This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Cops and Attacking Robbers with Cycle Constraints

Alexander Clow Department of Mathematics, Simon Fraser University [email protected] Melissa A. Huggan Department of Mathematics, Vancouver Island University [email protected]  and  M.E. Messinger Department of Mathematics and Computer Science, Mount Allison University [email protected]
Abstract.

This paper considers the Cops and Attacking Robbers game, a variant of Cops and Robbers, where the robber is empowered to attack a cop in the same way a cop can capture the robber. In a graph GG, the number of cops required to capture a robber in the Cops and Attacking Robbers game is denoted by cc(G)\operatorname{cc}(G). We characterise the triangle-free graphs GG with cc(G)2\operatorname{cc}(G)\leq 2 via a natural generalisation of the cop-win characterisation by Nowakowski and Winkler [18]. We also prove that all bipartite planar graphs GG have cc(G)4\operatorname{cc}(G)\leq 4 and show this is tight by constructing a bipartite planar graph GG with cc(G)=4\operatorname{cc}(G)=4. Finally we construct 1717 non-isomorphic graphs HH of order 5858 with cc(H)=6\operatorname{cc}(H)=6 and c(H)=3\operatorname{c}(H)=3. This provides the first example of a graph HH with cc(H)c(H)3\operatorname{cc}(H)-\operatorname{c}(H)\geq 3 extending work by Bonato, Finbow, Gordinowicz, Haidar, Kinnersley, Mitsche, Prałat, and Stacho [6]. We conclude with a list of conjectures and open problems.

1. Introduction

Cops and Robbers is a two-player game played on a reflexive graph G=(V,E)G=(V,E). To begin the game, the cop player places kk cops onto vertices of the graph, then the robber player chooses a vertex to place the robber. Game play proceeds in rounds: in each round, the cop player has a turn and then the robber player has a turn. During the cop player’s turn, the cops each move to an adjacent vertex. Similarly, on the robber player’s turn, the robber moves to an adjacent vertex. As the graph is reflexive, there is a loop at each vertex and a cop or robber may traverse a loop during their turn. In this paper, we equate such a move with passing. The cop player wins if there is a cop strategy in which after finitely many moves, a cop can move onto the vertex currently occupied by the robber, thereby capturing the robber. The robber player wins if there exists a robber strategy by which the robber can evade capture indefinitely. Both players are assumed to play optimally. The least number of cops required for the cop player to win, regardless of the robber’s strategy, is the cop number of a graph, denoted c(G)c(G) for a graph GG. If kk cops are sufficient to capture the robber, then the cop player has a winning cop strategy and c(G)kc(G)\leq k. If kk cops are also necessary for capture, then c(G)=kc(G)=k.

Cops and Robbers was introduced by Nowakowski and Winkler [18], and independently by Quilliot [20], with the cop number being later introduced by Aigner and Fromme [2]. Over the last 40 years Cops and Robbers has been extensively studied. In particular, the cop number of planar graphs [2] and graphs of large girth [9, 12, 16] have been studied and provide motivation for our research directions. There are a number of variants of the Cops and Robbers game within the literature, some of which affect the power dynamics between the cop player and the robber player. We recommend [7] for a general reference for Cops and Robbers and [5] for a general pursuit-evasion game reference which includes more game variants.

The focus of this paper is the variant known as Cops and Attacking Robbers. Introduced by Bonato, Finbow, Gordinowicz, Haidar, Kinnersley, Mitsche, Prałat, and Stacho [6], Cops and Attacking Robbers is played in exactly the same way as Cops and Robbers, with the added mechanic that if the robber moves onto the vertex occupied by a cop CC, then cop CC is removed from the game. This mechanic is called attacking, and we say that such a robber attacks CC. Importantly, the robber can only attack one cop per turn, so if the robber moves to a vertex occupied by two or more cops, then only one cop is attacked and removed. We assume both players play optimally. The attacking cop number of GG, denoted cc(G)\operatorname{cc}(G), is the least integer kk such that there is a cop strategy in the Cops and Attacking Robbers game, whereby kk cops can win on graph GG, regardless the robber’s strategy. An important caveat is that if the robber begins the game on the same vertex as a cop, this does not count as attacking the cop. We suppose all graphs are finite, reflexive and connected, although we will not draw loops in figures. To gain some intuition we recommend readers verify the cop number and attacking cop number of the graphs in Figure 1.

Figure 1. The graph P4P_{4} (left), C7C_{7} (middle), and GG (right). We note that c(P4)=1=c(G)\operatorname{c}(P_{4})=1=\operatorname{c}(G) and c(C7)=2\operatorname{c}(C_{7})=2, while cc(G)=1\operatorname{cc}(G)=1, cc(P4)=2\operatorname{cc}(P_{4})=2, and cc(C7)=3\operatorname{cc}(C_{7})=3.

Notice that there are relationships between the attacking cop number and other graph parameters. First, we point out that the attacking cop number is bounded above by the domination number. If the cops begin on a dominating set, then they can capture the robber on their first turn.

Observation 1.1 ([6]).

For all graphs GG, we have that cc(G)γ(G)\operatorname{cc}(G)\leq\gamma(G).

Next, we observe that the attacking cop number is at most twice the cop number: we simply “double-up” cops and follow a winning cop strategy from the classical game of Cops and Robbers. Suppose cops C1C_{1} and C2C_{2} always occupy the same vertex as each other. If the robber attacks C1C_{1}, then C2C_{2} will capture the robber on the next cop turn. In this case, C2C_{2} acts as a “backup” cop to C1C_{1}. More generally, a backup cop is a cop, CjC_{j}, who stays within distance one of another cop, CiC_{i}. If CiC_{i} is attacked during round tt, then as CjC_{j} is occupying a vertex in the closed neighbourhood of CiC_{i}, they capture the robber during round t+1t+1. An immediate lower bound is the cop number of the graph: giving additional power to the robber only makes the situation worse for the cops.

Observation 1.2 ([6]).

For all graphs GG, we have that c(G)cc(G)2c(G)\operatorname{c}(G)\leq\operatorname{cc}(G)\leq 2\operatorname{c}(G).

See [3, 6, 15] for examples of graphs GG for which cc(G)c(G)+1cc(G)\leq c(G)+1. However, this inequality is not true in general. The line graph of the Peterson graph has cop number 22 and attacking cop number 44 [6]. Bonato et al. [6] only provided this one example where the attacking cop number and the cop number differ by more than one. Hence, there exist graphs GG for which cc(G)c(G)>1\operatorname{cc}(G)-\operatorname{c}(G)>1, and their example gives a difference of two. It remains unknown if for every integer k3k\geq 3 there exists a graph GG, such that cc(G)c(G)k\operatorname{cc}(G)-\operatorname{c}(G)\geq k. We believe it to be true. In support of this conjecture, we construct graphs HH for which cc(H)c(H)3\operatorname{cc}(H)-\operatorname{c}(H)\geq 3 in Section 4. In fact, we construct 1717 graphs HH where cc(H)=2c(H)=6\operatorname{cc}(H)=2\operatorname{c}(H)=6. A full list of these graphs HH can be found on GitHub [13]. We note that these 1717 graphs, H1,,H17H_{1},\dots,H_{17} are chosen from a family of 1818 candidate graphs, and we were unable to determine the value of cc(H18)c(H18)\operatorname{cc}(H_{18})-\operatorname{c}(H_{18}), where H18H_{18} is the final candidate graph.

Throughout the rest of the paper, we introduce new definitions as required. The paper is structured as follows. In Section 2, we characterise the triangle-free graphs with attacking cop number 22. In Section 3, we consider planar graphs. It was shown in [6] that outerplanar graphs have attacking cop number at most 33, so we begin by characterising outerplanar graphs with attacking cop number 22. Next, we provide a bipartite planar graph with attacking cop number 44, before proving that all bipartite planar graphs have attacking cop number at most 44. Our proof is similar to the proof that three cops can capture a robber on a planar graph in the classical game of Cops and Robbers, first proven in [2]. With respect to general planar graphs, determining an upper bound for the attacking cop number is more challenging than the cop number because we face the added complexity that shortest paths need not be 11-guardable in Cops and Attacking Robbers [6], unlike in classical Cops and Robbers. Section 4 is devoted to constructing graphs HH with cc(H)c(H)3\operatorname{cc}(H)-\operatorname{c}(H)\geq 3. In fact, we prove the stronger result that there exist graphs HH with c(H)=3\operatorname{c}(H)=3, such that cc(H)=2c(H)=6\operatorname{cc}(H)=2\operatorname{c}(H)=6. These proofs use a combination of computer assistance and constructions which leverage the existence of certain regular graphs of large girth. We conclude with several conjectures and open questions for future work.

2. Triangle-Free Graphs with cc(G)2\operatorname{cc}(G)\leq 2.

The goal of this section is to characterise the triangle-free graphs with attacking cop number 22. We give our characterisation in Theorem 2.4. Before getting to this result, we need a few definitions and lemmas.

Let GG be a graph on nn vertices. In [14] Dahlhaus et al. define vertex vv to dominate vertex uu whenever N(u)N[v]N(u)\subseteq N[v] holds; and they further define an ordering v1,v2,,vnv_{1},v_{2},\dots,v_{n} of the vertices of GG to be a domination elimination ordering if for every 1i<n1\leq i<n, there exists ji>ij_{i}>i such that vjiv_{j_{i}} dominates viv_{i} in GSi1G-S_{i-1}, where Si1=(v1,,vi1)S_{i-1}=(v_{1},\dots,v_{i-1}) for i>1i>1, and S0=S_{0}=\emptyset. For k{1,,n}k\in\{1,\dots,n\}, we define an ordering Sk=(v1,v2,,vk)S_{k}=(v_{1},v_{2},\dots,v_{k}) of a subset of vertices of GG to be a k-partial domination elimination ordering of GG if for every 1i<k1\leq i<k, there exists ji>ij_{i}>i such that vjiv_{j_{i}} dominates viv_{i} in GSi1G-S_{i-1}, where Si1=(v1,,vi1)S_{i-1}=(v_{1},\dots,v_{i-1}) for i>1i>1, and S0=S_{0}=\emptyset. Observe that an nn-partial domination elimination ordering coincides with the definition of a domination elimination ordering.

We are now prepared to work toward proving a characterisation of triangle-free graphs with attacking cop number 22. We begin by restating the characterisation of graphs with attacking cop number 11.

Observation 2.1 ([6]).

A graph GG has cc(G)=1\operatorname{cc}(G)=1 if and only if γ(G)=1\gamma(G)=1.

As a starting point, to better understand how to characterise graphs with attacking cop number 2, we consider tandem-cops. Introduced in [11], two cops must be within distance one of each other after each move with the caveat that they are allowed to move along the sides of a 44-cycle. The two cops therefore move in “tandem” and if they can capture a robber on graph GG, then GG is said to be tandem-win. Certainly, if a graph GG is tandem-win and γ(G)1\gamma(G)\neq 1, then cc(G)=2\operatorname{cc}(G)=2. It is known from [11] that a triangle-free graph is tandem-win if and only if it has a domination elimination ordering. However, there exist triangle-free graphs that have attacking cop number 22 and are not tandem-win. As a simple example, let HH be the graph obtained by subdividing each edge of K1,nK_{1,n} twice and then merging the leaves to a single vertex. As γ(H)=2\gamma(H)=2, we have cc(H)=2\operatorname{cc}(H)=2.

Consequently, we require more than the tandem-win result from [11] to characterise triangle-free graphs with attacking cop number 22. First, we consider what happens when a triangle-free graph contains a dominated vertex. We note that our assumption of the graph being triangle-free is necessary for the following lemma.

Lemma 2.2.

Let G=(V,E)G=(V,E) be a triangle-free graph with cc(G)2\operatorname{cc}(G)\geq 2. If uVu\in V is a dominated vertex in GG and γ(Gu)2\gamma(G-u)\geq 2, then cc(Gu)=cc(G)\operatorname{cc}(G-u)=\operatorname{cc}(G).

Proof.

Let G=(V,E)G=(V,E) be a triangle-free graph with cc(G)=k2\operatorname{cc}(G)=k\geq 2 and let u,vVu,v\in V such that N(u)N[v]N(u)\subseteq N[v]. We let f:V{u}Vf:V\setminus\{u\}\rightarrow V be the identity map f(x)=xf(x)=x for all xV{u}x\in V\setminus\{u\}. Note that ff is an injective graph homomorphism, that is if (x,y)E(Gu)(x,y)\in E(G-u), then (f(x),f(y))E(f(x),f(y))\in E. We begin by arguing that a winning cop strategy in GG can be modified to form a winning cop strategy in GuG-u.

