Please use this identifier to cite or link to this item: http://hdl.handle.net/10553/76244
DC FieldValueLanguage
dc.contributor.authorRocco S., Claudio M.en_US
dc.contributor.authorSalazar A., Daniel E.en_US
dc.contributor.authorZio, Enricoen_US
dc.date.accessioned2020-12-02T14:19:18Z-
dc.date.available2020-12-02T14:19:18Z-
dc.date.issued2009en_US
dc.identifier.issn0973-1318en_US
dc.identifier.otherScopus-
dc.identifier.urihttp://hdl.handle.net/10553/76244-
dc.description.abstractThis paper presents the application of advanced computational techniques developed by the authors for evaluating the vulnerability characteristics of network systems exposed to harmful events. The physical system is modeled as a network (graph) of nodes interconnected by links. Uncertainties on the propagation and effects of an attack are modeled by probability distributions on the times of propagation through the network links and the numbers of people affected at the network nodes reached by the hazard. The impact of an attack is quantified by simulating the propagation of the hazard through the network nodes and links, by means of a combination of cellular automata and Monte Carlo simulation. The vulnerability assessment is embedded within a systematic multiple-objective optimization analysis aimed at identifying the optimal protective scheme which minimizes the average impact in terms of entities affected and hazard propagation time. The vulnerabilities and relative protection schemes of two networks of realistic size are systematically analyzed by the proposed approach for testing the procedure and identifying its strengths and weaknesses. © RAMS Consultants Printed in India.en_US
dc.languageengen_US
dc.relation.ispartofInternational Journal of Performability Engineeringen_US
dc.sourceInternational Journal of Performability Engineering[ISSN 0973-1318],v. 5 (1), p. 71-84, (Abril 2009)en_US
dc.subject3306 Ingeniería y tecnología eléctricasen_US
dc.subject120710 Redes de flujoen_US
dc.subject.otherDistributed Networksen_US
dc.subject.otherMonte Carlo Simulationen_US
dc.subject.otherVulnerability Assessmenten_US
dc.titleApplication of advanced computational techniques to the vulnerability assessment of network systems exposed to uncertain harmful eventsen_US
dc.typeinfo:eu-repo/semantics/Articleen_US
dc.typeArticleen_US
dc.identifier.scopus64549130025-
dc.contributor.authorscopusid7004508307-
dc.contributor.authorscopusid56240751500-
dc.contributor.authorscopusid7005289082-
dc.description.lastpage84en_US
dc.identifier.issue1-
dc.description.firstpage71en_US
dc.relation.volume5en_US
dc.investigacionIngeniería y Arquitecturaen_US
dc.type2Artículoen_US
dc.utils.revisionen_US
dc.date.coverdateAbril 2009en_US
dc.identifier.ulpgcen_US
dc.contributor.buulpgcBU-DERen_US
item.grantfulltextopen-
item.fulltextCon texto completo-
Appears in Collections:Artículos
Thumbnail
PDF
Adobe PDF (364,72 kB)
Show simple item record

SCOPUSTM   
Citations

1
checked on Dec 15, 2024

Page view(s)

68
checked on Dec 14, 2024

Download(s)

51
checked on Dec 14, 2024

Google ScholarTM

Check


Share



Export metadata



Items in accedaCRIS are protected by copyright, with all rights reserved, unless otherwise indicated.