Identificador persistente para citar o vincular este elemento: http://hdl.handle.net/10553/76244
Campo DC Valoridioma
dc.contributor.authorRocco S., Claudio M.en_US
dc.contributor.authorSalazar A., Daniel E.en_US
dc.contributor.authorZio, Enricoen_US
dc.date.accessioned2020-12-02T14:19:18Z-
dc.date.available2020-12-02T14:19:18Z-
dc.date.issued2009en_US
dc.identifier.issn0973-1318en_US
dc.identifier.otherScopus-
dc.identifier.urihttp://hdl.handle.net/10553/76244-
dc.description.abstractThis paper presents the application of advanced computational techniques developed by the authors for evaluating the vulnerability characteristics of network systems exposed to harmful events. The physical system is modeled as a network (graph) of nodes interconnected by links. Uncertainties on the propagation and effects of an attack are modeled by probability distributions on the times of propagation through the network links and the numbers of people affected at the network nodes reached by the hazard. The impact of an attack is quantified by simulating the propagation of the hazard through the network nodes and links, by means of a combination of cellular automata and Monte Carlo simulation. The vulnerability assessment is embedded within a systematic multiple-objective optimization analysis aimed at identifying the optimal protective scheme which minimizes the average impact in terms of entities affected and hazard propagation time. The vulnerabilities and relative protection schemes of two networks of realistic size are systematically analyzed by the proposed approach for testing the procedure and identifying its strengths and weaknesses. © RAMS Consultants Printed in India.en_US
dc.languageengen_US
dc.relation.ispartofInternational Journal of Performability Engineeringen_US
dc.sourceInternational Journal of Performability Engineering[ISSN 0973-1318],v. 5 (1), p. 71-84, (Abril 2009)en_US
dc.subject3306 Ingeniería y tecnología eléctricasen_US
dc.subject120710 Redes de flujoen_US
dc.subject.otherDistributed Networksen_US
dc.subject.otherMonte Carlo Simulationen_US
dc.subject.otherVulnerability Assessmenten_US
dc.titleApplication of advanced computational techniques to the vulnerability assessment of network systems exposed to uncertain harmful eventsen_US
dc.typeinfo:eu-repo/semantics/Articleen_US
dc.typeArticleen_US
dc.identifier.scopus64549130025-
dc.contributor.authorscopusid7004508307-
dc.contributor.authorscopusid56240751500-
dc.contributor.authorscopusid7005289082-
dc.description.lastpage84en_US
dc.identifier.issue1-
dc.description.firstpage71en_US
dc.relation.volume5en_US
dc.investigacionIngeniería y Arquitecturaen_US
dc.type2Artículoen_US
dc.utils.revisionen_US
dc.date.coverdateAbril 2009en_US
dc.identifier.ulpgcen_US
dc.contributor.buulpgcBU-DERen_US
item.grantfulltextopen-
item.fulltextCon texto completo-
Colección:Artículos
miniatura
PDF
Adobe PDF (364,72 kB)
Vista resumida

Citas SCOPUSTM   

1
actualizado el 15-dic-2024

Visitas

68
actualizado el 14-dic-2024

Descargas

51
actualizado el 14-dic-2024

Google ScholarTM

Verifica


Comparte



Exporta metadatos



Los elementos en ULPGC accedaCRIS están protegidos por derechos de autor con todos los derechos reservados, a menos que se indique lo contrario.