Consider a game of Cops and Attacking Robbers played on GuG-u with k=cc(G)k=\operatorname{cc}(G) cops. Let the cops playing in GuG-u be C1,,CkC_{1},\dots,C_{k}, and identify each cop with the vertex they currently occupy and do the same with the robber RR. We will mirror this game on GG by placing cop CiC^{\prime}_{i} on vertex f(Ci)f(C_{i}) for all i[k]i\in[k] and placing the robber RR^{\prime} on vertex f(R)f(R). As ff is a graph homomorphism, if a cop or robber moves in GuG-u from xx to yy, then the corresponding cop or robber in GG can move from f(x)f(x) to f(y)f(y), and as ff is injective and GuG-u is an induced subgraph of GG as long as x,yV{u}x,y\in V\setminus\{u\}, then the converse is also true. For each move that the robber RR makes in GuG-u from xx to yy, let the robber, RR^{\prime}, in GG move from f(x)f(x) to f(y)f(y). Then let the cops C1,,CkC^{\prime}_{1},\dots,C^{\prime}_{k} respond in GG using their winning strategy. Notice that as N(u)N[v]N(u)\subseteq N[v], the cops never need to move onto uu when playing optimally in GG except to capture the robber on uu. We suppose without loss of generality that cop CiC^{\prime}_{i} never moves to uu except to capture the robber on uu. Given this, if cop CiC^{\prime}_{i} moved from f(x)f(x) to f(y)f(y) let the cop CiC_{i} move from xx to yy in GuG-u. This process is well-defined as ff is injective and for all xux\neq u, xV{u}x\in V\setminus\{u\}.

As cc(G)=k\operatorname{cc}(G)=k after finitely many moves the cops in GG will capture the robber RR^{\prime}. Given f(R)=Rf(R)=R^{\prime}, this implies the cops in GuG-u have also captured the robber in GuG-u. Hence, cc(Gu)cc(G)\operatorname{cc}(G-u)\leq\operatorname{cc}(G).

Now suppose that cc(Gu)=t\operatorname{cc}(G-u)=t. By Observation 2.1 our assumption that γ(Gu)2\gamma(G-u)\geq 2 implies that t2t\geq 2. We proceed by a similar argument except now each cop CiC_{i} is following their winning strategy in GuG-u to catch the robber R=f1(R)R=f^{-1}(R^{\prime}) where we extend f1f^{-1} to include that f1(u)=vf^{-1}(u)=v and allow the robber RR^{\prime} to pursue their optimal strategy in GG. As cc(Gu)=t\operatorname{cc}(G-u)=t, after finitely many moves the cops in GuG-u will catch the robber R=f1(R)R=f^{-1}(R^{\prime}). Then the cops have captured the robber in GG unless R=uR^{\prime}=u. Suppose R=uR^{\prime}=u. As the cops in GuG-u have captured the robber R=f1(R)=f1(u)=vR=f^{-1}(R^{\prime})=f^{-1}(u)=v, there is a cop Ci=vC_{i}=v in GuG-u, implying that there is a cop Ci=vC^{\prime}_{i}=v in GG.

Since GG is triangle-free and N(u)N[v]N(u)\subseteq N[v], observe that vN(u)v\in N(u) if and only if deg(u)=1\deg(u)=1. At this point we assume the cops have just captured the robber in GuG-u so it is the robber’s turn. If deg(u)=1\deg(u)=1 we proceed as follows. On the previous turn in GG, cop CiC^{\prime}_{i} is in N[v]N[v] and R=uR^{\prime}=u. If there is another cop CjC^{\prime}_{j} adjacent to a vertex zN[v]z\in N[v], then CiC^{\prime}_{i} moves to vv and CjC^{\prime}_{j} moves to zz: the cops will win during their next turn. Otherwise, CiC^{\prime}_{i} moves to a vertex in N(v)\{u}N(v)\backslash\{u\} and waits for a backup cop to arrive (capturing the robber in the interim if the robber moves to vv). As t2t\geq 2 and GG is connected, after finitely many turns, there will be a cop CjC^{\prime}_{j} at vv. At this point proceed as before. Given vv is the unique neighbour of uu during this time the robber must remain at uu or be immediately captured. Thus, the cops win if deg(u)=1\deg(u)=1.

If deg(u)1\deg(u)\neq 1, then vN(u)v\notin N(u). In this case recall that Ci=vC^{\prime}_{i}=v. Then CiC^{\prime}_{i} waits at vv until a backup cop CjC^{\prime}_{j} arrives at a vertex N(u)N(u) after finitely many turns. If the robber attacks CjC^{\prime}_{j} they will be captured by CiC^{\prime}_{i}. If the robber moves elsewhere they will be captured by CiC^{\prime}_{i}. If the robber does not move, they will be captured by CjC^{\prime}_{j}. Thus, the cops win if deg(u)1\deg(u)\neq 1.

Thus, if γ(Gu)2\gamma(G-u)\geq 2, then cc(Gu)cc(G)\operatorname{cc}(G-u)\geq\operatorname{cc}(G). Therefore, cc(G)=cc(Gu)\operatorname{cc}(G)=\operatorname{cc}(G-u) as required. ∎

The next step is to show that if GG is a triangle-free graph and with no dominated vertices, then either its attacking cop number is at least three or γ(G)\gamma(G) is small. That is, a triangle-free graph with large domination number and no dominated vertex must also have attacking cop number at least three. This fact will be critical to proving our characterisation.

Lemma 2.3.

Let G=(V,E)G=(V,E) be a triangle-free graph that contains no dominated vertices and for which γ(G)3\gamma(G)\geq 3. Then cc(G)>2\operatorname{cc}(G)>2.

Proof.

Let G=(V,E)G=(V,E) be a triangle-free graph that contains no dominated vertices and for which γ(G)3\gamma(G)\geq 3. Observe that the latter condition implies cc(G)2\operatorname{cc}(G)\geq 2 by Observation 2.1. For a contradiction, assume cc(G)=2\operatorname{cc}(G)=2.

Suppose the cops initially occupy u,vVu,v\in V (not necessarily distinct). Since γ(G)3\gamma(G)\geq 3, there is a vertex zVz\in V such that zN[u]N[v]z\not\in N[u]\cup N[v]. The robber RR initially occupies such a vertex zz to avoid immediate capture. As cc(G)=2\operatorname{cc}(G)=2, there is a winning strategy for the cops where, for some round t>0t>0, the robber occupies vertex yy at the beginning of round t1t-1 and regardless of the move made by the robber during round t1t-1, a cop will capture the robber during round tt. Since RR could pass during round t1t-1, after the cops move during round t1t-1, there must be a cop on a neighbour xx of yy; this cop moves to yy and captures RR during round tt if the robber passes. Thus, after the cops move during round t1t-1, a cop, say C1C_{1}, must occupy xN(y)x\in N(y). Observe that RR could move to xx and attack C1C_{1} during round t1t-1. Since the robber is captured during round tt, cop C2C_{2} must occupy some vertex wN[x]\{y}w\in N[x]\backslash\{y\}. Notice that any degree 11 vertex is dominated, so we can suppose deg(y)>1\deg(y)>1.

As deg(y)>1\deg(y)>1, RR may move to sN(y){x}s\in N(y)\setminus\{x\} during round t1t-1. Since GG is triangle-free, ss is not adjacent to xx: in this case C1C_{1} cannot capture RR during round tt. However, as RR is captured during round tt, ww must be adjacent to every vertex in N(y){x}N(y)\setminus\{x\} to enable C2C_{2} to capture RR during round tt. Given xN(w)x\in N(w) there exists a wyw\neq y such that N(y)N(w)N(y)\subseteq N(w). Since N(w)N[w]N(w)\subset N[w] this implies that N(y)N[w]N(y)\subseteq N[w] and hence yy is a dominated vertex, which is a contradiction. Thus, cc(G)>2\operatorname{cc}(G)>2 as desired. ∎

Figure 2 illustrates that Lemma 2.3 does not necessarily hold when the condition that GG is triangle-free is removed. It is not clear if a weaker or alternative version of Lemma 2.3 holds for graphs which contain triangles. With this, we are prepared to prove the main result of this section.

Figure 2. An example of a graph GG with at least one triangle, no dominated vertices, and domination number three such that cc(G)=2\operatorname{cc}(G)=2.
Theorem 2.4.

Let G=(V,E)G=(V,E) be a triangle-free graph. Then GG has cc(G)2\operatorname{cc}(G)\leq 2 if and only if γ(G)2\gamma(G)\leq 2 or for some k{1,,n}k\in\{1,\dots,n\}, there is a kk-partial domination elimination ordering SkS_{k} of GG for which γ(GSk)2\gamma(G-S_{k})\leq 2.

Proof.

Let G=(V,E)G=(V,E) be a triangle-free graph for which cc(G)2\operatorname{cc}(G)\leq 2. If cc(G)=1\operatorname{cc}(G)=1, then Observation 2.1 implies γ(G)=1\gamma(G)=1. Suppose cc(G)1\operatorname{cc}(G)\neq 1 for the remainder of the proof.

We begin by showing that if cc(G)2\operatorname{cc}(G)\leq 2, then γ(G)2\gamma(G)\leq 2 or for some k{1,,n}k\in\{1,\dots,n\}, there is a kk-partial domination elimination ordering SkS_{k} of GG for which γ(GSk)2\gamma(G-S_{k})\leq 2.

Suppose that cc(G)=2\operatorname{cc}(G)=2. Let G0=GG_{0}=G. If GG contains at least one dominated vertex, then form the sequence of vertices v1,v2,,vkv_{1},v_{2},\dots,v_{k} inductively, by considering Gi1=G{v1,,vi1}G_{i-1}=G-\{v_{1},\dots,v_{i-1}\} and letting viv_{i} be a fixed but arbitrary dominated vertex in Gi1G_{i-1} whenever such a vertex exists. For k1k\geq 1, let v1,,vkv_{1},\dots,v_{k} be any such sequence that is maximal, that is Gk=G{v1,,vk}G_{k}=G-\{v_{1},\dots,v_{k}\} has no dominated vertices. If GG contains no dominated vertex, set k=0k=0. If γ(Gk)2\gamma(G_{k})\leq 2, then we have proven our result.

Suppose that γ(Gk)3\gamma(G_{k})\geq 3. Since GG is triangle-free, GkG_{k} is also triangle-free. We may assume that γ(Gi)3\gamma(G_{i})\geq 3 for all 1ij1\leq i\leq j because if γ(Gj)2\gamma(G_{j})\leq 2 for some j<kj<k, then (v1,v2,,vj)(v_{1},v_{2},\dots,v_{j}) would be the desired jj-partial domination elimination ordering. Then Lemma 2.2 implies cc(G)=cc(G1)==cc(Gk)=2\operatorname{cc}(G)=\operatorname{cc}(G_{1})=\dots=\operatorname{cc}(G_{k})=2. Hence, GkG_{k} is a triangle-free graph that contains no dominated vertices and for which γ(Gk)3\gamma(G_{k})\geq 3. Thus, Lemma 2.3 implies that cc(Gk)>2\operatorname{cc}(G_{k})>2, contradicting cc(Gk)=2\operatorname{cc}(G_{k})=2. Hence, γ(Gk)2\gamma(G_{k})\leq 2 as required.

For the other direction, we will prove that if γ(G)2\gamma(G)\leq 2 or for some k{1,,n}k\in\{1,\dots,n\}, there is a kk-partial domination elimination ordering SkS_{k} of GG for which γ(GSk)2\gamma(G-S_{k})\leq 2, then cc(G)2\operatorname{cc}(G)\leq 2. Suppose that γ(G)2\gamma(G)\leq 2 or for some k{1,,n}k\in\{1,\dots,n\}, there is a kk-partial domination elimination ordering SkS_{k} of GG for which γ(GSk)2\gamma(G-S_{k})\leq 2.

If γ(G)2\gamma(G)\leq 2, then cc(G)2\operatorname{cc}(G)\leq 2 by Observation 1.1. Suppose γ(G)3\gamma(G)\geq 3. Then for some k{1,,n}k\in\{1,\dots,n\} there is a kk-partial domination elimination ordering Sk=(v1,v2,,vk)S_{k}=(v_{1},v_{2},\dots,v_{k}) of GG and γ(GSk)2\gamma(G-S_{k})\leq 2. Observation 1.1 implies that cc(GSk)2.\operatorname{cc}(G-S_{k})\leq 2. Note that Observation 2.1 implies that if cc(GSi)=2\operatorname{cc}(G-S_{i})=2, then γ(GSj)2\gamma(G-S_{j})\geq 2 for all 1ji1\leq j\leq i. So we conclude that if cc(GSi)=2\operatorname{cc}(G-S_{i})=2 for some i{1,2,,k}i\in\{1,2,\dots,k\} then Lemma 2.2 implies cc(G)=cc(GS1)==cc(GSi)=2\operatorname{cc}(G)=\operatorname{cc}(G-S_{1})=\dots=\operatorname{cc}(G-S_{i})=2. Hence, if cc(GSk)=2\operatorname{cc}(G-S_{k})=2, then cc(G)=2\operatorname{cc}(G)=2.

