Assessing and Improving Operational Resilience of Critical Infrastructures and Other Systems
暂无分享,去创建一个
Gerald G. Brown | David L. Alderson | W M Carlyle | D. Alderson | W. Carlyle | David L. Alderson | Gerald G. Brown
[1] John R. Birge,et al. Introduction to Stochastic programming (2nd edition), Springer verlag, New York , 2011 .
[2] H. D. Derbes. Efficiently Interdicting a Time-Expanded Transshipment Network. , 1997 .
[3] Peter M. Koprowski. Interdicting a force deployment two-sided optimization of asset selection, lift scheduling, and multi-commodity load planning , 2005 .
[4] Nicholas Bambos,et al. Congestion-induced collapse in networks: managing failure cascades in complex systems and infrastructure protection , 2003 .
[5] John Doyle,et al. Contrasting Views of Complexity and Their Implications For Network-Centric Infrastructures , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[6] Allen Krotman,et al. The National Infrastructure Protection Plan , 2009 .
[7] John E. Mitchell,et al. Integrating restoration and scheduling decisions for disrupted interdependent infrastructure systems , 2013, Ann. Oper. Res..
[8] Scott D. Scherer. Game-Theoretic Anti-Submarine Warfare Mission Planner (heuristic-based, fully Excel capable) , 2009 .
[9] T. E. Harris,et al. Fundamentals of a Method for Evaluating Rail Net Capacities , 1955 .
[10] Yacov Y Haimes,et al. On the Definition of Resilience in Systems , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[11] Gerald G. Brown,et al. Anatomy of a Project to Produce a First Nuclear Weapon , 2006 .
[12] Robert F. Dell,et al. Formulating Linear and Integer Linear Programs: A Rogues' Gallery , 2007 .
[13] Bo Zeng,et al. Robust unit commitment problem with demand response and wind energy , 2012, PES 2012.
[14] Elise Miller-Hooks,et al. Resilience: An Indicator of Recovery Capability in Intermodal Freight Transport , 2012, Transp. Sci..
[15] R. Wets,et al. Stochastic programming , 1989 .
[16] David P. Morton,et al. Stochastic Network Interdiction , 1998, Oper. Res..
[17] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[18] Gerald G. Brown,et al. Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning Defenses , 2005 .
[19] Russell Bent,et al. Last-Mile Restoration for Multiple Interdependent Infrastructures , 2012, AAAI.
[20] Gerald G. Brown,et al. Solving Defender-Attacker-Defender Models for Infrastructure Defense , 2011, ICS 2011.
[21] Gerald G. Brown,et al. "Sometimes There is No Most-Vital" Arc: Assessing and Improving the Operational Resilience of Systems , 2013 .
[22] Patrick S. Brown. Optimizing the long-term capacity expansion and protection of Iraqi oil infrastructure , 2005 .
[23] Mark S. Daskin,et al. Planning for Disruptions in Supply Chain Networks , 2006 .
[24] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[25] David P. Morton,et al. Interdiction Models and Applications , 2013 .
[26] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[27] R. K. Wood,et al. Bilevel Network Interdiction Models: Formulations and Solutions , 2011 .
[28] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[29] B. Obama. Presidential Policy Directive 21: Critical Infrastructure Security and Resilience , 2013 .
[30] Gintaras V. Reklaitis,et al. A simulation—optimization framework for addressing combinatorial and stochastic aspects of an R&D pipeline management problem , 2000 .
[31] Gerald G. Brown,et al. A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..
[32] Jeffrey W. Herrmann. Handbook of operations research for homeland security , 2013 .
[33] Oscar R Olalla. Assessing the Resilience of Global Sea Routes , 2012 .
[34] Johannes O. Royset,et al. Lagrangian relaxation and enumeration for solving constrained shortest‐path problems , 2008, Networks.
[35] J. Salmeron,et al. Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.
[36] Gregory Levitin,et al. Resource Distribution in Multiple Attacks Against a Single Target , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[37] T. Koopmans,et al. Studies in the Economics of Transportation. , 1956 .
[38] R. H. Smith. Optimization for Simulation : Theory vs . Practice , 2002 .
[39] Alexander Schrijver,et al. On the history of the transportation and maximum flow problems , 2002, Math. Program..
[40] Michael J. Assante. Infrastructure Protection in the Ancient World , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[41] John K Crain. Assessing Resilience in the Global Undersea Cable Infrastructure , 2012 .
