2/3 log8/3 π + π log π}) time. We underline that the previous algorithm can compute the exact vitality of β edges, but in order to obtain information about all edges, we need to apply it with β = π. Returning to the discussion of our theorems, we observe that the capacities may be not bounded by any function of π. Despite this, we now introduce some procedures to make πΆ/πΏ constant. In this way, the time complexity of Theorem 1 becomes π(π log log π), that is the best current time bound for computing the π π‘-max flow [37]. Letβs start with the following crucial remark, where ππππ₯ = maxπβπΈ(πΊ) π(π). Remark 1. [Bounding capacities]. We can bound all edge capacities higher than MF to MF, obtaining a new bounded edge capacity function. This change has no impact on the π π‘-max flow value or the vitality of any edge/vertex. Thus w.l.o.g., we can assume that ππππ₯ β€ MF. After Remark 1, from now on we assume that ππππ₯ β€ MF. We apply the result in Theorem 1 to two real world scenarios. In the first scenario we assume that the distribution of capacities is general, i.e., there is no function that relates a capacity value to the number of edges having that capacity value. In the second scenario we study what happens when the distribution of edge capacities can be described by a power-law; but actually, this can be applied in every case there are few edges (outlier) with high capacity. Take into account that the power-law distribution is very common in real world planar networks, especially in distribution networks. In Figure 5 we outline the following discussion. The figure shows how to determine constants πΆ and πΏ in two different scenarios (the edge capacities are synthetic). (a) (b) Figure 5: how to determine optimal πΆ and πΏ according to the distribution of edge capacities. β General distribution. In this case we can set πΆ = ππππ₯ and πΏ = πΆ/π, for some small constant π, e.g., π = 10, 50, 100. So we have a good approximation of edges with high vitality. Indeed, if an edge has vitality comparable with MF, then we obtain its vitality with an additive error smaller than MF/π (because of Remark 1). On the other hand, we have a bad approximation for edges with low capacity; in Figure 5(a) they correspond to edges on the left of the green line. This is not a problem because βsmall capacityβ corresponds to βsmall vitalityβ, indeed the vitality of an edge is at most its capacity. With this settings the time complexity stated in Theorem 1 becomes π(π log log π), that is the time currently required for the computation of the π π‘-max flow. β Power-law distribution. We cannot apply the same reasoning to the previous case, in fact if we choose πΆ = ππππ₯ and πΏ = πΆ/π for small constant π, then we obtain a bad approximation of all edges on the left of the red line in Figure 5(b). They are absolutely the majority of edges. So we set πΆ = ππππ₯ /π and πΏ = πΆ/β, for some constant β, and we compute the (exact) vitality of edges whose capacity is greater than πΆ via Theorem 3. Note that this set of edges is small because of the power law distribution of capacities. The vitality of edges computed by our algorithm has an additive error smaller than MF πβ , because of Remark 1; it may be an acceptable error even for small values of π and β. Also in this case, the overall time complexity is equal or close to π(π log log π). Since our algorithms provide approximate vitalities with an additive error, it is possible having as output π£ππ‘πΏ (π) = 0 for each π β πΈ(πΊ). At first sight, it may appear as an useless result, but actually we verify the robustness of the network because all edges have vitality smaller than πΏ. The same reasoning can be applied also to vertex vitality, and consequently to Theorem 2 by observing that in a real-world planar network there are usually a few vertices with high degree (as also implied by Eulerβs formula). We conclude by a fast comparison among our results and the algorithm stated in Theorem 3. Itβs clear that we compute approximated vitalities while Theorem 3 allows to compute exact vitality, but if one is interested in understanding the robustness/vulnerability of the network, then it is necessary to evaluate the vitality (exact or approximated) of all edges and/or all vertices. Our algorithms obtain this in a time equal o close to π(π log log π), while we need π(π5/3 log8/2 π) time by using the result in Theorem 3. Hence our results provide considerably faster algorithms. 