Otherwise, cc(GSk)=1\operatorname{cc}(G-S_{k})=1. This implies γ(GSk)=1\gamma(G-S_{k})=1 by Observation 2.1. Then either for all i{1,,k}i\in\{1,\dots,k\}, cc(GSi)=1\operatorname{cc}(G-S_{i})=1 or there exists a 1j<k1\leq j<k such that jj is the largest integer where cc(GSj)>1\operatorname{cc}(G-S_{j})>1. If for all i{1,,k}i\in\{1,\dots,k\}, cc(GSi)=1\operatorname{cc}(G-S_{i})=1, then cc(Gv1)=1\operatorname{cc}(G-v_{1})=1. This implies Gv1G-v_{1} has a universal vertex, which contradicts the assumption that γ(G)3\gamma(G)\geq 3. So there must be a largest integer 1j<k1\leq j<k, such that cc(GSj)>1\operatorname{cc}(G-S_{j})>1.

Letting jj be such an integer we claim that cc(GSj)=2\operatorname{cc}(G-S_{j})=2. As j<kj<k, there exists an integer j+1kj+1\leq k and cc(GSj+1)=1\operatorname{cc}(G-S_{j+1})=1. Then Observation 2.1 tells us that γ(GSj+1)=1\gamma(G-S_{j+1})=1. So there exists a universal vertex uu in GSj+1G-S_{j+1}. Hence, {u,vj+1}\{u,v_{j+1}\} is a dominating set in GSjG-S_{j}, which implies that γ(GSj)2\gamma(G-S_{j})\leq 2, implying the desired result that 1<cc(GSj)21<\operatorname{cc}(G-S_{j})\leq 2 by Observation 1.1 and Observation 2.1. So cc(GSj)=2\operatorname{cc}(G-S_{j})=2. From here Lemma 2.2 implies that cc(G)=cc(GSj)=2\operatorname{cc}(G)=\operatorname{cc}(G-S_{j})=2. This proves the desired result.

Therefore, GG has cc(G)2\operatorname{cc}(G)\leq 2 if and only if γ(G)2\gamma(G)\leq 2 or for some k{1,,n}k\in\{1,\dots,n\}, there is a kk-partial domination elimination ordering SkS_{k} of GG for which γ(GSk)2\gamma(G-S_{k})\leq 2. This completes the proof. ∎

3. Planar Graphs

Bonato et al. [6] showed that cc(G)c(G)+2\operatorname{cc}(G)\leq c(G)+2 for all bipartite graphs GG. Hence, it is known that every bipartite planar graph has attacking cop number at most 55. Restricting our attention to bipartite planar graphs allows us to generalise both the cops’ and robber’s strategies for planar graphs from classical Cops and Robbers more easily than we can for general planar graphs. In this section we show every bipartite planar graph has attacking cop number at most 44, which is tight (see Theorem 3.5).

Before doing this however, we characterise outerplanar graphs with attacking cop number 22. Recall that it was shown by Bonato et al. [6] that all outerplanar graphs have attacking cop number at most 33.

Theorem 3.1.

Let G=(V,E)G=(V,E) be an outerplanar graph with no universal vertex, and with a fixed outerplanar embedding Π\Pi. Then cc(G)=2\operatorname{cc}(G)=2 if and only if there exists at most one internal kk-face of Π\Pi where k{5,6}k\in\{5,6\}, and no internal tt-face of Π\Pi where t>6t>6.

Proof.

For the reverse implication, since GG does not have a universal vertex, cc(G)2\operatorname{cc}(G)\geq 2. Let G=(V,E)G=(V,E) be an outerplanar graph with no universal vertex, and at most one internal kk-face of Π\Pi where k{5,6}k\in\{5,6\}, and no internal tt-face of Π\Pi where t>6t>6. We show that given the structure of GG, two cops suffice to capture the robber.

If the cops can place themselves on a dominating set, then the robber will be captured on the first round. If this is not the case, cops C1C_{1} and C2C_{2} start the game by dominating the kk-face, where k{5,6}k\in\{5,6\}, if such a face exists. The robber can then place themselves at least distance two away from cops, and survive the first round. This initial placement of the cops ensures that the robber cannot enter the kk-face, and the cops can move in such a way that the kk-face is always part of the cop territory, as GG is outerplanar.

From the initial placement, on their turn, at least one cop must move to decrease their distance to the robber, while the other cop acts as a backup cop. As GG is outerplanar and GG without the vertices of the kk-face is comprised only of three cycles, four cycles and/or tree-like structures, the cops can move in tandem along the facial walk of the infinite face in the outerplanar embedding, while remain backup to each other and preventing the robber from entering the cop territory. Here the cop territory is all vertices uu such that every path from the robber to uu include a vertex from the closed neighbourhood of one or both cops. The cops clear the faces, one at a time, as they decrease their distance to the robber. If they are on two vertices of a 33-cycle, the cop nearer the robber remains fixed, while the other cop moves towards the robber by moving to the third vertex of the 33-cycle. If the cops on a 33-cycle are at the same distance from the robber, then they move in tandem towards the robber. If the cops are on vertices of a 44-cycle, they move in tandem along the 44-cycle toward the robber. If the cops must traverse a portion of the graph involving a cut-vertex, the cop occupying the cut-vertex remains fixed, while the backup cop joins them on their vertex, then they move in tandem again toward the robber.

If no such kk-face exists, the cops initially place themselves on adjacent vertices and move in tandem toward the robber using the same strategy as before. At each step, the cops increase their territory and get closer to the robber. As the graph is finite and the cops are moving in tandem, they are protecting against attacks and will capture the robber.

For the forward implication, suppose GG is an outerplanar graph with a fixed outerplanar embedding Π\Pi, no universal vertex, and suppose that cc(G)=2\operatorname{cc}(G)=2. Suppose by way of contradiction at least one of the following hold:

  1. (1)

    Π\Pi contains at least two internal kk-faces where k{5,6}k\in\left\{5,6\right\}, or

  2. (2)

    there exists an internal tt-face, where t7t\geq 7.

In both cases, we will show that two cops cannot capture the robber if the robber plays optimally.

  1. (1)

    Suppose cc(G)=2\operatorname{cc}(G)=2 and Π\Pi contains at least two internal kk-faces where k{5,6}k\in\left\{5,6\right\}. As GG is outerplanar, any two internal kk-faces can share at most one edge. Hence, each face is an induced cycle and if uu is a vertex with neighbours on a face ff, then uu has at most two neighbours on ff, both of whom must be adjacent. This implies that the cop player cannot dominate both kk-faces at the same time. The robber begins on the kk-cycle which is not fully dominated, at distance at least two from both cops. If a cop enters the robber’s neighbourhood without backup, then the robber attacks the cop. As the domination number of the graph is greater than 11, the remaining cop cannot then catch the robber. So if the cops want to force the robber to move, they must provide each other with backup. But the robber is on a cycle of length 55 to more, so if the cops move in tandem around the face to force the robber to move, the robber can move to remain outside of their neighbourhood without leaving the cycle. This returns the game to the same state we began. This contradicts cc(G)=2\operatorname{cc}(G)=2.

  2. (2)

    Suppose cc(G)=2\operatorname{cc}(G)=2 and there exists an internal tt-face, where t7t\geq 7. The cop player can place the two cops anywhere on GG. The robber player places themselves on the internal tt-face where t7t\geq 7, at distance at least two from both cops. Similarly to the previous case, the cop player cannot dominate this face, and as an induced subgraph, this face corresponds to a cycle of length at least 77 which has cc(G)=3\operatorname{cc}(G)=3. Since GG is outerplanar there does not exist any vertex with more than 22 neighbours on the tt-face, hence the robber can remain on this face and evade capture indefinitely.

This completes the proof. ∎

To begin studying the attacking cop number of bipartite planar graph, we recall a useful lower bound for attacking cop number from [6]. This result has been modified below to include the condition γ(G)>δ(G)\gamma(G)>\delta(G) as this is necessary to omit C5C_{5} and C6C_{6} from consideration. We note that this is itself a generalisation of a bound for cop number from [2].

Theorem 3.2 ([6] Theorem 3).

If GG is a graph with girth at least 55 and γ(G)>δ(G)\gamma(G)>\delta(G), then cc(G)δ(G)+1\operatorname{cc}(G)\geq\delta(G)+1.

Observe that there exists cubic planar graphs with girth 55 and domination number greater than 44. For an example consider the dodecahedral graph. Hence, Theorem 3.2 implies that there exists planar graphs with attacking cop number at least 44. The following lemma extends this result and is similar to the proof that there exists bipartite planar graphs with surrounding cop number 44 from [8].

Lemma 3.3.

If GG is a graph with girth at least 55 and γ(G)>δ(G)\gamma(G)>\delta(G), then cc(H)δ(G)+1\operatorname{cc}(H)\geq\delta(G)+1 where HH is obtained from GG by subdividing every edge of GG exactly once.

Proof.

Label the vertices of GG as u1,u2,,unu_{1},u_{2},\dots,u_{n} where n=|V(G)|n=|V(G)|. Let vi,jv_{i,j} be the vertex in HH, created by subdividing edge (ui,uj)(u_{i},u_{j}) of GG. Note that the order of paired indices is unimportant: vi,j=vj,iv_{i,j}=v_{j,i}. Label the remaining vertices of HH as v1,v2,,vnv_{1},v_{2},\dots,v_{n} where viv_{i} in HH corresponds to uiu_{i} in GG for each ii. We note that as the girth of GG is at least 55, the girth of HH is at least 1010.

Assume cc(H)=kδ(G)\operatorname{cc}(H)=k\leq\delta(G); otherwise, cc(H)δ(G)+1\operatorname{cc}(H)\geq\delta(G)+1 and the result holds. We further assume k<γ(G)k<\gamma(G); otherwise cc(H)γ(G)>δ(G)\operatorname{cc}(H)\geq\gamma(G)>\delta(G) by Theorem 3.2 and the result holds. An implication of cc(H)=kδ(G)\operatorname{cc}(H)=k\leq\delta(G) is that cc(H)<cc(G)cc(H)<cc(G) by Theorem 3.2.

Let S={v1,v2,,vk}S=\{v_{1}^{*},v_{2}^{*},\dots,v_{k}^{*}\} be the set of vertices initially occupied by the cops in HH where viv_{i}^{*} corresponds to either a vertex in GG or to a subdivided edge of GG. We will show that on HH, the robber can avoid capture indefinitely, which will contradict the assumption that cc(H)=k<cc(G)\operatorname{cc}(H)=k<\operatorname{cc}(G). We next explain why the robber can avoid initially occupying a vertex in HH that corresponds to a subdivided edge of GG, and also avoid being adjacent to a cop. For each vertex vjv_{j}^{*} in SS, there exists vjV(H)v_{j}\in V(H) such that vjNH[vj]v_{j}^{*}\in N_{H}[v_{j}]. Since k<γ(G)k<\gamma(G), there is a vertex uiV(G)u_{i}\in V(G) adjacent to no vertex in {u1,u2,,uk}\{u_{1},u_{2},\dots,u_{k}\} in GG. In HH, the robber initially occupies viv_{i}. Note that viv_{i} is not adjacent to any vertex in {v1,v2,,vk}\{v_{1}^{*},v_{2}^{*},\dots,v_{k}^{*}\} in HH, given uiu_{i} is not adjacent to any vertex {u1,u2,,uk}\{u_{1},u_{2},\dots,u_{k}\} in GG, and so the robber is not adjacent to a cop.

We refer to vertices v1,v2,,vnv_{1},v_{2},\dots,v_{n} in HH as core vertices. Observe that the robber initially occupies a core vertex of HH. We will show that there is a robber strategy for which the following property holds throughout the game:

(\star) once a cop moves to be adjacent to the robber, the robber can, after two turns, occupy a core vertex that is not adjacent to any cop.

This implies the robber wins.

As the robber occupies viv_{i}, let degH(vi)=d\deg_{H}(v_{i})=d and NH(vi)={vi,m1,vi,m2,,vi,md}N_{H}(v_{i})=\{v_{i,{m_{1}}},v_{i,{m_{2}}},\dots,v_{i,{m_{d}}}\} and suppose the robber remains on vertex viv_{i} until a cop enters NH(vi)N_{H}(v_{i}). If for all tt, no cop enters NH(vi)N_{H}(v_{i}) after tt cop rounds, then the robber is never captured and the robber wins. Consequently, suppose there exists a tt such that a cop will enter NH(vi)N_{H}(v_{i}) after tt cop rounds where tt is the least integer satisfying this property. Without loss of generality, during round tt a cop CC occupies vertex vi,m1v_{i,{m_{1}}}.

