IDEAS home Printed from https://ideas.repec.org/r/eee/reensy/v92y2007i9p1183-1203.html
   My bibliography  Save this item

Identification of critical locations across multiple infrastructures for terrorist actions

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as


Cited by:

  1. Chao Zhang & Jingjing Kong & Slobodan P Simonovic, 2018. "Modeling joint restoration strategies for interdependent infrastructure systems," PLOS ONE, Public Library of Science, vol. 13(4), pages 1-18, April.
  2. Volkanovski, Andrija & ÄŒepin, Marko & Mavko, Borut, 2009. "Application of the fault tree analysis for assessment of power system reliability," Reliability Engineering and System Safety, Elsevier, vol. 94(6), pages 1116-1127.
  3. Mishra, Vishrut Kumar & Palleti, Venkata Reddy & Mathur, Aditya, 2019. "A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system," International Journal of Critical Infrastructure Protection, Elsevier, vol. 26(C).
  4. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
  5. Bricha, Naji & Nourelfath, Mustapha, 2014. "Extra-capacity versus protection for supply networks under attack," Reliability Engineering and System Safety, Elsevier, vol. 131(C), pages 185-196.
  6. Chi Zhang & Jose Ramirez-Marquez, 2013. "Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information," IISE Transactions, Taylor & Francis Journals, vol. 45(3), pages 244-258.
  7. Ouyang, Min, 2016. "Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 154(C), pages 106-116.
  8. Scott Thacker & Stuart Barr & Raghav Pant & Jim W. Hall & David Alderson, 2017. "Geographic Hotspots of Critical National Infrastructure," Risk Analysis, John Wiley & Sons, vol. 37(12), pages 2490-2505, December.
  9. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
  10. Baraldi, Piero & Castellano, Andrea & Shokry, Ahmed & Gentile, Ugo & Serio, Luigi & Zio, Enrico, 2020. "A Feature Selection-based Approach for the Identification of Critical Components in Complex Technical Infrastructures: Application to the CERN Large Hadron Collider," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
  11. Huang, Wencheng & Li, Linqing & Liu, Hongyi & Zhang, Rui & Xu, Minhao, 2021. "Defense resource allocation in road dangerous goods transportation network: A Self-Contained Girvan-Newman Algorithm and Mean Variance Model combined approach," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
  12. Zio, E. & Golea, L.R., 2012. "Analyzing the topological, electrical and reliability characteristics of a power transmission system for identifying its critical elements," Reliability Engineering and System Safety, Elsevier, vol. 101(C), pages 67-74.
  13. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
  14. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
  15. T. R. Wang & N. Pedroni & E. Zio & V. Mousseau, 2020. "Identification of Protective Actions to Reduce the Vulnerability of Safety‐Critical Systems to Malevolent Intentional Acts: An Optimization‐Based Decision‐Making Approach," Risk Analysis, John Wiley & Sons, vol. 40(3), pages 565-587, March.
  16. Ouyang, Min & Liu, Chuang & Wu, Shengyu, 2020. "Worst-case vulnerability assessment and mitigation model of urban utility tunnels," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
  17. Johansson, Jonas & Hassel, Henrik, 2010. "An approach for modelling interdependent infrastructures in the context of vulnerability analysis," Reliability Engineering and System Safety, Elsevier, vol. 95(12), pages 1335-1344.
  18. Fang, Yiping & Sansavini, Giovanni, 2017. "Optimizing power system investments and resilience against attacks," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 161-173.
  19. Min Ouyang & Hui Tian & Zhenghua Wang & Liu Hong & Zijun Mao, 2019. "Critical Infrastructure Vulnerability to Spatially Localized Failures with Applications to Chinese Railway System," Risk Analysis, John Wiley & Sons, vol. 39(1), pages 180-194, January.
  20. Ouyang, Min, 2014. "Review on modeling and simulation of interdependent critical infrastructure systems," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 43-60.
  21. Adam Behrendt & Vineet M. Payyappalli & Jun Zhuang, 2019. "Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1358-1381, June.
  22. K Hausken & G Levitin, 2009. "Parallel systems with different types of defence resource expenditure under two sequential attacks," Journal of Risk and Reliability, , vol. 223(1), pages 71-85, March.
  23. Bompard, E. & Napoli, R. & Xue, F., 2009. "Assessment of information impacts in power system security against malicious attacks in a general framework," Reliability Engineering and System Safety, Elsevier, vol. 94(6), pages 1087-1094.
  24. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
  25. Li, Tao & Rong, Lili & Yan, Kesheng, 2019. "Vulnerability analysis and critical area identification of public transport system: A case of high-speed rail and air transport coupling system in China," Transportation Research Part A: Policy and Practice, Elsevier, vol. 127(C), pages 55-70.
  26. Zhang, Zili & Li, Xiangyang & Li, Hengyun, 2015. "A quantitative approach for assessing the critical nodal and linear elements of a railway infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 8(C), pages 3-15.
