Resilience-Based Component Importance Measures for Critical Infrastructure Network Systems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Vulnerability Importance Measures Toward Resilience-Based Network Design

Network resilience to a disruption is generally considered to be a function of the initial impact of the disruption (the network’s vulnerability) and the trajectory of recovery after the disruption (the network’s recoverability). In the context of network resilience, this work develops and compares several flow-based importance measures to prioritize network edges for the implementation of prep...

متن کامل

Defining policies to improve critical infrastructure resilience

Industrial accidents increasingly threaten society and economy; the increasing exposure and vulnerability of our modern interlaced societies contributes to intensifying their impact. Critical Infrastructures (CIs) have a prominent role, since they are vital for the welfare of the population and essential for the economic growth. As hazards are hard to predict, decision-makers need to implement ...

متن کامل

Resilience of Hierarchical Critical Infrastructure Networks

Concern over the resilience of critical infrastructure networks has increased dramatically over the last decade due to a number of well documented failures and the significant disruption associated with these. This has led to a large body of research that has adopted graph-theoretic based analysis in order to try and improve our understanding of infrastructure network resilience. Many studies h...

متن کامل

Network Randomization and Dynamic Defense for Critical Infrastructure Systems

Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation’s most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Reliability

سال: 2016

ISSN: 0018-9529,1558-1721

DOI: 10.1109/tr.2016.2521761