After the cops’ turn during round tt, if there is no cop other than CC within distance two of vm1v_{m_{1}}, then the robber moves to vi,m1v_{i,m_{1}}, attacks the cop CC during round tt, and moves to vm1v_{m_{1}} during round t+1t+1. By assumption, no cop can be adjacent to core vertex vm1v_{m_{1}} at the end of round t+1t+1 and (\star) holds.

Suppose that after the cops have moved during round tt, there is a cop CC^{\prime} distinct from CC within distance two of vm1v_{m_{1}}. Since HH has girth at least 1010, CC^{\prime} cannot be within distance two of any of vm2,vm3,,vmdv_{m_{2}},v_{m_{3}},\dots,v_{m_{d}}. Moreover, for all rsr\neq s, dist(vmr,vms)6\operatorname{dist}(v_{m_{r}},v_{m_{s}})\geq 6 in HviH-v_{i}. Hence, viv_{i} is the unique vertex of HH which is within distance at most two from both vmrv_{m_{r}} and vmsv_{m_{s}} for any rsr\neq s. So any cop within distance two of vmrv_{m_{r}} is not within distance two of vmsv_{m_{s}} for any rsr\neq s, given the robber is on vertex viv_{i}. Recall that cc(H)δ(G)\operatorname{cc}(H)\leq\delta(G) and that there are two cops within distance two of vm1v_{m_{1}}. This implies kdk\leq d and so there must be a vertex vmv_{m_{\ell}} (for some {2,3,,d}\ell\in\{2,3,\dots,d\}) such that there is no cop within distance two of vmv_{m_{\ell}} after the cops move during round tt. In this case, the robber moves to vi,mv_{i,{m_{\ell}}} during round tt, before moving to vmv_{m_{\ell}} during round t+1t+1, and there is no cop in N[vm]N[v_{m_{\ell}}] at the end of round t+1t+1. In this case, (\star) holds.

Repeating the above arguments provides a robber strategy which ensures (\star) always holds, which contradicts cc(H)<cc(G)\operatorname{cc}(H)<\operatorname{cc}(G) and therefore also contradicts cc(H)δ(G)\operatorname{cc}(H)\leq\delta(G). ∎

Observe that there are planar graphs with minimum degree 33 and girth at least 55; for example the dodecahedral graph. Thus, Lemma 3.3 implies that the graph formed by subdividing every edge exactly once of a minimum degree 33 and girth 55 planar graph has attacking cop number at least 44. Also, notice that any graph HH obtained by subdividing every edge of a graph GG is bipartite. See Figure 3 for a picture of the dodecahedral graph with each edge subdivided.

Figure 3. The dodecahedral graph subdivided exactly once on every edge.

With a lower bound on the attacking cop number in hand, we proceed to obtain an upper bound. While Lemma 3.3 generalised a robber strategy from Cops and Robbers, Lemma 3.4 generalises a cops strategy from Cops and Robbers. In particular, we generalise the fact that geodesic paths are 11-guardable, which was proven in [2].

Consider the game of Cops and Attacking Robbers played on a graph GG. Let HGH\subseteq G be a subgraph of GG. We define HH to be (k,t)(k,t)-guardable if, in finitely many steps, k+tk+t cops can move so that kk cops are placed on vertices of HH, so that if the robber ever moves into HH, the cops will immediately capture the robber. Note that the role of the tt cops is to get the kk cops safely positioned on HH. Thereafter, the tt cops are free to move elsewhere in GG, while the kk cops guard HH. Observe that if HH is (k,0)(k,0)-guardable in the classical game of Cops and Robbers, then HH is (2k,0)(2k,0)-guardable in the game of Cops and Attacking Robbers. Note that there are instances where an extra tt cops are needed in an initial phase, until the other kk cops are appropriately positioned to guard a subgraph.

Next, we will see that if GG is a finite bipartite graph and PP is a geodesic path in GG, then PP is (1,1)(1,1)-guardable. Notably, the fact that the graph GG is bipartite cannot be relaxed in Lemma 3.4, as there are geodesic paths which are not (1,1)(1,1)-guardable in graphs which contain an odd cycle, as demonstrated in [6].

Lemma 3.4.

If G=(V,E)G=(V,E) is a bipartite graph and PP is a geodesic path in GG, then PP is (1,1)(1,1)-guardable.

Proof.

Let G=(V,E)G=(V,E) be a finite bipartite graph and P=v0,,vkP=v_{0},\dots,v_{k} a geodesic path in GG. Label the cops CC and CC^{\prime}. For 0ik10\leq i\leq k-1, let DiD_{i} denote the set of vertices distance ii from v0v_{0} and let Dk={uV:dist(u,v0)k}D_{k}=\{u\in V:\operatorname{dist}(u,v_{0})\geq k\}. We will assume the robber never moves to a vertex adjacent to a cop; otherwise, the cop will capture the robber during the next round.

Suppose, after some player has moved, the robber is in DiD_{i} and the vertices occupied by the cop and robber are non-adjacent. We define several possible states a cop can be in;

  • if a cop occupies viv_{i}, then the cop is in state (0);

  • if a cop occupies vi1v_{i-1}, then the cop is in state (1-1);

  • if a cop occupies vi+1v_{i+1}, then the cop is in state (+1+1).

Claim 1: After finitely many rounds, CC or CC^{\prime} can achieve state (0) with the help of the second cop, or the cops have captured the robber.

Proof of Claim 1. We assume that CC and CC^{\prime} move together until they get to v0v_{0} on PP. After finitely many steps cops CC^{\prime} and CC can occupy v0v_{0} and v1v_{1}, respectively, or the cops will have captured the robber.

Suppose the robber occupies vertex xx. If x{v0,v1}x\in\{v_{0},v_{1}\}, then the cops have captured the robber. If xD1v1x\in D_{1}-v_{1}, then CC is in state (0) as required. Suppose xDix\in D_{i} for i2i\geq 2. During each round, the cops CC and CC^{\prime} will move from vj1v_{j-1} to vjv_{j} until both the robber and CC occupy a vertex in DjD_{j} for some j2j\geq 2. Since the geodesic path is finite, this situation must occur; when it does, suppose the robber occupies xjx_{j} and observe that CC occupies vjv_{j} and CC^{\prime} occupies vj1v_{j-1}. We consider whose turn it is to move when this situation occurs:

  1. (1)

    Suppose the robber has just moved to xjx_{j}. By assumption xjN(vj)x_{j}\notin N(v_{j}), so CC is in state (0) if xjvjx_{j}\neq v_{j}. If xj=vjx_{j}=v_{j}, then the cop CC^{\prime} will capture the robber on their next turn.

  2. (2)

    Suppose the cops have just moved.

    1. (a)

      If the robber moves to a vertex xj1Dj1x_{j-1}\in D_{j-1}, then by assumption, xj1N(vj1)x_{j-1}\notin N(v_{j-1}) so CC^{\prime} is in state (0), or CC will capture the robber if xj1=vj1x_{j-1}=v_{j-1}.

    2. (b)

      If the robber moves to a vertex xjDjx_{j}^{\prime}\in D_{j}, then by assumption, xjN(vj)x_{j}^{\prime}\notin N(v_{j}), so CC is in state (0), or CC^{\prime} will capture the robber if xj=vjx^{\prime}_{j}=v_{j}.

    3. (c)

      If the robber moves to a vertex xj+1Dj+1x_{j+1}\in D_{j+1}, then the cops move to vj,vj+1v_{j},v_{j+1} and we are at the beginning of (2) again, except the indices are increased by one. Since the geodesic path is finite, (2)(c) can only occur finitely many times.

This concludes the proof of Claim 1. \diamond

Hence, after finitely many moves CC or CC^{\prime} can achieve state (0) with the help of the second cop, or the cops will capture the robber. Once a cop has reached state (0), the other cop is no longer needed to guard PP. Suppose without loss of generality CC reaches state (0). We next show how, from state (0), CC can guard PP.

Claim 2: If a cop CC is in state (0) during some round, then in all subsequent rounds, CC has a strategy to ensure that if the robber moves to PP, then CC will immediately move to capture the robber.

Proof of Claim 2. For some i[k]i\in[k], suppose that CC occupies viv_{i} and the robber occupies xDix\in D_{i} where viN[x]v_{i}\notin N[x]. We will provide a strategy for CC to guard the path PP for the rest of the game.

If it is the cops’ turn, then CC remains on its current vertex, and thus, remains in state (0). If it is the robber’s turn, then we consider the robber’s possible moves, from xx to xx^{\prime}, in three cases: (i) xDix^{\prime}\in D_{i}, (ii) i<ki<k and xDi+1x^{\prime}\in D_{i+1}, or (iii) xDi1x^{\prime}\in D_{i-1}. Since we assumed the robber never moves to a vertex adjacent to the cop, xx^{\prime} is not adjacent to viv_{i}, and as viN(x)v_{i}\notin N(x), we conclude that xvix^{\prime}\neq v_{i}.

The remainder of the proof explains how the cop CC should respond in each case. Hence, if the cop is in state (0), then the robber cannot enter PP on their next move without moving adjacent to the cop CC, thereby losing. It follows that if the robber has a strategy to enter PP without being captured, then this strategy will force CC to leave state (0). Thus, to show CC guards PP it is necessary and sufficient for us to show that if CC is forced to leave state (0), either CC can continue to guard PP from outside state (0) or CC can return to state (0).

  1. (i)

    Suppose xDix^{\prime}\in D_{i}. Since xN(vi)x^{\prime}\notin N(v_{i}) and xDix^{\prime}\in D_{i}, the cop CC remains at viv_{i} and is in state (0).

  2. (ii)

    Suppose i<ki<k and xDi+1x^{\prime}\in D_{i+1}. If xN(vi+1)x^{\prime}\notin N(v_{i+1}), the cop moves to vi+1v_{i+1} and is in state (0). So we assume the edge (x,vi+1)(x^{\prime},v_{i+1}) exists. After the robber’s turn, the cop remains on viv_{i} implying that the cop is now in state (1-1). We need to show that the cop can return to state (0), or the cop can guard the path PP while remaining in state (1)(-1) indefinitely. Note that (x,vi)E(x^{\prime},v_{i})\notin E, since xx^{\prime}, viv_{i}, and vi+1v_{i+1} would form an odd cycle. See Figure 4 (a) for a visualization. If the robber does not move on their turn, the cop does not move, and has successfully prevented the robber from entering PP. Suppose then that the robber moves to a new vertex on their turn. From this position, the robber can move to a vertex in DiD_{i}, Di+1D_{i+1}, or Di+2D_{i+2}; the latter only if i+2ki+2\leq k.

    First, if the robber moves to a vertex in Di\N(vi)D_{i}\backslash N(v_{i}) then the cop remains at viv_{i} and is in state (0).

    Second, if the robber moves to a vertex xi+1Di+1\(N(vi){x})x_{i+1}\in D_{i+1}\backslash(N(v_{i})\cup\{x^{\prime}\}), then we note (xi+1,vi+1)E(x_{i+1},v_{i+1})\notin E; otherwise {x,xi+1,vi+1}\{x^{\prime},x_{i+1},v_{i+1}\} form a 33-cycle. Thus, the cop moves to vi+1v_{i+1} and is now in state (0).

    Third, if i+2ki+2\leq k, then suppose RR moves to xi+2Di+2x_{i+2}\in D_{i+2}. Observe that xi+2vi+2x_{i+2}\neq v_{i+2}; otherwise {x,vi+1,vi+2}\{x^{\prime},v_{i+1},v_{i+2}\} forms a 33-cycle. Notably, (vi+1,xi+2)E(v_{i+1},x_{i+2})\not\in E; otherwise {vi+1,x,xi+2}\{v_{i+1},x^{\prime},x_{i+2}\} forms a 33-cycle. This implies that if the robber moves to xi+2x_{i+2}, then the cop can safely move to vi+1v_{i+1} and is now again in state (1)(-1), with an increased index on the vertices of PP. Thus, this whole case analysis restarts from a higher index.

    Notice that if at this higher index the robber decreases their index on their turn, i.e move from DjD_{j} to Dj1D_{j-1}, then by the cop CC in state (1-1) can either capture the robber, or remain on their current vertex on their turn, thereby entering state (0). Note that as the cop is in state (1-1), the robber cannot attack the cop. As returning to state (0) benefits the cop’s strategy to protect the path, we suppose that the robber does not allow to the cop to return to state (0). Hence, we can suppose it is the robber’s turn, and that the robber currently occupies a vertex xlDi+lx_{l}\in D_{i+l} for some t2t\geq 2, while the cop is in state (1-1). Without loss of generality suppose that the robber has not entered PP before the current turn. We will show that either the robber increases their index again, or the cop is able to enter state (0), or the robber enters PP and is captured by the cop.

