메뉴 건너뛰기




Volumn 21, Issue 2, 2006, Pages 79-92

Minimizing the consequences of intentional attack on water infrastructure

Author keywords

[No Author keywords available]

Indexed keywords

GENETIC ALGORITHMS; HEURISTIC METHODS; MATHEMATICAL MODELS;

EID: 33645958874     PISSN: 10939687     EISSN: 14678667     Source Type: Journal    
DOI: 10.1111/j.1467-8667.2005.00419.x     Document Type: Article
Times cited : (31)

References (45)
  • 2
    • 4444312331 scopus 로고    scopus 로고
    • A GIS based water distribution model for Salt Lake City, UT
    • Environmental Systems Research Institute, Redlands, CA, on CD-ROM
    • Bahadur, R., Pickus, J., Amstutz, D., & Samuels, W. B. (2001), A GIS based water distribution model for Salt Lake City, UT, in Proceedings of the 21 st Annual ESRI Users Conference, Environmental Systems Research Institute, Redlands, CA, on CD-ROM.
    • (2001) Proceedings of the 21st Annual ESRI Users Conference
    • Bahadur, R.1    Pickus, J.2    Amstutz, D.3    Samuels, W.B.4
  • 5
    • 0036656498 scopus 로고    scopus 로고
    • Spare-capacity assignment for line restoration using a single-facility type
    • Balakrishnan, A., Magnanti, T. L., Sokol, J. S. & Wang, Y. (2002), Spare-capacity assignment for line restoration using a single-facility type, Operations Research, 50 (4), 617-35.
    • (2002) Operations Research , vol.50 , Issue.4 , pp. 617-635
    • Balakrishnan, A.1    Magnanti, T.L.2    Sokol, J.S.3    Wang, Y.4
  • 6
    • 77957091210 scopus 로고
    • Branch and bound methods for mathematical programming systems
    • Beale, E. M. L. (1979), Branch and bound methods for mathematical programming systems, Annals of Discrete Mathematics, 5, 201-19.
    • (1979) Annals of Discrete Mathematics , vol.5 , pp. 201-219
    • Beale, E.M.L.1
  • 10
    • 0007963510 scopus 로고    scopus 로고
    • A niched-penalty approach for constraint handling in genetic algorithms
    • Portoroz, Slovenia
    • Deb, K. & Agrawal, S. (1999), A niched-penalty approach for constraint handling in genetic algorithms, in Proceedings of ICANNGA-99, Portoroz, Slovenia, pp. 123-35.
    • (1999) Proceedings of ICANNGA-99 , pp. 123-135
    • Deb, K.1    Agrawal, S.2
  • 11
    • 0003625172 scopus 로고    scopus 로고
    • Risks of cyber attack to supervisory control and data acquisition for water supply
    • M.S. Thesis, University of Virginia, Charlottesville, VA
    • Ezell, B. C. (1998), Risks of cyber attack to supervisory control and data acquisition for water supply, M.S. Thesis, University of Virginia, Charlottesville, VA.
    • (1998)
    • Ezell, B.C.1
  • 13
    • 0034283429 scopus 로고    scopus 로고
    • Infrastructure risk analysis of municipal water distribution system
    • Ezell, B. C., Farr, J. V. & Wiese, I. (2000b), Infrastructure risk analysis of municipal water distribution system, Journal of Infrastructure Systems, ASCE, 6 (3), 118-22.
    • (2000) Journal of Infrastructure Systems, ASCE , vol.6 , Issue.3 , pp. 118-122
    • Ezell, B.C.1    Farr, J.V.2    Wiese, I.3
  • 17
    • 0001621683 scopus 로고
    • Computational results with a cutting plane algorithm for designing communication networks with low-connectivity constraints
    • Grötschel, M., Monma, C. L. & Stoer, M. (1992), Computational results with a cutting plane algorithm for designing communication networks with low-connectivity constraints, Operations Research, 40, 309-30.
    • (1992) Operations Research , vol.40 , pp. 309-430
    • Grötschel, M.1    Monma, C.L.2    Stoer, M.3
  • 18
    • 77957077046 scopus 로고
    • Design of survivable networks
    • M. Ball, T. Magnanti, C. Monma and G. Nemhauser Network Models, Elsevier, Amsterdam
    • Grötschel, M., Monma, C. L. & Stoer, M. (1995), Design of survivable networks, in M. Ball, T. Magnanti, C. Monma and G. Nemhauser (eds.), Handbook of Operations Research and Management Science: Network Models, Elsevier, Amsterdam, pp. 617-72.
    • (1995) Handbook of Operations Research and Management Science , pp. 617-672
    • Grötschel, M.1    Monma, C.L.2    Stoer, M.3
  • 23
    • 0031410461 scopus 로고    scopus 로고
    • Identification of monitoring stations in water distribution system
    • Kumar, A., Kansal, M. L., & Arora, G. (1997), Identification of monitoring stations in water distribution system, Journal of Environmental Engineering, ASCE, 123 (8), 746-52.
