메뉴 건너뛰기




Volumn 56, Issue 7, 2009, Pages 625-641

Information security: Designing A stochastic-network for throughput and reliability

Author keywords

Game theory; Mulicriteria decision making; Network security; Stochastic network

Indexed keywords

CAPACITY IMPROVEMENT; CRITICAL COMPONENT; GAME-THEORETIC MODEL; IN-NETWORK; INFORMATION AND COMMUNICATION NETWORKS; INFORMATION SECURITY; MONETARY VALUE; MULICRITERIA DECISION-MAKING; NATURAL DEGRADATION; NETWORK DESIGN; PERFORMANCE MEASURE; STOCHASTIC NETWORK; UNIT COST;

EID: 70349592142     PISSN: 0894069X     EISSN: 15206750     Source Type: Journal    
DOI: 10.1002/nav.20365     Document Type: Article
Times cited : (3)

References (31)
  • 1
    • 0041776238 scopus 로고
    • Bounds on the reliability polynomial for shellable independence systems
    • M. O. Ball and J. S. Provan, Bounds on the reliability polynomial for shellable independence systems, SIAM J Algebraic Dis Methods 3 (1982), 166-181.
    • (1982) Siam J. Algebraic Dis Methods , vol.3 , pp. 166-181
    • Ball, M.O.1    Provan, J.S.2
  • 2
    • 0037333770 scopus 로고    scopus 로고
    • The use of game theory to measure the vulnerability of stochastic networks
    • M. G. H. Bell, The use of game theory to measure the vulnerability of stochastic networks, IEEE Transactions on Reliability 52 (2003), 63-68.
    • (2003) Ieee Transactions on Reliability , vol.52 , pp. 63-68
    • Bell, M.G.H.1
  • 3
    • 0043222683 scopus 로고    scopus 로고
    • Strong inequalities for capacitated survivable network design problems
    • D. Bienstock and G. Muratore, Strong inequalities for capacitated survivable network design problems, Math Program 89 (2001), 127-147.
    • (2001) Math Program , vol.89 , pp. 127-147
    • Bienstock, D.1    Muratore, G.2
  • 5
    • 0031369832 scopus 로고    scopus 로고
    • Exact & approximate improvement to the throughput of a stochastic network
    • PII S0018952997093846
    • (Pubitemid 127827229) Y. Chan, E. Yam, and A. Marsh, Exact and approximate throughput to a stochastic network, IEEE Trans Reliabil 46 (1997), 473-486.
    • (1997) IEEE Transactions on Reliability , vol.46 , Issue.4 , pp. 473-486
    • Chan, Y.1    Yim, E.2    Marsh, A.3
  • 7
    • 0030232129 scopus 로고    scopus 로고
    • The delta-wye approximation procedure for two-terminal reliability
    • M. K. Chari, T. A. Feo, and J. S. Provan, The Delta-Wye approximation procedure for two-terminal reliability, Oper Res 44 (1996), 745-757.
    • (1996) Oper. Res. , vol.44 , pp. 745-757
    • Chari, M.K.1    Feo, T.A.2    Provan, J.S.3
  • 8
    • 0030282668 scopus 로고    scopus 로고
    • Calculating k-connectedness reliability using steiner bounds
    • M. K. Chari and J. S. Provan, Calculating k-connectedness reliability using Steiner bounds, Math Oper Res 21 (1996), 905-921.
    • (1996) Math. Oper. Res. , vol.21 , pp. 905-921
    • Chari, M.K.1    Provan, J.S.2
  • 12
    • 33947635163 scopus 로고    scopus 로고
    • Efficient calculation of the most reliable pair of link disjoint paths in telecommunication networks
    • DOI 10.1016/j.ejor.2006.03.005, PII S037722170600141X
    • (Pubitemid 46498512) T. Gomes and J. Craveirinha, Efficient calculation of the most reliable pair of link disjoint paths in telecommunication networks, Eur J Oper Res 181 (2007), 1055-1064.
    • (2007) European Journal of Operational Research , vol.181 , Issue.3 , pp. 1055-1064
    • Gomes, T.1    Craveirinha, J.2
  • 14
    • 33744531669 scopus 로고    scopus 로고
    • Simple algorithms for updating multi-resource allocations in an unreliable flow network
    • C.-C. Hsieh and M.-H. Lin, Simple algorithms for updating multi-resource allocations in an unreliable flow network, Computers Ind Eng 50 (2006), 120-129.
    • (2006) Computers Ind. Eng. , vol.50 , pp. 120-129
    • Hsieh, C.-C.1    Lin, M.-H.2
  • 15
    • 17444417821 scopus 로고    scopus 로고
    • The cross-entropy method for network reliability estimation
    • DOI 10.1007/s10479-005-5726-x
    • (Pubitemid 40550041) K.-P. Hui, N. Bean, M. Kraetzl, and D. P. Kroese, The crossentropy method for network reliability estimation, Annal Oper Res 134 (2005), 101-118.
    • (2005) Annals of Operations Research , vol.134 , Issue.1 , pp. 101-118
    • Hui, K.-P.1    Bean, N.2    Kraetzl, M.3    Kroese, D.P.4
  • 16