    There are two cases to consider. First, the robber moves from Di+lD_{i+l} to a vertex in Di+lD_{i+l}, second the robber moves from a vertex Di+lD_{i+l} to a vertex in Di+l+1D_{i+l+1}. Of course for the second option to be possible, i+l+1ki+l+1\leq k.

    We being by considering the case where the robber moves from a vertex xi+lDi+lx_{i+l}\in D_{i+l} to a vertex in xi+lDi+lx^{\prime}_{i+l}\in D_{i+l}. Without loss of generality we suppose that this is the first instance of the robber not increasing the index of the set DjD_{j} they occupy on their turn. By this assumption we can suppose that on the previous tt turns, the robber occupies a vertex xi+rDi+rx_{i+r}\in D_{i+r}. Notice here that x=xi+1x^{\prime}=x_{i+1}.

    Recall that by assumption (x,vi+1)E(x^{\prime},v_{i+1})\in E. Further we can suppose that xi+lxi+lx_{i+l}\neq x^{\prime}_{i+l}, because if the robber does not move, then the cop can pass on their turn without allowing the robber to make any progress towards entering the path PP. Then, xi+1,,xi+l,xi+lx_{i+1},\dots,x_{i+l},x^{\prime}_{i+l} is a path of length l+1l+1. Hence, if (xi+l,vi+l)E(x^{\prime}_{i+l},v_{i+l})\in E, then

    xi+1,,xi+l,xi+l,vi+l,vi+l1,,vi+1x_{i+1},\dots,x_{i+l},x^{\prime}_{i+l},v_{i+l},v_{i+l-1},\dots,v_{i+1}

    is a cycle of length 2t+12t+1. But GG is bipartite, so GG contains no odd cycle, hence, (xi+l,vi+l)E(x^{\prime}_{i+l},v_{i+l})\not\in E. Given (xi+l,vi+l)E(x^{\prime}_{i+l},v_{i+l})\not\in E, the cop CC can safely move from vi+l1v_{i+l-1} to vi+lv_{i+l} on their turn, thereby entering state (0). We conclude that if the robber does not increase their index on every turn, then the cop can enter state (0) thereby guarding the path PP. Suppose then that on every turn since moving to xx^{\prime}, the robber has increased their index.

    Suppose then that the robber moves from a vertex xi+lDi+lx_{i+l}\in D_{i+l} to a vertex in xi+l+1Di+l+1x_{i+l+1}\in D_{i+l+1}. We must prove two facts. First, xi+l+1vi+l+1x_{i+l+1}\neq v_{i+l+1}, and second that xi+l+1N(vi+l)x_{i+l+1}\not\in N(v_{i+l}). We must show the first fact in order to ensure that the cop CC prevents the robber from entering PP, and we must prove the second fact to ensure that the cop can move from vi+l1v_{i+l-1} to vi+lv_{i+l} on their turn to remain in state (1-1). Notice that the second fact implies the first. Hence, we will prove both facts by proving the second.

    Suppose that xi+l+1N(vi+l)x_{i+l+1}\in N(v_{i+l}), then

    xi+1,,xi+l,xi+l+1,vi+l,vi+l1,,vi+1x_{i+1},\dots,x_{i+l},x_{i+l+1},v_{i+l},v_{i+l-1},\dots,v_{i+1}

    is a cycle of length 2l+12l+1. But as GG is bipartite, GG contains no odd cycle. Hence, xi+l+1N(vi+l)x_{i+l+1}\not\in N(v_{i+l}). Thus, the robber cannot enter PP on their turn, and if the robber increases their index, the cop can respond by returning to state (1-1). This concludes the proof of case (ii).

  3. (iii)

    Similar to (ii) with state (1-1) being replaced with state (+1+1).

This concludes the proof of Claim 2. \diamond

Together, Claims 1 and 2 showed that if GG is a finite bipartite graph and PP is a geodesic path in GG, then PP is (1,1)(1,1)-guardable. ∎

v0v_{0}v1v_{1}vi1v_{i-1}viv_{i}vi+1v_{i+1}xxxx^{\prime}vkv_{k}D1D_{1}Di1D_{i-1}DiD_{i}Di+1D_{i+1}DkD_{k}v0v_{0}v1v_{1}vi1v_{i-1}viv_{i}vi+1v_{i+1}vi+l1v_{i+l-1}vi+lv_{i+l}vi+l+1v_{i+l+1}vi+l1v_{i+l-1}xi+lx_{i+l}xix_{i}xi+1x_{i+1}vkv_{k}D1D_{1}Di1D_{i-1}DiD_{i}Di+1D_{i+1}Di+l1D_{i+l-1}Di+lD_{i+l}Di+l+1D_{i+l+1}DkD_{k}
Figure 4. (top) is visualization of the start of Case (ii); (bottom) is the visualization of the later part of Case (ii).

We notice that if the robber is confined to a subgraph HH of GG, and PP is a path from uu to vv such that there is no path shorter than PP from uu to vv in HH, then the same argument as in Lemma 3.4 implies PP is (1,1)(1,1)-guardable. Thus, paths that are not necessarily geodesic in GG can become (1,1)(1,1)-guardable if these paths are geodesic in a subgraph HH of GG, where the robber cannot leave HH without being captured, and these paths are shortest paths in HH.

We are now prepared to prove Theorem 3.5. The proof proceeds by almost exactly the same argument as the proof that for all planar graphs GG, c(G)3\operatorname{c}(G)\leq 3. For completeness the whole argument is included.

Theorem 3.5.

If GG is a bipartite planar graph, then cc(G)4\operatorname{cc}(G)\leq 4. Furthermore, there exists a bipartite planar graph HH with cc(H)=4\operatorname{cc}(H)=4.

Proof.

We begin by pointing out that the Dodecahedral graph, GG, is 33-regular, has girth 55, and has domination number at least 44. Thus, Lemma 3.3 implies that the graph HH obtained by subdividing every edge of the GG, pictured in Figure 3, has attacking cop number at least 44. We note that every kk-cycle in HH corresponds to k/2k/2-cycle in GG. So the length of every cycle in HH is even, implying HH is bipartite. As subdividing edges does not increase a graph’s genus and GG is planar, HH is planar. Thus, we have demonstrated the existence of a bipartite planar graph HH with cc(H)4\operatorname{cc}(H)\geq 4.

We now prove that every bipartite planar graph GG has cc(G)4\operatorname{cc}(G)\leq 4. Let G=(V,E)G=(V,E) be a fixed finite bipartite planar graph. To prove an upper bound on the attacking cop number, we will provide a cop strategy for capturing the robber with four cops, regardless of how the robber plays. This cop strategy proceeds by partitioning the time over which the game is played into segments we call stages. The cop territory is a subgraph HH of GG consisting of all vertices uVu\in V which the cops can prevent the robber from entering. If the robber tries to enter HH they will be immediately captured. In each stage i0i\geq 0, HiH_{i} is a strict subgraph of Hi+1H_{i+1}. As GG is finite, for some finite number kk, Hk=GH_{k}=G, implying the robber is in the cop territory, and as a result the cops will be able to capture the robber.

We prove that HiH_{i} is a strict subgraph of Hi+1H_{i+1} by proving how in stage i+1i+1, the cops can add a new set of vertices to their territory, while guarding HiH_{i}. We define the three states that the cop strategy can be in during stage ii and then proceed to prove that from all of these states, the cops can expand their territory in stage i+1i+1 by reaching one of these three states again, with at least one new vertex in the subgraph Hi+1H_{i+1}. Here stages are not a natural aspect of the game, rather they are a means for distinguishing which strategy the cops should be pursuing from a particular position. As such, a stage begins or ends if and only if we define it to begin or end, respectively. We suppose without loss of generality that the robber does not enter HiH_{i} once stage jij\geq i has begun, given that they will be captured if they do so. Suppose the current stage is ii. The states we consider are the following:

  1. (1)

    A cop is guarding a path PP which is at least as short as any path that has the same endpoints as PP, but whose internal vertices are not in HiH_{i}. Any path from the robber to the cop territory HiH_{i}, contains a vertex of PP, while the rest of the cops are occupying vertices of PP.

  2. (2)

    A cop C1C_{1} guards a path P1P_{1} and a cop C2C_{2} guards a path P2P_{2} where P1P_{1} and P2P_{2} are internally disjoint, but have the same endpoints. Paths P1P_{1} and P2P_{2} are at least as short as any shortest path between their endpoints, but with internal vertices not in HiH_{i}. Any path from the robber to the cop territory HiH_{i}, contains a vertex from P1P_{1} or P2P_{2}, while the rest of the cops are occupying vertices of P1P_{1} or P2P_{2}.

  3. (3)

    A cop guards a cut vertex vv and any path from the robber to the cop territory, HiH_{i}, contains vv, while the rest of the cops are occupying vertices in HiH_{i} or are on vv.

Begin the game and stage 0 with cops C1,C2,C3,C4C_{1},C_{2},C_{3},C_{4} initialized on a fixed but arbitrary vertex. As stage 0 does not begin in any of the states we have defined, we begin by proving that by the end of stage 0 the cops can reach state (1).

Claim 1: After being initialized the cops can reach state (11).

Proof of Claim 1. Let u,vu,v be any pair of vertices in GG, with dist(u,v)=maxx,yVdist(x,y)\operatorname{dist}(u,v)=\max_{x,y\in V}\operatorname{dist}(x,y). Let PP be a shortest path between uu and vv. Lemma 3.4 implies that C1C_{1} can guard PP with the help of C2C_{2} after some finite number of rounds. When C2C_{2} is done assisting C1C_{1}, C2C_{2} is located on PP as per our proof of Lemma 3.4. From here have C3C_{3} and C4C_{4} move together onto PP, so that the robber cannot attack either cop without being captured. Then letting H0=PH_{0}=P the cops have reached state (11). Finish stage 0 here and proceed to stage 11. This completes the proof of Claim 1. \diamond

Claim 2: If stage i0i\geq 0 ended with the cops in state (11), then the cops can extend their territory in stage i+1i+1 while also achieving state (11), state (22), or state (33).

Proof of Claim 2. As the cops are currently in state (11), there is a path PP guarded by a cop, say C1C_{1}, and C2,C3,C4C_{2},C_{3},C_{4} all occupy vertices in PP. Let AA be the component of GPG-P that the robber is in at the end of stage ii. Note that as the cops can prevent the robber from crossing PP, Hi=GV(A)H_{i}=G-V(A).

Case (a): There exists exactly one vertex xx in V(P)V(P) such that N(x)V(A)N(x)\cap V(A)\neq\emptyset.

Let xV(P)x\in V(P) be such a vertex. If N(x)V(A)={y}N(x)\cap V(A)=\{y\}, then we note that yy is a vertex cut. Let C2C_{2} move to yy with the help of C3C_{3}. As yy is a vertex cut and the robber is in AA, the cops are now in state (33), and V(Hi+1)=V(Hi){y}V(H_{i+1})=V(H_{i})\cup\{y\}. At this point, end stage i+1i+1, as we have proved the induction hypothesis in this situation.

If |N(x)V(A)|2|N(x)\cap V(A)|\geq 2, then let y,zN(x)V(A)y,z\in N(x)\cap V(A). Notice that as AA is a connected component of GPG-P there is a path from yy to zz in AA. Let y,x1,,xk,zy,x_{1},\dots,x_{k},z be a shortest path from yy to zz in AA. Then, y,x1,,xk,z,xy,x_{1},\dots,x_{k},z,x is a shortest cycle in GG containing yy and zz. As GG is bipartite, we note that kk is odd. Hence, P1=x,y,,xk2P_{1}=x,y,\dots,x_{\lceil\frac{k}{2}\rceil} and P2=xk2,,z,xP_{2}=x_{\lceil\frac{k}{2}\rceil},\dots,z,x are shortest paths in GG. Lemma 3.4 implies that C2C_{2} can guard P2P_{2} with the help of C3C_{3}. Once, P2P_{2} is guarded, the robber cannot enter xx without being captured by C2C_{2}, so C1C_{1} is no longer needed to guard PP, given there is no way for the robber to enter GAG-A without first entering xx in P2P_{2}. From here Lemma 3.4 implies that C1C_{1} can guard P1P_{1} with the help of C4C_{4}. As xx is a vertex on this cycle, P1P2P_{1}\cup P_{2}, xx is guarded, and as xx is unique, all paths from vertices in AA to HiH_{i} pass through the paths that are guarded. Hence, Hi+1H_{i+1} has HiH_{i} as a strict subgraph and the cops are in state (22), so end stage i+1i+1, as we have proved the claim in this situation.

Case (b): There are at least two vertices x,yx,y in V(P)V(P) such that N(x)V(A)N(x)\cap V(A)\neq\emptyset and N(y)V(A)N(y)\cap V(A)\neq\emptyset.