5. Conclusions and open problems We describe fast algorithms for computing an additive guaranteed approximation of the π π‘-max flow vitality of both edges and vertices in undirected planar networks. The vulnerability of real world planar networks can be established via our algorithms under various edge capacity distributions. We left open the problem of computing the exact vitality of all edges and vertices in the same time required for computing the max flow value, as is already known for the π π‘-planar case. References [1] L. Balzotti, P. G. Franciosa, How vulnerable is an undirected planar graph with respect to max flow, Networks 83 (2024) 570β586. doi:https://doi.org/10.1002/net.22205. [2] S. Freitas, D. Yang, S. Kumar, H. Tong, D. H. Chau, Graph vulnerability and robustness: A survey, IEEE Transactions on Knowledge and Data Engineering 35 (2023) 5915β5934. doi:10.1109/TKDE.2022.3163672. [3] H. V. Nath, Vulnerability assessment methods β a review, in: D. C. Wyld, M. Wozniak, N. Chaki, N. Meghanathan, D. Nagamalai (Eds.), Advances in Network Security and Applications, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011, pp. 1β10. doi:10.1007/ 978-3-642-22540-6_1. [4] M. BarthΓ©lemy, Spatial networks, Physics Reports 499 (2011) 1β101. doi:https://doi. org/10.1016/j.physrep.2010.11.002. [5] V. Chauhan, Planar Graph Generation with Application to Water Distribution Networks, Ph.D. thesis, Clemson University, 2018. [6] M. Herrera, E. Abraham, I. Stoianov, A Graph-Theoretic Framework for Assessing the Resilience of Sectorised Water Distribution Networks, Water Resources Management 30 (2016) 1685β1699. doi:10.1007/s11269-016-1245-6. [7] S. Marshall, Streets and Patterns, Routledge, 2004. doi:10.4324/9780203589397. [8] M. Southworth, E. Ben-Joseph, Streets and the Shaping of Towns and Cities, Island Press, 2013. [9] M. BarthΓ©lemy, A. Flammini, Modeling Urban Street Patterns, Phys. Rev. Lett. 100 (2008) 138702. doi:10.1103/PhysRevLett.100.138702. [10] J. Buhl, J. Gautrais, N. Reeves, R. V. SolΓ©, S. Valverde, P. Kuntz, G. Theraulaz, Topological patterns in street networks of self-organized urban settlements, The European Physical Journal B-Condensed Matter and Complex Systems 49 (2006) 513β522. doi:10.1140/ epjb/e2006-00085-1. [11] A. Cardillo, S. Scellato, V. Latora, S. Porta, Structural properties of planar graphs of urban street patterns, Phys. Rev. E 73 (2006) 066107. doi:10.1103/PhysRevE.73.066107. [12] A. P. Masucci, D. Smith, A. Crooks, M. Batty, Random planar graphs and the London street network, The European Physical Journal B 71 (2009) 259β271. doi:10.1140/epjb/ e2009-00290-4. [13] G. Boeing, A multi-scale analysis of 27,000 urban street networks: Every us city, town, urbanized area, and zillow neighborhood, Environment and Planning B: Urban Analytics and City Science 47 (2020) 590β608. doi:10.1177/2399808318784595. [14] M. P. Viana, E. Strano, P. Bordin, M. Barthelemy, The simplicity of planar networks, Scientific reports 3 (2013) 3495. doi:10.1038/srep03495. [15] D. L. Alderson, G. G. Brown, W. M. Carlyle, L. A. Cox Jr, Sometimes There Is No βMost-Vitalβ Arc: Assessing and Improving the Operational Resilience of Systems, Military Operations Research 18 (2013) 21β37. [16] L.-G. Mattsson, E. Jenelius, Vulnerability and resilience of transport systems β a discussion of recent research, Transportation Research Part A: Policy and Practice 81 (2015) 16β34. doi:https://doi.org/10.1016/j.tra.2015.06.002, resilience of Networks. [17] A. T. Murray, An overview of network vulnerability modeling approaches, GeoJournal 78 (2013) 209β221. doi:http://dx.doi.org/10.1007/s10708-011-9412-z. [18] L. R. Ford, D. R. Fulkerson, Maximal Flow Through a Network, Canadian journal of Math- ematics 8 (1956) 399β404. doi:http://dx.doi.org/10.1007/978-0-8176-4842-8_ 15. [19] R. D. Wollmer, Some Methods for Determining the Most Vital Link in a Railway Network, Rand Corporation, 1963. [20] T. Harris, F. Ross, Fundamentals of a Method for Evaluating Rail Net Capacities, Technical Report, Rand Corporation, 1955. [21] A. W. McMasters, T. M. Mustin, Optimal Interdiction of a Supply Network, Naval Research Logistics Quarterly 17 (1970) 261β268. doi:http://dx.doi.org/10.1002/ nav.3800170302. [22] A. Schrijver, On the history of the transportation and maximum flow problems, Mathematical programming 91 (2002) 437β445. doi:http://dx.doi.org/10.1007/ s101070100259. [23] H. D. Ratliff, G. T. Sicilia, S. Lubore, Finding the n Most Vital Links in Flow Networks, Management Science 21 (1975) 531β539. doi:http://dx.doi.org/10.1287/mnsc.21. 