YaBeSH Engineering and Technology Library

    • Journals
    • PaperQuest
    • YSE Standards
    • YaBeSH
    • Login
    View Item 
    •   YE&T Library
    • ASCE
    • Journal of Infrastructure Systems
    • View Item
    •   YE&T Library
    • ASCE
    • Journal of Infrastructure Systems
    • View Item
    • All Fields
    • Source Title
    • Year
    • Publisher
    • Title
    • Subject
    • Author
    • DOI
    • ISBN
    Advanced Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Archive

    Interdiction-Based Approaches to Identify Damage in Disrupted Critical Infrastructures with Dependencies

    Source: Journal of Infrastructure Systems:;2019:;Volume (025):;issue:002
    Author:
    N. Orkun Baycik;Thomas C. Sharkey
    DOI: doi:10.1061/(ASCE)IS.1943-555X.0000487
    Publisher: American Society of Civil Engineers
    Abstract: In this paper, we consider a problem in which the decision maker only has access to outage reports from service receivers in critical infrastructures with dependencies among them, and our objective is to determine inspection plans to identify the damaged components that lead to the reported outages. This situation could occur, for example, if a cyberattack on the human-machine interface of the infrastructures occurs at the same time a natural hazard damages physical components. The demand nodes within these infrastructure networks may have an outage either from damage that occurred within their infrastructure or due to cascading failures across infrastructures. We present network interdiction-based approaches to identify a set of components to inspect that replicates the service outages reported across the infrastructures. These approaches can be applied in an iterative nature where a particular approach first identifies a set of components across infrastructures to inspect, and then, based on the feedback received from the inspections, determines an updated set of components to inspect. Performance criteria of the proposed approaches are the percentage of successful inspections, which represents the percentage of inspection resources used to successfully identify damaged components. As a benchmark, we applied a breadth-first search (BFS) approach to the problem, which mimics a top-down inspection policy for identifying damaged components within an infrastructure. We tested our approaches on realistic infrastructure systems and demonstrated that they far outperform the BFS approach.
    • Download: (692.4Kb)
    • Show Full MetaData Hide Full MetaData
    • Get RIS
    • Item Order
    • Go To Publisher
    • Price: 5000 Rial
    • Statistics

      Interdiction-Based Approaches to Identify Damage in Disrupted Critical Infrastructures with Dependencies

    URI
    http://yetl.yabesh.ir/yetl1/handle/yetl/4257103
    Collections
    • Journal of Infrastructure Systems

    Show full item record

    contributor authorN. Orkun Baycik;Thomas C. Sharkey
    date accessioned2019-06-08T07:24:39Z
    date available2019-06-08T07:24:39Z
    date issued2019
    identifier other%28ASCE%29IS.1943-555X.0000487.pdf
    identifier urihttp://yetl.yabesh.ir/yetl1/handle/yetl/4257103
    description abstractIn this paper, we consider a problem in which the decision maker only has access to outage reports from service receivers in critical infrastructures with dependencies among them, and our objective is to determine inspection plans to identify the damaged components that lead to the reported outages. This situation could occur, for example, if a cyberattack on the human-machine interface of the infrastructures occurs at the same time a natural hazard damages physical components. The demand nodes within these infrastructure networks may have an outage either from damage that occurred within their infrastructure or due to cascading failures across infrastructures. We present network interdiction-based approaches to identify a set of components to inspect that replicates the service outages reported across the infrastructures. These approaches can be applied in an iterative nature where a particular approach first identifies a set of components across infrastructures to inspect, and then, based on the feedback received from the inspections, determines an updated set of components to inspect. Performance criteria of the proposed approaches are the percentage of successful inspections, which represents the percentage of inspection resources used to successfully identify damaged components. As a benchmark, we applied a breadth-first search (BFS) approach to the problem, which mimics a top-down inspection policy for identifying damaged components within an infrastructure. We tested our approaches on realistic infrastructure systems and demonstrated that they far outperform the BFS approach.
    publisherAmerican Society of Civil Engineers
    titleInterdiction-Based Approaches to Identify Damage in Disrupted Critical Infrastructures with Dependencies
    typeJournal Article
    journal volume25
    journal issue2
    journal titleJournal of Infrastructure Systems
    identifier doidoi:10.1061/(ASCE)IS.1943-555X.0000487
    page04019013
    treeJournal of Infrastructure Systems:;2019:;Volume (025):;issue:002
    contenttypeFulltext
    DSpace software copyright © 2002-2015  DuraSpace
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    yabeshDSpacePersian
     
    DSpace software copyright © 2002-2015  DuraSpace
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    yabeshDSpacePersian