Modeling infrastructure interdependencies by integrating network and fuzzy set theory

被引:28
作者
Lam, C. Y. [1 ]
Tai, K. [2 ]
机构
[1] Hiroshima Univ, Grad Sch Engn, Hiroshima 7398527, Japan
[2] Nanyang Technol Univ, Sch Mech & Aerosp Engn, Singapore 639798, Singapore
关键词
Infrastructure network; Network interdependency; Network theory; Fuzzy set theory; VULNERABILITY; ATTACK;
D O I
10.1016/j.ijcip.2018.05.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Infrastructure interdependency refers to the bidirectional relationship between entities, and means that the state of one entity is influenced by or correlated to the state of the other. Although some interdependencies in infrastructure networks can be modeled deterministically, often the required data are incomplete or there is an element of randomness in the relationships, necessitating the use of stochastic models. In this paper, the concepts and techniques of network and fuzzy set theory are integrated, and a fuzzy modeling approach is proposed to better identify and understand interdependencies and the relationships and connections between entities in infrastructure networks. This approach will allow the topo-logical structures and characteristics of the network to be better understood for further evaluation and analysis. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:51 / 61
页数:11
相关论文
共 43 条
  • [31] Identifying, understanding, and analyzing critical infrastructure interdependencies
    Rinaldi, Steven M.
    Peerenboom, James P.
    Kelly, Terrence K.
    [J]. IEEE Control Systems Magazine, 2001, 21 (06): : 11 - 25
  • [32] Rinaldi SM, 2004, P HAW INT C SYST SCI, P54
  • [33] Critical infrastructure dependency assessment using the input-output inoperability model
    Setola, Roberto
    De Porcellinis, Stefano
    Sforna, Marino
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2009, 2 (04) : 170 - 178
  • [34] Shaolin Wang, 2013, Journal of Networks, V8, P1448, DOI 10.4304/jnw.8.6.1448-1454
  • [35] Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures
    Stergiopoulos, George
    Kotzanikolaou, Panayiotis
    Theocharidou, Marianthi
    Lykou, Georgia
    Gritzalis, Dimitris
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2016, 12 : 46 - 60
  • [36] Tolone WJ, 2004, LECT NOTES COMPUT SC, V3073, P214
  • [37] Vulnerability analysis of interdependent infrastructure systems under edge attack strategies
    Wang, Shuliang
    Hong, Liu
    Ouyang, Min
    Zhang, Jianhua
    Chen, Xueguang
    [J]. SAFETY SCIENCE, 2013, 51 (01) : 328 - 337
  • [38] Wang Y, 2003, IEEE T KNOWL DATA EN, V15, P764, DOI 10.1109/TKDE.2003.1198405
  • [39] Wolthusen S. D., 2007, Information Security Technical Report, V12, P44, DOI 10.1016/j.istr.2007.02.005
  • [40] Yazdani M., 2012, Journal of Management Research, V4, P1