5.531. [24] R. K. Wood, Deterministic Network Interdiction, Mathematical and Computer Modelling 17 (1993) 1β18. doi:http://dx.doi.org/10.1016/0895-7177(93)90236-R. [25] D. S. Altner, Γ. Ergun, N. A. Uhan, The Maximum Flow Network Interdiction Problem: Valid Inequalities, Integrality Gaps, and Approximability, Operations Research Letters 38 (2010) 33β38. doi:10.1016/j.orl.2009.09.013. [26] C. A. Phillips, The Network Inhibition Problem, in: Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, ACM, 1993, pp. 776β785. doi:10. 1145/167088.167286. [27] E. Israeli, R. K. Wood, Shortest-path network interdiction, Networks 40 (2002) 97β111. doi:https://doi.org/10.1002/net.10039. [28] L.-H. Hsu, R.-H. Jan, Y.-C. Lee, C.-N. Hung, M.-S. Chern, Finding the most vital edge with respect to minimum spanning tree in weighted graphs, Information Processing Letters 39 (1991) 277β281. doi:https://doi.org/10.1016/0020-0190(91)90028-G. [29] L.-H. Hsu, P.-F. Wang, C.-T. Wu, Parallel algorithms for finding the most vital edge with respect to minimum spanning tree, Parallel Computing 18 (1992) 1143β1155. doi:https: //doi.org/10.1016/0167-8191(92)90061-B. [30] S. Banerjee, S. Saxena, Parallel algorithm for finding the most vital edge in weighted graphs, Journal of Parallel and Distributed Computing 46 (1997) 101β104. doi:https: //doi.org/10.1006/jpdc.1997.1383. [31] R. Zenklusen, Matching interdiction, Discrete Applied Mathematics 158 (2010) 1676β1690. doi:https://doi.org/10.1016/j.dam.2010.06.006. [32] M. Dinitz, A. Gupta, Packing interdiction and partial covering problems, in: M. Goemans, J. Correa (Eds.), Integer Programming and Combinatorial Optimization, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 157β168. doi:http://dx.doi.org/10.1007/ 978-3-642-36694-9_14. [33] R. Zenklusen, Connectivity interdiction, Operations Research Letters 42 (2014) 450β454. doi:https://doi.org/10.1016/j.orl.2014.07.010. [34] O. Cruz-MejΓa, A. N. Letchford, A survey on exact algorithms for the maximum flow and minimum-cost flow problems, Networks 82 (2023) 167β176. doi:https://doi.org/ 10.1002/net.22169. [35] R. K. Ahuja, T. L. Magnanti, J. B. Orlin, Network Flows (1988). [36] R. K. Ahuja, T. L. Magnanti, J. B. Orlin, M. Reddy, Applications of Network Optimization, Handbooks in Operations Research and Management Science 7 (1995) 1β83. [37] G. F. Italiano, Y. Nussbaum, P. Sankowski, C. Wulff-Nilsen, Improved Algorithms for Min Cut and Max Flow in Undirected Planar Graphs, in: Proceedings of the 43rd ACM Symposium on Theory of Computing, ACM, 2011, pp. 313β322. doi:10.1145/1993636. 1993679. [38] G. Borradaile, P. N. Klein, An π(π log π) Algorithm for Maximum st-Flow in a Directed Planar Graph, Journal of the ACM 56 (2009) 9:1β9:30. doi:10.1145/1502793.1502798. [39] R. Hassin, Maximum Flow in (s,t) Planar Networks, Information Processing Letters 13 (1981) 107. doi:10.1016/0020-0190(81)90120-4. [40] M. R. Henzinger, P. N. Klein, S. Rao, S. Subramanian, Faster Shortest-Path Algorithms for Planar Graphs, Journal of Computer and System Sciences 55 (1997) 3β23. doi:10.1006/ jcss.1997.1493. [41] D. Eisenstat, P. N. Klein, Linear-Time Algorithms for Max Flow and Multiple-Source Shortest Paths in Unit-Weight Planar Graphs, in: Symposium on Theory of Computing Conference, STOCβ13, ACM, 2013, pp. 735β744. doi:10.1145/2488608.2488702. [42] G. Ausiello, P. G. Franciosa, I. Lari, A. Ribichini, Max flow vitality in general and st-planar graphs, Networks 74 (2019) 70β78. doi:10.1002/net.21878. [43] J. ΕΔ cki, P. Sankowski, Min-Cuts and Shortest Cycles in Planar Graphs in π(π log log π) Time, in: Algorithms - ESA 2011 - 19th Annual European Symposium, Proceedings, volume 6942 of Lecture Notes in Computer Science, Springer, 2011, pp. 155β166. doi:10. 1007/978-3-642-23719-5\_14. [44] L. Balzotti, P. G. Franciosa, Non-Crossing Shortest Paths in Undirected Unweighted Planar Graphs in Linear Time, Journal of Graph Algorithms and Applications 26 (2022) 589β606. doi:10.7155/jgaa.00610. [45] L. Kowalik, M. Kurowski, Short Path Queries in Planar Graphs in Constant Time, in: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, ACM, 2003, pp. 143β148. doi:10.1145/780542.780565. [46] A. Itai, Y. Shiloach, Maximum Flow in Planar Networks, SIAM Journal on Computing 8 (1979) 135β150. doi:10.1137/0208012.