A methodological framework for vulnerability analysis of interdependent infrastructure systems under deliberate attacks
暂无分享,去创建一个
[1] Min Ouyang,et al. Review on modeling and simulation of interdependent critical infrastructure systems , 2014, Reliab. Eng. Syst. Saf..
[2] Irene Eusgeld,et al. Adopting HLA standard for interdependency study , 2011, Reliab. Eng. Syst. Saf..
[3] Michael North. Toward Strength and Stability , 2001 .
[4] Tao Jia,et al. Control Capacity and A Random Sampling Method in Exploring Controllability of Complex Networks , 2013, Scientific Reports.
[5] Min Ouyang,et al. Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks , 2016, Reliab. Eng. Syst. Saf..
[6] Shlomo Havlin,et al. Eradicating catastrophic collapse in interdependent networks via reinforced nodes , 2016, Proceedings of the National Academy of Sciences.
[7] Min Ouyang,et al. Vulnerability analysis of interdependent infrastructure systems under edge attack strategies , 2013 .
[8] Huan Feng,et al. A system dynamic modeling approach for evaluating municipal solid waste generation, landfill capacity and related cost management issues. , 2010, Waste management.
[9] Vito Latora,et al. Controlling centrality in complex networks , 2011, Scientific Reports.
[10] Derek P Molle,et al. Defending Critical Infrastructure as Cyber Key Terrain , 2016 .
[11] Terje Aven,et al. On Some Recent Definitions and Analysis Frameworks for Risk, Vulnerability, and Resilience , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[12] Min Ouyang,et al. Vulnerability effects of passengers' intermodal transfer distance preference and subway expansion on complementary urban public transportation systems , 2017, Reliab. Eng. Syst. Saf..
[13] Ligang He,et al. An uncertainty assessment of interdependent infrastructure systems and infrastructure sectors with natural disasters analysis , 2012, Int. J. Syst. Syst. Eng..
[14] Jian-Wei Wang,et al. Robustness of the western United States power grid under edge attack strategies due to cascading failures , 2011 .
[15] Yun Li,et al. Cascading load model in interdependent networks with coupled strength , 2015 .
[16] John E. Mitchell,et al. Restoration of Services in Interdependent Infrastructure Systems: A Network Flows Approach , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[17] Min Ouyang,et al. Vulnerability assessment and mitigation for the Chinese railway system under floods , 2015, Reliab. Eng. Syst. Saf..
[18] Xiang-Sun Zhang,et al. Potts model based on a Markov process computation solves the community structure problem effectively , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.
[19] Enrico Zio,et al. Challenges in the vulnerability and risk analysis of critical infrastructures , 2016, Reliab. Eng. Syst. Saf..
[20] E. J. Stacey,et al. UPFC-unified power flow controller: theory, modeling, and applications , 1998 .
[21] Wei Li,et al. Cascading Failures in Interdependent Lattice Networks: The Critical Role of the Length of Dependency Links , 2012, Physical review letters.
[22] Per Hokstad,et al. A method for risk modeling of interdependencies in critical infrastructures , 2011, Reliab. Eng. Syst. Saf..
[23] Amir Bashan,et al. Localized attacks on spatially embedded networks with dependencies , 2015, Scientific Reports.
[24] Hui-Jia Li,et al. Social significance of community structure: Statistical view , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.
[25] James P. Peerenboom,et al. Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .
[26] Min Ouyang,et al. Comparisons of complex network based models and direct current power flow model to analyze power grid vulnerability under intentional attacks , 2014 .
[27] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[28] M. Ouyang. Comparisons of purely topological model, betweenness based model and direct current power flow model to analyze power grid vulnerability. , 2013, Chaos.