Exploring the vulnerability of network infrastructure to disruption

被引:0
作者
Timothy C. Matisziw
Alan T. Murray
Tony H. Grubesic
机构
[1] University of Missouri-Columbia,Department of Geography and Department of Civil & Environmental Engineering
[2] Arizona State University,School of Geographical Sciences
[3] Indiana University,Department of Geography
来源
The Annals of Regional Science | 2009年 / 43卷
关键词
C61; R53; R40; O21;
D O I
暂无
中图分类号
学科分类号
摘要
Disruption of network facilities (nodes or arcs) resulting in loss of system functionality is of particular concern in the operation of critical network infrastructures. In preparing for events such as natural disasters, accidents, and/or sabotage, numerous disruption possibilities exist for any network and efforts to safeguard against the most destructive of those are often sought. Although, many approaches exist for identifying network vulnerabilities, mathematical programming and simulation are typically used as exploratory approaches for uncovering potentially important disruption scenarios. Mathematical programming approaches can identify bounds on network vulnerability while simulation can provide important insights to complement these bounds, as well as provide insights in cases where mathematical programming is not practical. This research presents a simulation methodology for evaluating network vulnerability to disruption. A case study illustrates the complexities associated with planning for such events.
引用
收藏
相关论文
共 25 条
[1]  
Church RL(2004)Identifying critical infrastructure: the median and covering facility interdiction problems Ann Assoc Am Geogr 94 491-502
[2]  
Scaparra MP(2008)Comparative approaches for assessing network vulnerability Int Reg Sci Rev 31 88-112
[3]  
Middleton RS(2003)A Geographic perspective on commercial internet survivability Telematics Informatics 20 51-69
[4]  
Grubesic TH(2002)Shortest-path network interdiction Networks 40 97-111
[5]  
Matisziw TC(2005)Importance and exposure in road network vulnerability analysis Transport Res Part A 40 537-560
[6]  
Murray AT(2007)Critical network infrastructure analysis: interdiction and system flow J Geogr Syst 9 103-117
[7]  
Snediker D(1975)Finding the Manage Sci 21 531-539
[8]  
Grubesic TH(2004) most vital links in flow networks IEEE Trans Power Syst 19 905-912
[9]  
O’Kelly ME(1993)Analysis of electric grid security under terrorist threat Math Comp Model 17 1-18
[10]  
Murray AT(undefined)Deterministic network interdiction undefined undefined undefined-undefined