  27. H. Moel & B. Jongman & H. Kreibich & B. Merz & E. Penning-Rowsell & P. Ward, 2015. "Flood risk assessments at different spatial scales," Mitigation and Adaptation Strategies for Global Change, Springer, vol. 20(6), pages 865-890, August.
  28. Ouyang, Min & Zhao, Lijing & Hong, Liu & Pan, Zhezhe, 2014. "Comparisons of complex network based models and real train flow model to analyze Chinese railway vulnerability," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 38-46.
  29. La Rovere, Stefano & Vestrucci, Paolo, 2012. "Investigation of the structure of a networked system," Reliability Engineering and System Safety, Elsevier, vol. 107(C), pages 214-223.
  30. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
  31. Utne, I.B. & Hokstad, P. & Vatn, J., 2011. "A method for risk modeling of interdependencies in critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 96(6), pages 671-678.
  32. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
  33. Mohammad Bagher Abolhasani Jabali & Mohammad Hosein Kazemi, 2017. "Power System Event Ranking Using a New Linear Parameter-Varying Modeling with a Wide Area Measurement System-Based Approach," Energies, MDPI, vol. 10(8), pages 1-14, July.
  34. Jenelius, Erik & Mattsson, Lars-Göran, 2012. "Road network vulnerability analysis of area-covering disruptions: A grid-based approach with case study," Transportation Research Part A: Policy and Practice, Elsevier, vol. 46(5), pages 746-760.
  35. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
  36. Hong, Liu & Ouyang, Min & Peeta, Srinivas & He, Xiaozheng & Yan, Yongze, 2015. "Vulnerability assessment and mitigation for the Chinese railway system under floods," Reliability Engineering and System Safety, Elsevier, vol. 137(C), pages 58-68.
  37. Grant, Matthew J. & Stewart, Mark G., 2017. "Modelling improvised explosive device attacks in the West – Assessing the hazard," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 345-354.
  38. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.
  39. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
  40. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.
  41. Zio, E., 2009. "Reliability engineering: Old problems and new challenges," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 125-141.
  42. Liu, Huan & Tatano, Hirokazu & Pflug, Georg & Hochrainer-Stigler, Stefan, 2021. "Post-disaster recovery in industrial sectors: A Markov process analysis of multiple lifeline disruptions," Reliability Engineering and System Safety, Elsevier, vol. 206(C).
  43. Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.
  44. Ahmed Ali A. Mohamed, 2019. "On the Rising Interdependency between the Power Grid, ICT Network, and E-Mobility: Modeling and Analysis," Energies, MDPI, vol. 12(10), pages 1-17, May.
  45. Caroline A Johnson & Allison C Reilly & Roger Flage & Seth D Guikema, 2021. "Characterizing the robustness of power-law networks that experience spatially-correlated failures," Journal of Risk and Reliability, , vol. 235(3), pages 403-415, June.
  46. Jaradat, Ra’ed M. & Keating, Charles B., 2014. "Fragility of oil as a critical infrastructure problem," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(2), pages 86-99.
  47. Yuan, Wei & Zhao, Long & Zeng, Bo, 2014. "Optimal power grid protection through a defender–attacker–defender model," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 83-89.
  48. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
  49. Deng, Yu-Jing & Li, Ya-Qian & Qin, Yu-Hua & Dong, Ming-Ru & Liu, Bin, 2020. "Optimal defense resource allocation for attacks in wireless sensor networks based on risk assessment model," Chaos, Solitons & Fractals, Elsevier, vol. 137(C).
  50. Ouyang, Min, 2017. "A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1072-1084.
  51. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
  52. Reilly, Allison C. & Baroud, Hiba & Flage, Roger & Gerst, Michael D., 2021. "Sources of uncertainty in interdependent infrastructure and their implications," Reliability Engineering and System Safety, Elsevier, vol. 213(C).
  53. Ahmed Shokry & Piero Baraldi & Andrea Castellano & Luigi Serio & Enrico Zio, 2021. "Identification of Critical Components in the Complex Technical Infrastructure of the Large Hadron Collider Using Relief Feature Ranking and Support Vector Machines," Energies, MDPI, vol. 14(18), pages 1-19, September.
  54. Almoghathawi, Yasser & Selim, Shokri & Barker, Kash, 2023. "Community structure recovery optimization for partial disruption, functionality, and restoration in interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
  55. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
  56. Levitin, Gregory & Ben-Haim, Hanoch, 2008. "Importance of protections against intentional attacks," Reliability Engineering and System Safety, Elsevier, vol. 93(4), pages 639-646.
  57. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
  58. Kjell Hausken & Gregory Levitin, 2011. "Shield versus sword resource distribution in K-round duels," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 19(4), pages 589-603, December.
  59. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
  60. Monroe, Jacob & Ramsey, Elizabeth & Berglund, Emily, 2018. "Allocating countermeasures to defend water distribution systems against terrorist attack," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 37-51.
  61. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.