    • 70349601171 scopus 로고    scopus 로고
    • Linear programming derived functional bounds for closed queueing networks: A primal approach
    • C. Humes, Linear programming derived functional bounds for closed queueing networks: A primal approach, Lect Appl Math 33 (1997), 139-162.
    • (1997) Lect. Appl. Math. , vol.33 , pp. 139-162
    • Humes, C.1
  • 17
    • 0025682454 scopus 로고
    • A heuristic method of link reliability assignment for maximal reliability
    • S. P. Jain and K. Gopal, A heuristic method of link reliability assignment for maximal reliability, Microelectron Reliab 30 (1990), 673-679.
    • (1990) Microelectron Reliab , vol.30 , pp. 673-679
    • Jain, S.P.1    Gopal, K.2
  • 18
    • 0026926965 scopus 로고
    • Estimation of survivability of communication networks
    • (Pubitemid 23588327) H. Kalyoncu and B. Sankur, Estimation of survivability of communication network, Electron Lett 28 (1992), 1790-1791.
    • (1992) Electronics Letters , vol.28 , Issue.19 , pp. 1790-1791
    • Kalyoncu, H.1    Sankur, B.2
  • 20
    • 61449161981 scopus 로고    scopus 로고
    • Generating a representative subset of the nondominated frontier in multiple criteria decision making
    • E. Karasakal and M. Koksalan, Generating a representative subset of the nondominated frontier in multiple criteria decision making, Oper Res 57 (2009), 187-199.
    • (2009) Oper Res. , vol.57 , pp. 187-199
    • Karasakal, E.1    Koksalan, M.2
  • 21
    • 0031220073 scopus 로고    scopus 로고
    • A heuristic for estimating nadir criterion values in multiple objective linear programming
    • (Pubitemid 127684746) P. Korhonen, S. Salo, and R. E. Steuer, A heuristic for estimating nadir criterion values in multiple objective linear programming, Oper Res 45 (1997), 751-757.
    • (1997) Operations Research , vol.45 , Issue.5 , pp. 751-757
    • Korhonen, P.1    Salo, S.2    Steuer, R.E.3
  • 22
    • 84974858123 scopus 로고
    • IMOST: Interactive multiple objective system technique
    • Y.-S. Lai, IMOST: Interactive multiple objective system technique, J Oper Res Soc 46 (1995), 958-976.
    • (1995) J. oper. Res. Soc. , vol.46 , pp. 958-976
    • Lai, Y.-S.1
  • 23
    • 0033185124 scopus 로고    scopus 로고
    • Improving information network performance: Reliability vs. Invulnerability
    • D. Lyle, Y. Chan, and E. Head, Improving information network performance: reliability vs. invulnerability, Trans Inst Ind Eng 31 (1999), 909-919.
    • (1999) Trans Inst. Ind. Eng. , vol.31 , pp. 909-919
    • Lyle, D.1    Chan, Y.2    Head, E.3
  • 25
    • 0033130512 scopus 로고    scopus 로고
    • The probabilistic longest path problem
    • (Pubitemid 129320701) C. Murat and V. T. Paschos, The probabilistic longest path problem, Networks 33 (1999), 207-219.
    • (1999) Networks , vol.33 , Issue.3 , pp. 207-219
    • Murat, C.1    Paschos, V.Th.2
  • 26
    • 70349601174 scopus 로고
    • Reliability of directed networks using the factoring theorem
    • L. B. Page and J. E. Perry, Reliability of directed networks using the factoring theorem, IEEE Trans Reliab 36 (1989), 445-453.
    • (1989) Ieee. Trans Reliab , vol.36 , pp. 445-453
    • Page, L.B.1    Perry, J.E.2
  • 27
    • 33644529075 scopus 로고    scopus 로고
    • Detecting a security disturbance in multi commodity stochastic networks
    • DOI 10.1007/s11235-006-5520-3
    • (Pubitemid 43296626) A. R. Robinson, Y. Chan, and D. C. Dietz, Detecting a security disturbance in multi commodity stochastic networks, Telecommun Systems 31 (2006), 11-27.
    • (2006) Telecommunication Systems , vol.31 , Issue.1 , pp. 11-27
    • Robinson, A.R.1    Chan, Y.2    Dietz, D.C.3
  • 28
    • 70349589212 scopus 로고
    • On a function for the vulnerability of a directed flow network
    • M. Sengoku, S. Shinoda, and R. Yatsuboshi, On a function for the vulnerability of a directed flow network, Networks 18 (1988), 73-83.
    • (1988) Networks , vol.18 , pp. 73-83
    • Sengoku, M.1    Shinoda, S.2    Yatsuboshi, R.3
  • 30
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
    • DOI 10.1287/opre.1070.0434
    • (Pubitemid 351159542) J. Zhuang and V. M. Bier, Balancing terrorism and natural disastersdefensive strategy with endogenous attacker effort, Oper Res 55 (2007), 976-991.
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.