Research Article

A Study of Network Violator Interception Based on a Reliable Game Model

Table 1

Interceptor deployment solutions under four disruption scenarios.

   Selected candidate interceptor

   
8, 10, 15
8, 10, 15
9, 10, 15
9, 10, 15
   
8, 9, 10, 15
8, 9, 10, 15
8, 9, 10, 15
9, 10, 15, 16
   
8, 9, 10, 15, 17
8, 9, 10, 15, 17
8, 9, 10, 15, 17
8, 9, 10, 15, 16