[42] Gerald G. Brown,et al. Improving the resilience of coal transport in the Port of Pittsburgh - an example of defender-attacker-defender optimization-based decision support , 2012 .
[43] Lawrence M. Repass. Optimal stationing of radar pickets and anti-ballistic missile defenders for long range surveillance and tracking (LRS & T) and ballistic missile defense (BMD) operations , 2006 .
[44] Biswanath Mukherjee,et al. Some principles for designing a wide-area WDM optical network , 1996, TNET.
[45] Biswanath Mukherjee,et al. Traffic grooming in an optical WDM mesh network , 2002, IEEE J. Sel. Areas Commun..
[46] I. Linkov,et al. Integrating Risk and Resilience Approaches to Catastrophe Management in Engineering Systems , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[47] Gerald G. Brown,et al. Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..
[48] Thomas A. Johnson,et al. Homeland Security Presidential Directive-1 , 2007 .
[49] Baird A Stiefel. Review of Critical Path: A Brief History of Critical Infrastructure Protection in the United States , 2009 .
[50] Richard L. Church,et al. A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..
[51] Richard D. Wollmer,et al. Some Methods for Determining the Most Vital Link in a Railway Network , 1963 .
[52] Christodoulos A. Floudas. Generalized Benders Decomposition , 2009, Encyclopedia of Optimization.
[53] Barry M. Horowitz,et al. Homeland security preparedness: Balancing protection with resilience in emergent systems , 2008, Syst. Eng..
[54] Kjell Hausken,et al. Defending Against Terrorism, Natural Disaster, and All Hazards , 2009 .
[55] John E. Mitchell,et al. Restoration of Services in Interdependent Infrastructure Systems: A Network Flows Approach , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[56] John E. Mitchell,et al. Restoring infrastructure systems: An integrated network design and scheduling (INDS) problem , 2012, Eur. J. Oper. Res..
[57] Ravindra K. Ahuja,et al. Network Flows: Theory, Algorithms, and Applications , 1993 .
[58] J. Salmeron,et al. Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids , 2009, IEEE Transactions on Power Systems.
[59] Gerald G. Brown,et al. A defender‐attacker optimization of Port Radar surveillance , 2011 .
[60] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[61] Andrew Zolli,et al. Resilience: Why Things Bounce Back , 2012 .
[62] Alan T. Murray,et al. Critical network infrastructure analysis: interdiction and system flow , 2007, J. Geogr. Syst..
[63] Adam J. Thomas. Tri-level optimization for anti-submarine warfare mission planning , 2008 .
[64] Johannes O. Royset,et al. Routing Military Aircraft with a Constrained Shortest-Path Algorithm , 2009 .
[65] Azad M. Madni,et al. Towards a Conceptual Framework for Resilience Engineering , 2009, IEEE Systems Journal.
[66] Carleton Coffrin,et al. Planning with MIP for Supply Restoration in Power Distribution Systems , 2013, IJCAI.
[67] John E. Mitchell,et al. Logic-based MultiObjective Optimization for Restoration Planning , 2009 .
[68] Marina Schmid,et al. Optimization In Operations Research , 2016 .
[69] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[70] Antonio Alonso Ayuso,et al. Introduction to Stochastic Programming , 2009 .
[71] Rae Zimmerman,et al. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[72] Gerald G. Brown,et al. How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[73] Drake E. Warren,et al. A Framework for Assessing the Resilience of Infrastructure and Economic Systems , 2010 .
[74] Cory A Dixon. Assessing vulnerabilities in interdependent infrastructures using attacker-defender models , 2011 .
[75] G. Sheblé,et al. Power generation operation and control — 2nd edition , 1996 .
[76] Gerald G. Brown,et al. A Game-Theoretic Model for Defense of an Oceanic Bastion Against Submarines , 2011 .
[77] Chee Chien Ang,et al. Optimized recovery of damaged electrical power grids , 2006 .
[78] Stephen M. Hess,et al. Prioritizing Project Selection , 2009 .
[79] William A. Brown. Re-Optimization of Time-Phased Force Deployment Plans in Response to Emergent Changes during Deployment. , 1999 .
[80] J. C. Smith,et al. Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .
[81] Louis Anthony Cox,et al. Making Terrorism Risk Analysis Less Harmful and More Useful: Another Try , 2011 .
[82] Len Elisha Clark. Homeland Security Act of 2002 , 2015 .
[83] Dick Duffey,et al. Power Generation , 1932, Transactions of the American Institute of Electrical Engineers.
[84] Philip G. Hill,et al. Power generation , 1927, Journal of the A.I.E.E..