A Novel Risk-Based Prioritization Approach for Wireless Sensor Network Deployment in Pipeline Networks
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Peter J. Diggle & Barry S. Rowlingson, 1994. "A Conditional Approach to Point Process Modelling of Elevated Risk," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 157(3), pages 433-440, May.
- Henry H. Willis, 2007. "Guiding Resource Allocations Based on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 597-606, June.
- P. Sprent, 2007. "An Introduction to Categorical Data Analysis," Journal of the Royal Statistical Society Series A, Royal Statistical Society, vol. 170(4), pages 1178-1178, October.
- Barbara Tchórzewska-Cieślak & Katarzyna Pietrucha-Urbanik, 2018. "Approaches to Methods of Risk Analysis and Assessment Regarding the Gas Supply to a City," Energies, MDPI, vol. 11(12), pages 1-13, November.
- Marlow, David R. & Beale, David J. & Mashford, John S., 2012. "Risk-based prioritization and its application to inspection of valves in the water sector," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 67-74.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Agnieszka Kuś & Dorota Grego-Planer, 2021. "A Model of Innovation Activity in Small Enterprises in the Context of Selected Financial Factors: The Example of the Renewable Energy Sector," Energies, MDPI, vol. 14(10), pages 1-17, May.
- Rogerson, Ellen C. & Lambert, James H., 2012. "Prioritizing risks via several expert perspectives with application to runway safety," Reliability Engineering and System Safety, Elsevier, vol. 103(C), pages 22-34.
- Alberti, Alexandre R. & Cavalcante, Cristiano A.V. & Scarf, Philip & Silva, André L.O., 2018. "Modelling inspection and replacement quality for a protection system," Reliability Engineering and System Safety, Elsevier, vol. 176(C), pages 145-153.
- Terje Aven, 2012. "Foundational Issues in Risk Assessment and Risk Management," Risk Analysis, John Wiley & Sons, vol. 32(10), pages 1647-1656, October.
- Jon T Selvik & Eirik B Abrahamsen, 2017. "On the meaning of accuracy and precision in a risk analysis context," Journal of Risk and Reliability, , vol. 231(2), pages 91-100, April.
- Kabir, Golam & Tesfamariam, Solomon & Francisque, Alex & Sadiq, Rehan, 2015. "Evaluating risk of water mains failure using a Bayesian belief network model," European Journal of Operational Research, Elsevier, vol. 240(1), pages 220-234.
- Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
- Cucala, Lionel, 2009. "A flexible spatial scan test for case event data," Computational Statistics & Data Analysis, Elsevier, vol. 53(8), pages 2843-2850, June.
- Michael Greenberg, 2011. "Risk analysis and port security: some contextual observations and considerations," Annals of Operations Research, Springer, vol. 187(1), pages 121-136, July.
- Yacov Y. Haimes & Kenneth Crowther & Barry M. Horowitz, 2008. "Homeland security preparedness: Balancing protection with resilience in emergent systems," Systems Engineering, John Wiley & Sons, vol. 11(4), pages 287-308, December.
- Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.
- Robert Brigantic & Jennifer Willis & Rachel Pulliam & Brian Lewis & Julianna Puccio & Kathryn Otte & Emily Bonus & Brenda Forland & Nick Betzsold & Atithi Bharth & Jonathan Mills & Casey Perkins, 2024. "Aviation security screening optimizer for risk and throughput (ASSORT)," Journal of Transportation Security, Springer, vol. 17(1), pages 1-26, December.
- Hui Huang & Xiaomei Ma & Rasmus Waagepetersen & Theodore R. Holford & Rong Wang & Harvey Risch & Lloyd Mueller & Yongtao Guan, 2014. "A New Estimation Approach for Combining Epidemiological Data From Multiple Sources," Journal of the American Statistical Association, Taylor & Francis Journals, vol. 109(505), pages 11-23, March.
- Ruipeng Tong & Yanwei Zhang & Pengcheng Cui & Cunli Zhai & Meng Shi & Surui Xu, 2018. "Characteristic Analysis of Unsafe Behavior by Coal Miners: Multi-Dimensional Description of the Pan-Scene Data," IJERPH, MDPI, vol. 15(8), pages 1-18, July.
- Nelson B. Walker & Trevor J. Hefley & Daniel P. Walsh, 2020. "Bias correction of bounded location error in binary data," Biometrics, The International Biometric Society, vol. 76(2), pages 530-539, June.
- Marco Cinelli & Matteo Spada & Miłosz Kadziński & Grzegorz Miebs & Peter Burgherr, 2019. "Advancing Hazard Assessment of Energy Accidents in the Natural Gas Sector with Rough Set Theory and Decision Rules," Energies, MDPI, vol. 12(21), pages 1-17, November.
- Chong Li & Yingqi Li, 2023. "Factors Influencing Public Risk Perception of Emerging Technologies: A Meta-Analysis," Sustainability, MDPI, vol. 15(5), pages 1-37, February.
- Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
- Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
- Robin L. Dillon & Robert M. Liebe & Thomas Bestafka, 2009. "Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 321-335, March.
More about this item
Keywords
wireless sensor network deployment; pipeline network; risk-based prioritization; inhomogeneous Poisson point process; condition monitoring; coverage problem;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:13:y:2020:i:6:p:1512-:d:335702. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.