메뉴 건너뛰기




Volumn 96, Issue 4, 2011, Pages 433-439

Evaluating the damage associated with intentional network disintegration

Author keywords

Attack; Damage; Defense; Disintegration; Network; Protection; Two dimensional destruction spectrum; Vulnerability

Indexed keywords

ATTACK; DAMAGE; DEFENSE; NETWORK; PROTECTION; VULNERABILITY;

EID: 79251631054     PISSN: 09518320     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ress.2010.12.022     Document Type: Article
Times cited : (30)

References (25)
  • 1
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defense allocation against an unknown attacker
    • V.M. Bier, S. Oliveros, and L. Samuelson Choosing what to protect: strategic defense allocation against an unknown attacker Journal of Public Economic Theory 9 4 2006 563 587
    • (2006) Journal of Public Economic Theory , vol.9 , Issue.4 , pp. 563-587
    • Bier, V.M.1    Oliveros, S.2    Samuelson, L.3
  • 2
    • 33947146473 scopus 로고    scopus 로고
    • Optimal resource allocation for security in reliability systems
    • N. Azaiez, and V.M. Bier Optimal resource allocation for security in reliability systems European Journal of Operational Research 181 2007 773 786
    • (2007) European Journal of Operational Research , vol.181 , pp. 773-786
    • Azaiez, N.1    Bier, V.M.2
  • 3
    • 9444279581 scopus 로고    scopus 로고
    • Protection of simple series and parallel systems with components of different values
    • V.M. Bier, A. Nagaraj, and V. Abhichandani Protection of simple series and parallel systems with components of different values Reliability Engineering & System Safety 87 2005 315 323
    • (2005) Reliability Engineering & System Safety , vol.87 , pp. 315-323
    • Bier, V.M.1    Nagaraj, A.2    Abhichandani, V.3
  • 5
    • 34047142655 scopus 로고    scopus 로고
    • Optimal defense strategy against intentional attacks
    • G. Levitin Optimal defense strategy against intentional attacks IEEE Transactions on Reliability 56 1 2007 148 157
    • (2007) IEEE Transactions on Reliability , vol.56 , Issue.1 , pp. 148-157
    • Levitin, G.1
  • 8
    • 33750618042 scopus 로고    scopus 로고
    • Algorithms for discrete and continuous multicommodity flow network interdiction problems
    • Special Issue on Homeland Security
    • C. Lim, and J. Smith Algorithms for discrete and continuous multicommodity flow network interdiction problems IIE Transactions 39 Special Issue on Homeland Security 2007 15 26
    • (2007) IIE Transactions , vol.39 , pp. 15-26
    • Lim, C.1    Smith, J.2
  • 10
    • 33749263086 scopus 로고    scopus 로고
    • Stochastic network interdiction: Models and methods
    • The University of Texas at Austin
    • Pan F. Stochastic network interdiction: models and methods. Doctoral dissertation, The University of Texas at Austin; 2005.
    • (2005) Doctoral Dissertation
    • Pan, F.1
  • 11
    • 18744366655 scopus 로고    scopus 로고
    • A decomposition algorithm applied to planning the interdiction of stochastic networks
    • H. Held, R. Hemmecke, and D. Woodruff A decomposition algorithm applied to planning the interdiction of stochastic networks Naval Research Logistics 51 2005 321 328
    • (2005) Naval Research Logistics , vol.51 , pp. 321-328
    • Held, H.1    Hemmecke, R.2    Woodruff, D.3
  • 13
    • 60549112826 scopus 로고    scopus 로고
    • Stochastic network interdiction optimization via capacitated network reliability, modeling and probabilistic solution discovery
    • J.E. Ramirez-Marquez, and C.M. Rocko Stochastic network interdiction optimization via capacitated network reliability, modeling and probabilistic solution discovery Reliability Engineering & System Safety 94 5 2009 913 921
    • (2009) Reliability Engineering & System Safety , vol.94 , Issue.5 , pp. 913-921
    • Ramirez-Marquez, J.E.1    Rocko, C.M.2
  • 15
    • 0030304298 scopus 로고    scopus 로고
    • Contest success functions
    • S. Skaperdas Contest success functions Economic Theory 7 1996 283 290
    • (1996) Economic Theory , vol.7 , pp. 283-290
    • Skaperdas, S.1
  • 16
    • 0002782259 scopus 로고
    • Efficient rent seeking
    • Buchanan JM, Tollison RD, Tullock G, editors College Station: Texas A & M University Press
    • Tullock G. Efficient rent seeking. In: Buchanan JM, Tollison RD, Tullock G, editors. Toward a theory of rent-seeking society. College Station: Texas A & M University Press; 1980. p. 97112.
    • (1980) Toward A Theory of Rent-seeking Society , pp. 97-112
    • Tullock, G.1
  • 17
    • 22544461899 scopus 로고    scopus 로고
    • Production and conflict models versus rent seeking models
    • K. Hausken Production and conflict models versus rent seeking models Public Choice 123 2005 59 93
    • (2005) Public Choice , vol.123 , pp. 59-93
    • Hausken, K.1
  • 18
    • 67949103527 scopus 로고    scopus 로고
    • Meeting a demand vs. enhancing protections in homogeneous parallel systems
    • G. Levitin, and K. Hausken Meeting a demand vs. enhancing protections in homogeneous parallel systems Reliability Engineering & System Safety 94 11 2009 1711 1719
    • (2009) Reliability Engineering & System Safety , vol.94 , Issue.11 , pp. 1711-1719
    • Levitin, G.1    Hausken, K.2
  • 19
    • 63149134856 scopus 로고    scopus 로고
    • Redundancy vs. protection vs. false targets under attack
    • G. Levitin, and K. Hausken Redundancy vs. protection vs. false targets under attack IEEE Transactions on Reliability 58 1 2009 58 68
    • (2009) IEEE Transactions on Reliability , vol.58 , Issue.1 , pp. 58-68
    • Levitin, G.1    Hausken, K.2
  • 22
  • 24
    • 84923922261 scopus 로고
    • On closure of the IFR under formation of coherent systems
    • F.J. Samaniego On closure of the IFR under formation of coherent systems IEEE Transactions on Reliability 34 1985 69 72
    • (1985) IEEE Transactions on Reliability , vol.34 , pp. 69-72
    • Samaniego, F.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.