Vulnerability assessment of chemical facilities to intentional attacks based on Bayesian Network
نویسندگان
چکیده
منابع مشابه
Effective measurement of network vulnerability under random and intentional attacks
The study of the security and stability of complex networks plays a central role in reducing the risk and consequences of attacks or disfunctions of any type. The concept of vulnerability helps to measure the response of complex networks subjected to attacks on vertices and edges and it allows to spot the critical component of a network in order to improve its security. We introduce an accurate...
متن کاملA note on measurement of network vulnerability under random and intentional attacks
In this paper we propose an alternative approach for the assessment of network vulnerability under random and intentional attacks as compared to the results obtained from the “vulnerability function”given by Criado et al. [Int. J. Comput. Math., 86 (2)(2009), pp. 209-218]. By using spectral and statistical measurements, we assess robustness as the antonym to vulnerability of complex networks an...
متن کاملassessment of the efficiency of s.p.g.c refineries using network dea
data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...
On the Vulnerability of Network Mechanisms to Sophisticated Attacks
The design of computer and communication systems has been based, for decades, on the fundamental assumption that the objective of all users is to improve their own performance. In recent years we have witnessed a wave of DDoS attacks threatening the welfare of the internet. These are launched by malicious users whose pure incentive is to degrade the performance of other, innocent, users. The tr...
متن کاملComplex networks vulnerability to module-based attacks
In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaking complex networks is attracting much attention from practical points of view. In this contribution we present a module-based method to efficiently break complex networks. The procedure first identifies the communities in which the network can be represented, then it deletes the nodes (edges) th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Reliability Engineering & System Safety
سال: 2018
ISSN: 0951-8320
DOI: 10.1016/j.ress.2017.09.023