Order the vertices of V(P)V(P) from v1,,vkv_{1},\dots,v_{k} so that P=v1,,vkP=v_{1},\dots,v_{k}. Let vi,vjV(P)v_{i},v_{j}\in V(P) be the unique pair of vertices satisfying that N(vi)V(A)N(v_{i})\cap V(A)\neq\emptyset and N(vj)V(A)N(v_{j})\cap V(A)\neq\emptyset and for all vrV(P)v_{r}\in V(P) satisfying N(vr)V(A)N(v_{r})\cap V(A)\neq\emptyset, it must be true that irji\leq r\leq j. There are two situations to consider. First, if N(vi)V(A)=N(vj)V(A)={y}N(v_{i})\cap V(A)=N(v_{j})\cap V(A)=\{y\}. Second, the case where N(vi)V(A)=N(vj)V(A)={y}N(v_{i})\cap V(A)=N(v_{j})\cap V(A)=\{y\} is not true.

If N(vi)V(A)=N(vj)V(A)={y}N(v_{i})\cap V(A)=N(v_{j})\cap V(A)=\{y\}, then yy is a vertex cut and we can extend the cop territory by moving to state (33), as in Case (a), when N(x)V(A)={y}N(x)\cap V(A)=\{y\}. So we suppose that N(vi)V(A)=N(vj)V(A){y}N(v_{i})\cap V(A)=N(v_{j})\cap V(A)\neq\{y\} is not true.

Then there exists a vertex yN(vi)V(A)y\in N(v_{i})\cap V(A) and zN(vj)V(A)z\in N(v_{j})\cap V(A) such that yzy\neq z. As AA is a connected component there is a path from yy to zz in AA. Let P1=y,x1,,xk,zP_{1}=y,x_{1},\dots,x_{k},z be a shortest y,zy,z path in AA. Lemma 3.4 implies that C2C_{2} can guard P1P_{1} with the help of C3C_{3}. Suppose that after C2C_{2} is guarding P1P_{1}, C3C_{3} remains on P1P_{1}.

If, given a fixed plane embedding of GG, the robber is on the exterior of the cycle

y,x1,,xk,z,vj,vj1,vi,y,x_{1},\dots,x_{k},z,v_{j},v_{j-1}\dots,v_{i},

then all paths from the current position of the robber to HiH_{i} or the interior of the aforementioned cycle pass through P1P_{1} by the planarity of GG. In this case move cops C1,C4C_{1},C_{4} to P1P_{1}, which can be done as C1C_{1} no longer needs to guard PP. Then the cops are in state (11) and Hi+1H_{i+1} contains HiH_{i} as a strict subgraph. So end stage i+1i+1, as we have proved the claim in this situation.

If the robber is on the interior of the cycle y,x1,,xk,z,vj,vj1,viy,x_{1},\dots,x_{k},z,v_{j},v_{j-1}\dots,v_{i}, in the same plane embedding of GG, then let P2=y,vi,,vj,zP_{2}=y,v_{i},\dots,v_{j},z. As PP was geodesic one cop, say C1C_{1}, which was previously guarding PP, can guard vi,,vjv_{i},\dots,v_{j}, while C2C_{2} guards P1P_{1}. Hence, P2P_{2} can be guarded by C1C_{1}, even without any further assistance by another cop. It follows by the planarity of GG, that the robber cannot leave the interior of the union of P1P_{1} and P2P_{2}. Note C3C_{3} is already on a vertex of P1P_{1}, while C4C_{4} is on a vertex of PP implying that C4C_{4} can move to a vertex of P2P_{2} without being attacked by the robber. Hence, the cops can move to state (22) and so that Hi+1H_{i+1} contains HiH_{i} as a strict subgraph. So end stage i+1i+1, as we have proved the claim in this situation.

This completes the proof of Claim 2. \diamond

Claim 3: If stage i0i\geq 0 ended with the cops in state (33), then the cops can extend their territory in stage i+1i+1 while also achieving state (11), state (22), or state (33).

Proof of Claim 3. As the cops are in state (33), a cop, say without loss of generality C1C_{1} guards a vertex cut vVv\in V and all paths from the robber to HiH_{i} contain vv. By assumption all the cops begin on vertices in HiH_{i} and therefore all cops can move to vv without risk of the robber attacking them. Suppose, without loss of generality, that all cops begin on vertex vv. Let AA denote the component on GvG-v that contains the robber.

If N(v)V(A)={u}N(v)\cap V(A)=\{u\}, then either AA has exactly one vertex uu, or uu is also a cut vertex. If AA is a component with a single vertex then the robber occupies uu and the cops can capture the robber on their next turn. If the robber attacks the cops on vv, then there are three other cops in N[v]N[v] who will capture the robber on their next cop turn, so the cops will capture the robber, making Hi+1=GH_{i+1}=G.

Suppose AA contains at least two vertices. Then uu is a cut vertex. In this case have all four cops move to uu. In this case Hi+1H_{i+1} is HiH_{i} with the addition of uu, implying that Hi+1H_{i+1} contains HiH_{i} as a strict subgraph, and as all cops occupy a cut vertex, we are once again in state (33). So if N(v)V(A)={u}N(v)\cap V(A)=\{u\}, then the induction hypothesis is satisfied, so end stage i+1i+1, as we have proved the claim in this situation.

Otherwise, vv has at least two neighbours in AA. Let u,wu,w be distinct vertices in N(v)V(A)N(v)\cap V(A). As AA is a connected component there exists a path from uu to ww contained in AA. Let P=u,x1,,xk,wP=u,x_{1},\dots,x_{k},w be a shortest path from uu to ww in AA. Then v,u,x1,,xk,wv,u,x_{1},\dots,x_{k},w is a cycle. As GG is bipartite, kk is odd. So P1=v,u,x1,,xk2P_{1}=v,u,x_{1},\dots,x_{\lceil\frac{k}{2}\rceil} and P2=xk2,xk21,,w,vP_{2}=x_{\lceil\frac{k}{2}\rceil},x_{\lceil\frac{k}{2}\rceil-1},\dots,w,v are both geodesic paths from vv to xk2x_{\lceil\frac{k}{2}\rceil}, by our assumption that PP is shortest. Thus, C2C_{2} can guard P1P_{1} with the assistance of C3C_{3} by Lemma 3.4. Once C2C_{2} is guarding P1P_{1}, C3C_{3} is on a vertex of P1P_{1}, then C3C_{3} can move back to vv without risking being attacked, given vv is a vertex of P1P_{1} and P1P_{1} is guarded. From here C3C_{3} can guard P2P_{2} with the help of C4C_{4}. The cops are now in state (22) with Hi+1H_{i+1} equal to HiH_{i} with the addition of the union of P1P_{1} and P2P_{2}. Hence, the induction hypothesis is also satisfied if |N(v)V(A)|>1|N(v)\cap V(A)|>1. So end stage i+1i+1, as we have proved the claim in this situation.

This concludes the proof of Claim 3. \diamond

Claim 4: If stage i0i\geq 0 ended with the cops in state (22), then the cops can extend their territory in stage i+1i+1 while also achieving state (11), state (22), or state (33).

Proof of Claim 4. As the cops are currently in state (22) there is a path P1P_{1} and a path P2P_{2} with the same endpoints, each of which is guarded by a separate cop. Furthermore, all paths from the robber to HiH_{i} contain vertices in P1P_{1} or P2P_{2}. Without loss of generality, suppose C1C_{1} guards P1P_{1} and C2C_{2} guards P2P_{2} and C3C_{3} and C4C_{4} both occupy vertices in the union of P1P_{1} and P2P_{2}. Let AA be the connected component of GP1P2G-P_{1}\cup P_{2} that the robber occupies.

Case (a): There exists exactly one vertex xx in V(P1)V(P2)V(P_{1})\cup V(P_{2}) such that N(x)V(A)N(x)\cap V(A)\neq\emptyset.

Suppose xx is the unique vertex in V(P1)V(P2)V(P_{1})\cup V(P_{2}) such that N(x)V(A)N(x)\cap V(A)\neq\emptyset. Recall that all paths from AA to HiH_{i} pass through P1P_{1} or P2P_{2}. Then all paths from AA to HiH_{i} pass through xx. It follows that xx is a cut vertex. Hence, C3C_{3} can move to xx without risking being attacked, given xx is a vertex in P1P_{1} or P2P_{2}. Once C3C_{3} occupies xx without being attacked on the first robber turn that C3C_{3} occupies xx, C3C_{3} guards xx as either the robber is adjacent to xx, in which case C3C_{3} captures the robber, or the robber is not adjacent to xx, at which point the robber cannot move adjacent to xx without being captured by C3C_{3}. As xx is a cut vertex, the cops are now in state (33).

At this point we have not shown that Hi+1H_{i+1} is strictly larger than HiH_{i}, so we have not proved the desired statement yet. So we do not end stage i+1i+1 here. We have shown however that we can reconfigure the cops into state (33). Hence, from this point we can prove the desired statement by applying the cop strategy described in Claim 3. It follows that in this case we have proven the induction statement.

Case (b): There exists exactly one vertex xV(P1)x\in V(P_{1}) and exactly one vertex yV(P2)y\in V(P_{2}) such that N(x)V(A)N(x)\cap V(A)\neq\emptyset and N(y)V(A)N(y)\cap V(A)\neq\emptyset.

Suppose that xV(P1)x\in V(P_{1}) and yV(P2)y\in V(P_{2}) are the unique vertices in P1P_{1} and P2P_{2} such that N(x)V(A)N(x)\cap V(A)\neq\emptyset and N(y)V(A)N(y)\cap V(A)\neq\emptyset. Let P=x,u,x1,,xk,v,yP=x,u,x_{1},\dots,x_{k},v,y be a shortest path from xx to yy with at least one internal vertex all of whose internal vertices are in AA. As AA is connected, PP exists.

Notice as C3C_{3} and C4C_{4} can move freely around the guarded paths P1P_{1} and P2P_{2}, C3C_{3} and C4C_{4} can both move to xx without risking being attacked by the robber. From this point Lemma 3.4 implies that C3C_{3} can guard PP with the help of C4C_{4}. Notice that this is slightly complicated by the fact that PP might not be a shortest path from xx to yy in GG, but instead is a shortest path from xx to yy through AA. This is not a problem however, as the robber is confined to AA by our assumption that all paths from the robber to HiH_{i} pass through P1P_{1} or P2P_{2}. Hence, PP is in fact (1,1)(1,1)-guardable under these conditions, as the robber can never take advantage of a path that has vertices in HiH_{i} from uu to vv, which is potentially shorter than PP.

As xx and yy are unique, {x,y}\{x,y\} is a vertex cut. Hence, once C3C_{3} guards PP all paths from the robber to vertices in V(Hi)V(P)V(H_{i})\cup V(P) pass through PP. It follows that now the cops are in state (11). Furthermore, PP contains at least one internal vertex, so Hi+1H_{i+1}, defined by HiH_{i} with the addition of all the internal vertices of PP, contains HiH_{i} as a strict subgraph. So we end stage i+1i+1, as we have proved the claim in this situation.

Case (c): Either P1P_{1} or P2P_{2} contain distinct vertices x,yx,y such that N(x)V(A)N(x)\cap V(A)\neq\emptyset and N(y)V(A)N(y)\cap V(A)\neq\emptyset.

Without loss of generality, suppose P1P_{1} contains at least two distinct vertices x,yx,y with neighbours in AA. Suppose that P1=v1,,vkP_{1}=v_{1},\dots,v_{k}, and let vi,vjv_{i},v_{j} be the vertices in P1P_{1} chosen so that viv_{i} and vjv_{j} have neighbours in AA and for all vrv_{r} if vrv_{r} has a neighbour in AA, then irji\leq r\leq j.

Let P3P_{3} be a shortest path from viv_{i} to vjv_{j} with at least one internal vertex all of whose internal vertices are in AA. Notice that P3P_{3} exists as viv_{i} and vjv_{j} have neighbours in AA and AA is a connected component.

Letting P3=vi,x1,,xt,vjP_{3}=v_{i},x_{1},\dots,x_{t},v_{j}, we define the path P4=v1,,vi,x1,,xt,vj,,vkP_{4}=v_{1},\dots,v_{i},x_{1},\dots,x_{t},v_{j},\dots,v_{k}. As P3P_{3} is a shortest path from viv_{i} to vjv_{j} whose internal vertices are in AA, and P1P_{1} is at least as short as any shortest path from v1v_{1} to vkv_{k} with internal vertices not in HiH_{i}, it follows that P4P_{4} is a shortest path from v1v_{1} to vkv_{k} with some vertex in AA as an internal vertex. Given P1P_{1} and P2P_{2} are guarded by C1C_{1} and C2C_{2}, P1P_{1} and P2P_{2} are in HiH_{i}, this implies that P4P_{4} can be guarded by C3C_{3} with the help of C4C_{4}, given Lemma 3.4.

