Determinants of Critical Infrastructure Resources

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Infrastructure to Manage Resources

One of the more diffuse problems with information technology (IT) is that both users and their IT-supporters and IT-administrators have the feeling that IT leads to more work to be done. Since the boom of the WWW this got even worse. On one hand we have an easy way of making information available, on the other hand we have all the maintainance work with it. The problem is that much of the infor...

متن کامل

Optimal Allocation of Multiple Emergency Service Resources for Critical Transportation Infrastructure Protection

Optimal deployment of limited emergency resources in a large-scale area is of interests to public agencies at all levels. In this paper, the problem of allocating limited emergency service vehicles including fire engines, fire trucks and ambulances among a set of candidate stations is formulated as a mixed integer linear programming model, in which the objective is to maximize the service cover...

متن کامل

Defending Critical Infrastructure

We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions by attacker and defender. We illustrate with examples of the US Strategic Petroleum Reserve, the US Border Patrol at Yuma, Arizona, and an ele...

متن کامل

Critical infrastructure protection

The protection of Critical Infrastructures (CIs) has become one of the most cutting-edge research areas in recent years. There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure’ against different attacks. This is because information is out of control of the owner. The traditional device – centric security systems are not efficient eno...

متن کامل

Critical Infrastructure Attack Modeling

The development and connection of information and communication technologies with industrial control systems in the so-called critical infrastructure have contributed to the emergence of new complex threats. The critical infrastructure has become a target of sophisticated cyber attacks which exploit several, also unknown, vulnerabilities in one course of an attack. The paper proposes an attack ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Foundations of Management

سال: 2017

ISSN: 2300-5661

DOI: 10.1515/fman-2017-0025