Measuring Road Network Vulnerability with Sensitivity Analysis
نویسندگان
چکیده
منابع مشابه
Measuring Road Network Vulnerability with Sensitivity Analysis
This paper focuses on the development of a method for road network vulnerability analysis, from the perspective of capacity degradation, which seeks to identify the critical infrastructures in the road network and the operational performance of the whole traffic system. This research involves defining the traffic utility index and modeling vulnerability of road segment, route, OD (Origin Destin...
متن کاملLarge-Scale Road Network Vulnerability Analysis
Disruptions in the transport system can have severe impacts for affected individuals, businesses and the society as a whole. In this research, vulnerability is seen as the risk of unplanned system disruptions, with a focus on large, rare events. Vulnerability analysis aims to provide decision support regarding preventive and restorative actions, ideally as an integrated part of the planning pro...
متن کاملRoad network vulnerability analysis: Conceptualization, implementation and application
The paper describes a process for road network vulnerability analysis, from (i) the conceptual definition of vulnerability measures, through (ii) the derivation of practical indicators and models adapted to available data and their implementation in computational procedures, to (iii) the application of the methodology in case studies. In the first step, the vulnerability concept is defined and ...
متن کاملAttacker-defender models and road network vulnerability.
The reliability of road networks depends directly on their vulnerability to disruptive incidents, ranging in severity from minor disruptions to terrorist attacks. This paper presents a game theoretic approach to the analysis of road network vulnerability. The approach posits predefined disruption, attack or failure scenarios and then considers how to use the road network so as to minimize the m...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: PLOS ONE
سال: 2017
ISSN: 1932-6203
DOI: 10.1371/journal.pone.0170292