Once C3C_{3} is guarding P4P_{4}, the planarity of GG implies that the robber is either on the interior of the cycle vi,vi+1,,vj,xt,xt1,,x1v_{i},v_{i+1},\dots,v_{j},x_{t},x_{t-1},\dots,x_{1}, or the robber is on the exterior of this cycle. If the robber is on the interior of this cycle, then P5=vi,vi+1,,vjP_{5}=v_{i},v_{i+1},\dots,v_{j} is a subpath of P1P_{1}, hence, C1C_{1} can move from guarding P1P_{1} to guarding P5P_{5}, without ever allowing the robber to leave the interior of the cycle. At this point P2P_{2} is on the exterior of the cycle P3P5P_{3}\cup P_{5}, so P2P_{2} does not need to be guarded, as the robber cannot cross P4P_{4} or P5P_{5}. Thus, cops C2C_{2} and C4C_{4} neither of which is on the interior of the cycle can make their way to vertices in P4P_{4} or P5P_{5} and the cops are again in state (22), while Hi+1H_{i+1} contains HiH_{i} as a strict subgraph, given P4P_{4} contains at least one internal vertex. Otherwise, if the robber is on the exterior of the cycle formed by P3P5P_{3}\cup P_{5}, then the robber must be on the interior of the cycle formed by P2P_{2} and P4P_{4}, by the planarity of GG and our choice of viv_{i} and vjv_{j}. By our assumption that for all vrv_{r} with neighbours in AA, irji\leq r\leq j, all paths from the robber to Hi+1H_{i+1}, which is now all vertices not on the interior of P2P_{2} and P4P_{4}, contain a vertex in P2P_{2} or P4P_{4}, implying that the cops are in state (22). So again the cops are again in state (22), while Hi+1H_{i+1} contains HiH_{i} as a strict subgraph, given P4P_{4} contains at least one internal vertex. So end stage i+1i+1, as we have proved the claim in this situation.

This completes the proof of Claim 4. \diamond

As this covers every possible case in our induction, we have now shown that for all i0i\geq 0, there is a cop strategy to make Hi+1H_{i+1} contain HiH_{i} as a strict subgraph, until such a time that Hk=GH_{k}=G, for some finite kk. Also recall that HkH_{k} is the cop territory, so if the robber is on a vertex in HkH_{k}, then they will be captured by the cops. As G=HkG=H_{k}, the robber must be in the cop territory, hence we conclude that four cops will capture the robber. This concludes the proof. ∎

4. Constructing Graphs where cc(H)c(H)=3\operatorname{cc}(H)-\operatorname{c}(H)=3

One of the main unanswered questions raised by Bonato et al. [6] is how large the difference can be between cop number and attacking cop number? It was shown in [6] that for any bipartite graph GG, cc(G)c(G)2\operatorname{cc}(G)-\operatorname{c}(G)\leq 2. Moreover, it was shown in [6] that cc(G)c(G)+2Δ(G)2\operatorname{cc}(G)\leq\operatorname{c}(G)+2\Delta(G)-2, so for graphs with bounded maximum degree, the cop number and attacking cop number are at most a constant apart. Is there an integer NN, such that for all graphs GG, cc(G)c(G)N\operatorname{cc}(G)-\operatorname{c}(G)\leq N? If not, is it possible there exists a constant 0<ε10<\varepsilon\leq 1 for which there are infinitely many integers kk and graphs GkG_{k} such that c(Gk)=k\operatorname{c}(G_{k})=k and cc(Gk)(1+ε)k\operatorname{cc}(G_{k})\geq(1+\varepsilon)k?

Unfortunately we were not able to answer these questions. However, we were able to make progress. As mentioned in the introduction, Bonato et al. [6] showed that the line graph of the Peterson graph has cop number 22 and attacking cop number 44. Hence, if NN exists, then N2N\geq 2. Furthermore, we cannot discount the possibility that there exists graphs with arbitrarily large cop number, whose attacking cop number is twice their cop number.

We prove that if NN exists, then N3N\geq 3 by providing 1717 graphs with cop number 33 and attacking cop number 66. We note that our construction, see Lemma 4.1, does not rely on hypergraphs, unlike Lemma 8 from [6], and as a result may be easier to use when constructing graphs with large attacking cop number. It may also be true that for k4k\geq 4, our method produces graphs HH with cc(H)=2k\operatorname{cc}(H)=2k and c(H)=k\operatorname{c}(H)=k. Unfortunately, given we use computer assistance to verify the cop number of our constructions, we cannot check any case where k4k\geq 4. This is because the smallest graphs HH which satisfy these assumptions for k4k\geq 4 are too large for our computers to handle.

The next lemma is the key observation used in our constructions. Before exploring that, we need the definition of the square of a graph. Given a graph GG, we define the square of GG, denoted G2G^{2}, to be the graph obtained by adding edges (u,v)(u,v) to GG for every pair u,vVu,v\in V such that dist(u,v)=2\operatorname{dist}(u,v)=2 in GG. We note that G2G^{2} is called the square of GG because the G2G^{2} is the reflexive graph containing no multiedges associated with the adjacency matrix of GG squared. We note that the square, and more generally the kthk^{\text{th}} power of a graph are well-studied objects, particularly as they relate to many algebraic graph invariants, as well as invariants related to graph distance.

Lemma 4.1.

If G=(V,E)G=(V,E) is a graph with girth at least 99 and minimum degree δ3\delta\geq 3, then cc(G2E)min{2δ,γ(G2E)}\operatorname{cc}(G^{2}-E)\geq\min\{2\delta,\gamma(G^{2}-E)\}.

Proof.

Let G=(V,E)G=(V,E) be a graph with girth at least 99 and minimum degree δ3\delta\geq 3, let H=G2EH=G^{2}-E, and k=min{2δ,γ(H)}k=\min\{2\delta,\gamma(H)\}. Thus, (u,v)E(H)(u,v)\in E(H) if and only if distG(u,v)=2\operatorname{dist}_{G}(u,v)=2. If k=γ(H)k=\gamma(H), then we note by Observation 1.1, that cc(H)k\operatorname{cc}(H)\leq k.

We aim to show that if t<2δt<2\delta cops do not begin the game in a dominating set, then the robber will win the game. Let t<2δt<2\delta be a fixed integer.

Suppose cops C1,,CtC_{1},\dots,C_{t} begin the game in an ideal formation in HH to capture the robber RR, subject to the constraint that this formation is not a dominating set. Identify each cop and the robber with the current vertex that they occupy, and update this as the game progresses. As the cops do not begin the game on a dominating set, there exists a vertex zVz\in V such that zN[Ci]z\notin N[C_{i}] for any 1it1\leq i\leq t. Let RR begin the game on such a vertex zz. Thus, the robber is guaranteed at least one turn to move before being captured.

Now suppose for the sake of contradiction that after some series of play it is the robber’s turn to move, but no matter where they move they will be captured on the next cop turn. If such a situation is impossible, then the robber will never be captured and it follows that tt cops beginning in a non-dominating set cannot catch the robber.

Given the definition of HH, for each vNG(R)v\in N_{G}(R), the neighbourhood of RR in GG, the vertices NG(v)N_{G}(v) form a clique which we call KvK_{v} in HH. Also note that as GG has girth at least 99 for all u,vNG(R)u,v\in N_{G}(R), V(Kv)V(Ku)={R}V(K_{v})\cap V(K_{u})=\{R\}. Furthermore, as GG has girth at least 99 for all u,vNG(R)u,v\in N_{G}(R) and xV(Kv){R}x\in V(K_{v})\setminus\{R\}, yV(Ku){R}y\in V(K_{u})\setminus\{R\}, N(x)N(y)={R}N(x)\cap N(y)=\{R\} in HH if uvu\neq v and N(x)N(y)=V(Ku)=V(Kv)N(x)\cap N(y)=V(K_{u})=V(K_{v}) in HH if u=vu=v.

As for all vNG(R)v\in N_{G}(R) the cops will capture the robber if the robber moves to xV(Kv){R}x\in V(K_{v})\setminus\{R\}, there exists a cop CC such that xNH[C]x\in N_{H}[C]. Then either there exists a cop CV(Kv)C\in V(K_{v}) or for all xV(Kv){R}x\in V(K_{v})\setminus\{R\}, there exists a cop CNH(x)V(Kv)C\in N_{H}(x)\setminus V(K_{v}). If there is a cop CC in V(Kv)V(K_{v}), then there must be a second cop adjacent to CC, otherwise the robber can avoid being captured for one more turn by attacking CC. As for all xV(Kv){R}x\in V(K_{v})\setminus\{R\} and yV(Ku){R}y\in V(K_{u})\setminus\{R\}, where uvu\neq v,

(N(x){R})(N(y){R})=\big{(}N(x)\setminus\{R\}\big{)}\cap\big{(}N(y)\setminus\{R\}\big{)}=\emptyset

the cop CC in V(Kv)V(K_{v}) and its neighbouring cop cannot guard vertices yV(Ku){R}y\in V(K_{u})\setminus\{R\}. Furthermore, given for all x,yV(Kv){R}x,y\in V(K_{v})\setminus\{R\},

(N(x)V(Kv))(N(y)V(Kv))=\big{(}N(x)\setminus V(K_{v})\big{)}\cap\big{(}N(y)\setminus V(K_{v})\big{)}=\emptyset

if there is no cop in V(Kv)V(K_{v}), then for each xV(Kv){R}x\in V(K_{v})\setminus\{R\} there must exists a distinct cop CxNH(x)V(Kv)C_{x}\in N_{H}(x)\setminus V(K_{v}). Additionally for each of these cops CxC_{x}, NH(Cx)NH(R)={x}N_{H}(C_{x})\cap N_{H}(R)=\{x\}. Hence, if there is no cop in V(Kv)V(K_{v}), then there must be at least |V(Kv){R}|=degG(v)1δ12|V(K_{v})\setminus\{R\}|=\deg_{G}(v)-1\geq\delta-1\geq 2 cops who are guarding vertices in KvK_{v}, and these cops cannot be guarding any other neighbour of RR in HH.

Thus, for each vNG(R)v\in N_{G}(R) there must be at least 22 cops guarding vertices in V(Kv)V(K_{v}) and these cops cannot guard vertices in V(Ku)V(K_{u}) for uvu\neq v. But this implies t2degG(v)2δt\geq 2\deg_{G}(v)\geq 2\delta contradicting our assumption that t<2δt<2\delta. Therefore, if t<2δt<2\delta cops do not begin the game in a dominating set, then the robber will win the game. This implies the desired result that cc(H)min{2δ,γ(G2E)}\operatorname{cc}(H)\geq\min\{2\delta,\gamma(G^{2}-E)\}. This concludes the proof. ∎

Given Lemma 4.1, to demonstrate an ε>0\varepsilon>0 such that there are infinitely many integers kk and graphs GkG_{k} such that c(Gk)=k\operatorname{c}(G_{k})=k and cc(Gk)(1+ε)k\operatorname{cc}(G_{k})\geq(1+\varepsilon)k, it suffices to find a family of graphs GG with arbitrarily large minimum degree δ\delta and girth at least 99, such that c(Gk2E)2δ1+ε\operatorname{c}(G_{k}^{2}-E)\leq\frac{2\delta}{1+\varepsilon}. This seems to be a hard problem for two reasons. First, graphs with large girth and large minimum degree are quite unintuitive. For proof of this one need look no further than the famous problem of proving the existence of graphs with high girth and high chromatic number, which was solved by Erdős. Second, we are aware of no way to bound the cop number of G2EG^{2}-E from above without computer assistance.

Despite this challenge, or perhaps because of it, we believe this problem to be quite interesting. It seems that in order to understand how the attacking cop number and cop number are different, we require a much better understanding of the cop number. Thus, the attacking cop number should be of interest not just for its own sake, but as understanding it will likely require better understanding of the cop number, and in all probability the development of new tools that can be applied in other pursuit-evasion games.

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758
12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758
Figure 5. The graph G1G_{1} (left) from [4, 10] and the graph H1=G12E(G1)H_{1}=G_{1}^{2}-E(G_{1}) (right).

As a result of these challenges, we rely on computer assistance to upper bound the cop number of G2EG^{2}-E. Given this, it is convenient for us to choose GG as small as possible, so that the problem remains computable. Fortunately, the graphs of smallest order with minimum degree 33 and girth 99 are known. These graphs are (3,9)(3,9)-cages, the first of which was discovered in [4], with all 1818 being later characterised in [10]. We adopt the labeling G1,,G18G_{1},\dots,G_{18} of the (3,9)(3,9)-cages given in [10]. All (3,9)(3,9)-cages are order 5858, and for each 1i181\leq i\leq 18 we let Hi=Gi2E(Gi)H_{i}=G_{i}^{2}-E(G_{i}). Note that for all iji\neq j, HiH_{i} and HjH_{j} are not isomorphic. This was verified by computer and can be checked at [13].