    • (1997) Journal of Environmental Engineering, ASCE , vol.123 , Issue.8 , pp. 746-752
    • Kumar, A.1    Kansal, M.L.2    Arora, G.3
  • 25
    • 0026601054 scopus 로고
    • Optimal locations of monitoring stations in water distribution system
    • Lee, B. H., & Deininger, R. A. (1992), Optimal locations of monitoring stations in water distribution system, Journal of Environmental Engineering, ASCE, 118 (1), 4-16.
    • (1992) Journal of Environmental Engineering, ASCE , vol.118 , Issue.1 , pp. 4-16
    • Lee, B.H.1    Deininger, R.A.2
  • 28
    • 0024701993 scopus 로고
    • Methods for designing communication networks with certain two-connected survivability constraints
    • Monma, C. L. & Shallcross, D. F. (1989), Methods for designing communication networks with certain two-connected survivability constraints, Operations Research, 37, 531-41.
    • (1989) Operations Research , vol.37 , pp. 531-541
    • Monma, C.L.1    Shallcross, D.F.2
  • 30
    • 27144530964 scopus 로고    scopus 로고
    • State Drought Plans and Related Documents
    • National Drought Mitigation Center accessed on October 9, 2004
    • National Drought Mitigation Center (2004), State Drought Plans and Related Documents, http://www.drought.unl.edu/plan/stateplans.htm, accessed on October 9, 2004.
    • (2004)
  • 31
    • 4444318423 scopus 로고    scopus 로고
    • Optimal layout of early warning detection stations for water distribution systems security
    • Ostfeld, A. & Salomons, E. (2004), Optimal layout of early warning detection stations for water distribution systems security, Journal of Water Resources Planning and Management, 130 (5), 377-85.
    • (2004) Journal of Water Resources Planning and Management , vol.130 , Issue.5 , pp. 377-385
    • Ostfeld, A.1    Salomons, E.2
  • 32
    • 33645983239 scopus 로고    scopus 로고
    • The Clinton administration's policy on critical infrastructure protection: Presidential decision directive 63
    • PDD 63 (Presidential Decision Directive 63) Available at:
    • PDD 63 (Presidential Decision Directive 63) (1998), The Clinton administration's policy on critical infrastructure protection: Presidential decision directive 63. Available at: http://www.terrorism.com/homeland/pdd63.htm.
    • (1998)
  • 34
    • 33645960177 scopus 로고    scopus 로고
    • Physical security aspects in water infrastructure
    • Purdue University Press, West Lafayette, IN
    • Qiao, J., Jeong, H. S., Lawley, M. A., Abraham, D. M. (2005), Physical security aspects in water infrastructure, Advances in Homeland Security, Vol 1, Purdue University Press, West Lafayette, IN.
    • (2005) Advances in Homeland Security , vol.1
    • Qiao, J.1    Jeong, H.S.2    Lawley, M.A.3    Abraham, D.M.4
  • 35
    • 0003808063 scopus 로고    scopus 로고
    • United States Environmental Protection Agency Cincinnati, OH
    • Rossman, L. A. (2000), EPANET2 Users Manual, United States Environmental Protection Agency Cincinnati, OH.
    • (2000) EPANET2 Users Manual
    • Rossman, L.A.1
  • 37
    • 0036496751 scopus 로고    scopus 로고
    • Reliability/availability analysis of municipal water distribution networks: Case studies
    • Shinstine, D. S., Ahmed, I., & Lansey, K. E. (2002), Reliability/ availability analysis of municipal water distribution networks: Case studies, Journal of Water Resources Planning and Management, 128 (2), 140-51.
    • (2002) Journal of Water Resources Planning and Management , vol.128 , Issue.2 , pp. 140-151
    • Shinstine, D.S.1    Ahmed, I.2    Lansey, K.E.3
  • 41
    • 0033121517 scopus 로고    scopus 로고
    • Spare capacity assignment in telecom networks using path restoration and further improvement using traffic splitting
    • Veerasamy, J., Venkatesan, S. & Shah, J. C. (1999), Spare capacity assignment in telecom networks using path restoration and further improvement using traffic splitting, The Journal of Systems and Software, 47, 27-33.
    • (1999) The Journal of Systems and Software , vol.47 , pp. 27-33
    • Veerasamy, J.1    Venkatesan, S.2    Shah, J.C.3
  • 45
    • 38249007197 scopus 로고
    • Deterministic network interdiction
    • Wood, R. K. (1993), Deterministic network interdiction, Mathematical Computer Modelling, 17 (2), 1-18.
    • (1993) Mathematical Computer Modelling , vol.17 , Issue.2 , pp. 1-18
    • Wood, R.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.