Next, we prove that 1717 of the 1818 graphs HiH_{i} have cop number 33 and attacking cop number 66. For an example of such a graph HH see Figure 5. Curiously, c(H18)>3\operatorname{c}(H_{18})>3, however we were unable to compute if c(H18)=4\operatorname{c}(H_{18})=4. We can verify that c(H18)>3\operatorname{c}(H_{18})>3 while not being able to verify if c(H18)=4\operatorname{c}(H_{18})=4 because the best known algorithm for checking if c(G)k\operatorname{c}(G)\leq k is given by [19] and is O(knk+2)O(kn^{k+2}) time, while the code we use from [1] implements an algorithm appearing [7] which is O(n3k+3)O(n^{3k+3}) time. The value of cc(H18)c(H18)\operatorname{cc}(H_{18})-\operatorname{c}(H_{18}) remains open.

Theorem 4.2.

For all 1i171\leq i\leq 17, c(Hi)=3\operatorname{c}(H_{i})=3 and cc(Hi)=6\operatorname{cc}(H_{i})=6.

Proof.

Consider GiG_{i} for a fixed but arbitrary 1i171\leq i\leq 17. It was shown in [4] that GiG_{i} is a (3,9)(3,9)-cage. That is, GiG_{i} is 33-regular and has girth 99. Then, letting Hi=Gi2E(Gi)H_{i}=G_{i}^{2}-E(G_{i}), we note that

γ(Hi)|V(Hi)|Δ(Hi)+1=587>8\gamma(H_{i})\geq\frac{|V(H_{i})|}{\Delta(H_{i})+1}=\frac{58}{7}>8

so Lemma 4.1 implies that cc(Hi)6\operatorname{cc}(H_{i})\geq 6.

For all 1i171\leq i\leq 17, c(Hi)3\operatorname{c}(H_{i})\leq 3 is verified using computer assistance. Our code is available at [13]. We use the networkx package [17] to construct our graphs and code appearing at [1] to compute cop numbers. From here, cc(Hi)2c(Hi)\operatorname{cc}(H_{i})\leq 2\operatorname{c}(H_{i}) implies that c(Hi)cc(Hi)262=3\operatorname{c}(H_{i})\geq\frac{\operatorname{cc}(H_{i})}{2}\geq\frac{6}{2}=3. Thus, c(Hi)=3\operatorname{c}(H_{i})=3 as required. Note that this implies 6cc(Hi)2c(Hi)=66\leq\operatorname{cc}(H_{i})\leq 2\operatorname{c}(H_{i})=6 so cc(Hi)=6\operatorname{cc}(H_{i})=6 as required. This completes the proof. ∎

5. Future Work

Despite being introduced over a decade ago and being, at least in the authors’ estimation, a natural variant, very little work has been done on Cops and Attacking Robbers. Given this, there remain many open questions regarding the attacking cop number. This section is devoted to introducing and motivating these questions.

To begin, can we extend the work from Section 3 to graphs which contain triangles? As demonstrated in Figure 2, doing this will be non-trivial as Lemma 2.3 is not true for graphs that contain triangles. We believe that solving this problem for all graphs is reasonable, and should be matter of future work.

Problem 5.1.

Characterise the connected graphs with attacking cop number 22.

Recalling that characterising graphs with attacking cop number 11 is easy, and every cop-win graph has attacking cop number 11 or 22, this problem reduces to characterising which graphs GG with cop number 22 have c(G)=cc(G)\operatorname{c}(G)=\operatorname{cc}(G). This begs the question, how important is the fact that c(G)=2=cc(G)\operatorname{c}(G)=2=\operatorname{cc}(G) as opposed to c(G)=k=cc(G)\operatorname{c}(G)=k=\operatorname{cc}(G) for some k>2k>2? More formally, observe the following question.

Question 5.2.

What are some sufficient conditions for a graph GG to satisfy c(G)=cc(G)\operatorname{c}(G)=\operatorname{cc}(G)? Can we identify any necessary conditions for this to be true?

We next move our attention to planar graphs. While we have shown that all bipartite planar graphs have attacking cop number at most 44, it remains unclear if there exists a planar graph with attacking cop number 55 or even 66. However, the only examples of graphs HH we know of with cc(H)c(H)>1\operatorname{cc}(H)-\operatorname{c}(H)>1 are far from being planar. We conjecture that this is no coincidence. Notice that if true, then Conjecture 5.3 would imply that all planar graphs have attacking cop number at most 44.

Conjecture 5.3.

For all planar graphs GG, cc(G)c(G)+1\operatorname{cc}(G)\leq\operatorname{c}(G)+1.

Along these same lines, we recall Theorem 9 from [6], which states that if GG is bipartite then cc(G)c(G)+2\operatorname{cc}(G)\leq\operatorname{c}(G)+2. We notice that all examples of a graphs HH we know of with cc(H)c(H)>1\operatorname{cc}(H)-\operatorname{c}(H)>1 contain triangles and are therefore not bipartite. As with planar graphs we do not believe this is a coincidence. However, bipartite graphs form a much more complicated class to study in pursuit-evasion games than planar graphs. As a result we do not believe there is sufficient evidence for us to conjecture that for all bipartite graphs GG, cc(G)c(G)+1\operatorname{cc}(G)\leq\operatorname{c}(G)+1. Instead we pose the following question.

Question 5.4.

Does there exist a bipartite graph GG with cc(G)=c(G)+2\operatorname{cc}(G)=\operatorname{c}(G)+2?

We now proceed to our discussion of general graphs. In particular, we will continue to focus on how large the difference between cop number and attacking cop number can be. We begin with the following conjecture, which was stated in plain text earlier in the paper.

Conjecture 5.5.

For all non-negative integers kk there exists a graph HH such that

cc(H)c(H)k.\operatorname{cc}(H)-\operatorname{c}(H)\geq k.

We note that there exists an even stronger conjecture we can make regarding this difference. That is, that for all kk, the upper bound cc(G)2c(G)=2k\operatorname{cc}(G)\leq 2\operatorname{c}(G)=2k from [6] is tight. We can state this more formally as follows.

Conjecture 5.6.

For all integers k4k\geq 4 there exists a graph HH such that c(H)=k\operatorname{c}(H)=k and

cc(H)=2c(H).\operatorname{cc}(H)=2\operatorname{c}(H).

It is unclear if Conjecture 5.6 is true and gaining intuition on the matter has proven challenging. Perhaps the best evidence of how challenging the problems is, is that constructing graphs HH with cc(H)c(H)2\operatorname{cc}(H)-\operatorname{c}(H)\geq 2 has proven nontrivial. To the authors knowledge, only 1818 such graphs are known, 1717 of which first appear in this paper and one of which is given in [6] (the line graph of the Peterson graph). Moreover all these graphs are obtained by a combination of a lower bound on attacking cop number using girth and minimum degree, see Lemma 8 from [6] and Lemma 4.1, and a direct computation of the cop number of a candidate graph. Such approaches will not generalise to large kk given computing the cop number of a graph is computationally hard for large kk. As a result, new tools, such as upper bounds on c(G2E)\operatorname{c}(G^{2}-E), are required to make further progress on this problem. This seems to be an exciting direction of study, as for graphs GG of large girth gg, the graph G2EG^{2}-E seems to exhibit many of the same properties as a graph of girth g/2g/2 despite containing large cliques. This relationship seems of natural interest given how often considering graphs of girth at least 55 is used to lower bound the cop number of a given class of graphs.

It may also be worthwhile to see how far the similarity between G2EG^{2}-E and a graph of girth g/2g/2 goes for its own sake. For example, does a result like the lower bound c(G)1g(δ1)g14\operatorname{c}(G)\geq\frac{1}{g}(\delta-1)^{\lfloor\frac{g-1}{4}\rfloor} where GG has girth gg and minimum degree δ\delta from [9] hold for graphs G2EG^{2}-E? Along these lines observe that if Conjecture 5.6 can be proven in the same way as Theorem 4.2, then this implies c(G2E)\operatorname{c}(G^{2}-E) would be much less than c(G)\operatorname{c}(G) for some graphs GG. A result which seems nontrivial in its own right.

Next, we conjecture that the line graph of the Peterson graph, and the constructions we give in Theorem 4.2 are minimal.

Conjecture 5.7.

Let HH is a graph with cc(H)c(H)k\operatorname{cc}(H)-\operatorname{c}(H)\geq k. If k=2k=2, then HH is order n15n\geq 15. If k=3k=3, then HH is order n58n\geq 58.

Finally, we ask a more specific question which we were unable to answer. That is, what is the cop number and attacking cop number of H18H_{18}? In particular, what is their difference?

Question 5.8.

What is the value of cc(H18)c(H18)\operatorname{cc}(H_{18})-\operatorname{c}(H_{18})?

Acknowledgements

M.E. Messinger acknowledges research support from NSERC (grant application 2018-04059). Melissa A. Huggan acknowledges research support from NSERC (grant application 2023-03395).

References

  • [1] Anton Afanassiev. k-fixed cop number. GitHub repository, 2017. https://github.com/Jabbath/Cop-Number.
  • [2] M. Aigner and M. Fromme. A game of cops and robbers. Discrete Applied Mathematics, 8(1):1–12, 1984.
  • [3] Sheikh Shakil Akhtar, Sandip Das, and Harmender Gahlawat. Cops and robber on butterflies, grids, and at-free graphs. Discrete Applied Mathematics, 345:231–245, 2024.
  • [4] Norman L. Biggs and MJ Hoare. A trivalent graph with 58 vertices and girth 9. Discrete Mathematics, 30(3):299–301, 1980.
  • [5] Anthony Bonato. An Invitation to Pursuit-Evasion Games and Graph Theory. American Mathematical Soc., 2022.
  • [6] Anthony Bonato, Stephen Finbow, Przemysław Gordinowicz, Ali Haidar, William B Kinnersley, Dieter Mitsche, Paweł Prałat, and Ladislav Stacho. The robber strikes back. In Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013, pages 3–12. Springer, 2014.
  • [7] Anthony Bonato and Richard J. Nowakowski. The game of cops and robbers on graphs. American Mathematical Soc., 2011.
  • [8] Peter Bradshaw and Seyyed Aliasghar Hosseini. Surrounding cops and robbers on graphs of bounded genus. arXiv preprint arXiv:1909.09916, 2019.
  • [9] Peter Bradshaw, Seyyed Aliasghar Hosseini, Bojan Mohar, and Ladislav Stacho. On the cop number of graphs of high girth. Journal of Graph Theory, 102(1):15–34, 2023.
  • [10] Gunnar Brinkmann, Brendan D McKay, and Carsten Saager. The smallest cubic graphs of girth nine. Combinatorics, Probability and Computing, 4(4):317–329, 1995.
  • [11] Nancy E. Clarke and Richard J. Nowakowski. Tandem-win graphs. Discrete Mathematics, 299(1-3):56–64, 2005.
  • [12] Alexander Clow. Graphs with large girth and small cop number. arXiv preprint arXiv:2306.00220, 2023.
  • [13] Alexander Clow. Coph-is-3-and-ccoph-is-6-check. GitHub repository, 2024. https://github.com/A-Clow/CopH-is-3-and-CCopH-is-6-check.
  • [14] Elias Dahlhaus, Peter Hammer, Frédéric Maffray, and Stephan Olariu. On domination elimination orderings and domination graphs. In Ernst W. Mayr, Gunther Schmidt, and Gottfried Tinhofer, editors, Graph-Theoretic Concepts in Computer Science, pages 81–92, Berlin, Heidelberg, 1995. Springer Berlin Heidelberg.
  • [15] Sandip Das and Harmender Gahlawat. Variations of cops and robbers game on grids. Discrete Applied Mathematics, 305:340–349, 2021.
  • [16] Peter Frankl. Cops and robbers in graphs with large girth and cayley graphs. Discrete Applied Mathematics, 17(3):301–305, 1987.
  • [17] Aric A. Hagberg, Daniel A. Schult, and Pieter J. Swart. Exploring network structure, dynamics, and function using networkx. In Gaël Varoquaux, Travis Vaught, and Jarrod Millman, editors, Proceedings of the 7th Python in Science Conference, pages 11 – 15, Pasadena, CA USA, 2008.
  • [18] Richard Nowakowski and Peter Winkler. Vertex-to-vertex pursuit in a graph. Discrete Mathematics, 43(2-3):235–239, 1983.
  • [19] Jan Petr, Julien Portier, and Leo Versteegen. A faster algorithm for cops and robbers. Discrete Applied Mathematics, 320:11–14, 2022.
  • [20] Alain Quilliot. Problemes de jeux, de point fixe, de connectivité et de représentation sur des graphes, des ensembles ordonnés et des hypergraphes. These d’Etat, Université de Paris VI, pages 131–145, 1983.