메뉴 건너뛰기




Volumn 78, Issue 2, 2013, Pages 209-221

An overview of network vulnerability modeling approaches

Author keywords

Infrastructure; Interdiction; Optimization

Indexed keywords

DISASTERS; OPTIMIZATION;

EID: 84876041585     PISSN: 03432521     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10708-011-9412-z     Document Type: Article
Times cited : (48)

References (35)
  • 1
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • Albert, R., Jeong, H., & Barabasi, A. L. (2000). Error and attack tolerance of complex networks. Nature, 406, 378-382.
    • (2000) Nature , vol.406 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabasi, A.L.3
  • 5
    • 84876022214 scopus 로고    scopus 로고
    • CBS News, (last accessed 3/16/10)
    • CBS News. (2010). Death toll rises from massive chile quake. URL: http://www. cbsnews. com/stories/2010/02/27/world/main6249181. shtml (last accessed 3/16/10).
    • (2010) Death toll rises from massive chile quake
  • 6
    • 33947208987 scopus 로고    scopus 로고
    • Protecting critical assets: The r-interdiction median problem with fortification
    • Church, R. L., & Scaparra, M. P. (2007). Protecting critical assets: The r-interdiction median problem with fortification. Geographical Analysis, 39, 129-146.
    • (2007) Geographical Analysis , vol.39 , pp. 129-146
    • Church, R.L.1    Scaparra, M.P.2
  • 9
    • 0020175509 scopus 로고
    • Most vital links and nodes in weighted networks
    • Corley, H. W., & Sha, D. Y. (1982). Most vital links and nodes in weighted networks. Operations Research Letters, 1, 157-160.
    • (1982) Operations Research Letters , vol.1 , pp. 157-160
    • Corley, H.W.1    Sha, D.Y.2
  • 10
    • 40349111077 scopus 로고    scopus 로고
    • Identifying critical locations in a spatial network with graph theory
    • Demsar, U., Spatenkova, O., & Virrantaus, K. (2008). Identifying critical locations in a spatial network with graph theory. Transactions in GIS, 12, 61-82.
    • (2008) Transactions in GIS , vol.12 , pp. 61-82
    • Demsar, U.1    Spatenkova, O.2    Virrantaus, K.3
  • 12
    • 0000096090 scopus 로고
    • Maximizing the minimum source-sink path subject to a budget constraint
    • Fulkerson, D. R., & Harding, G. C. (1977). Maximizing the minimum source-sink path subject to a budget constraint. Mathematical Programming, 13, 116-118.
    • (1977) Mathematical Programming , vol.13 , pp. 116-118
    • Fulkerson, D.R.1    Harding, G.C.2
  • 14
    • 33644815393 scopus 로고    scopus 로고
    • Vital nodes, interconnected infrastructures and the geographies of network reliability
    • Grubesic, T. H., & Murray, A. T. (2006). Vital nodes, interconnected infrastructures and the geographies of network reliability. Annals of the Association of American Geographers, 96, 64-83.
    • (2006) Annals of the Association of American Geographers , vol.96 , pp. 64-83
    • Grubesic, T.H.1    Murray, A.T.2
  • 15
  • 17
    • 0141764679 scopus 로고    scopus 로고
    • Shortest-path network interdiction
    • Israeli, E., & Wood, R. K. (2002). Shortest-path network interdiction. Networks, 40, 97-111.
    • (2002) Networks , vol.40 , pp. 97-111
    • Israeli, E.1    Wood, R.K.2
  • 18
    • 33750618042 scopus 로고    scopus 로고
    • Algorithms for discrete and continuous multicommodity flow network interdiction problems
    • Lim, C., & Smith, J. C. (2007). Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Transactions, 39, 15-26.
    • (2007) IIE Transactions , vol.39 , pp. 15-26
    • Lim, C.1    Smith, J.C.2
  • 19
    • 58349098750 scopus 로고    scopus 로고
    • Connectivity change in habitat networks
    • Matisziw, T. C., & Murray, A. T. (2009). Connectivity change in habitat networks. Landscape Ecology, 24, 89-100.
    • (2009) Landscape Ecology , vol.24 , pp. 89-100
    • Matisziw, T.C.1    Murray, A.T.2
  • 20
    • 67349263869 scopus 로고    scopus 로고
    • Exploring the vulnerability of network infrastructure to interdiction
    • Matisziw, T. C., Murray, A. T., & Grubesic, T. H. (2009). Exploring the vulnerability of network infrastructure to interdiction. Annals of Regional Science, 43, 307-321.
    • (2009) Annals of Regional Science , vol.43 , pp. 307-321
    • Matisziw, T.C.1    Murray, A.T.2    Grubesic, T.H.3
  • 21
    • 84876022021 scopus 로고    scopus 로고
    • Hurricane Katrina: The oil supply; gulf oil operations remain in disarray
    • September 2, 2005. URL, (last accessed 3/16/10)
    • Mouawad, J., & V. Bajaj. (2005). Hurricane Katrina: The oil supply; gulf oil operations remain in disarray. The New York Times, September 2, 2005. URL: http://query. nytimes. com/gst/fullpage. html?res=9503E4DF1431F931A3575AC0A9639C8B63 (last accessed 3/16/10).
    • (2005) The New York Times
    • Mouawad, J.1    Bajaj, V.2
  • 24
    • 34250627517 scopus 로고    scopus 로고
    • Critical network infrastructure analysis: Interdiction and system flow
    • Murray, A. T., Matisziw, T. C., & Grubesic, T. H. (2007). Critical network infrastructure analysis: Interdiction and system flow. Journal of Geographical Systems, 9, 103-117.
    • (2007) Journal of Geographical Systems , vol.9 , pp. 103-117
    • Murray, A.T.1    Matisziw, T.C.2    Grubesic, T.H.3
  • 25
    • 56349137799 scopus 로고    scopus 로고
    • Methodological overview of network vulnerability analysis
    • Murray, A. T., Matisziw, T. C., & Grubesic, T. H. (2008). Methodological overview of network vulnerability analysis. Growth and Change, 39, 573-592.
    • (2008) Growth and Change , vol.39 , pp. 573-592
    • Murray, A.T.1    Matisziw, T.C.2    Grubesic, T.H.3
  • 26
    • 1642618985 scopus 로고    scopus 로고
    • A cutting plane algorithm for computing k-edge survivability of a network
    • Myung, Y. S., & Kim, H. J. (2004). A cutting plane algorithm for computing k-edge survivability of a network. European Journal of Operational Research, 156, 579-589.
    • (2004) European Journal of Operational Research , vol.156 , pp. 579-589
    • Myung, Y.S.1    Kim, H.J.2
  • 27
    • 35348951490 scopus 로고    scopus 로고
    • A bilevel mixed-integer program for critical infrastructure protection planning
    • Scaparraa, M. P., & Church, R. L. (2008a). A bilevel mixed-integer program for critical infrastructure protection planning. Computers & Operations Research, 35, 1905-1923.
    • (2008) Computers & Operations Research , vol.35 , pp. 1905-1923
    • Scaparraa, M.P.1    Church, R.L.2
  • 28
    • 38949181266 scopus 로고    scopus 로고
    • An exact solution approach for the interdiction median problem with fortification
    • Scaparraa, M. P., & Church, R. L. (2008b). An exact solution approach for the interdiction median problem with fortification. European Journal of Operational Research, 189, 76-92.
    • (2008) European Journal of Operational Research , vol.189 , pp. 76-92
    • Scaparraa, M.P.1    Church, R.L.2
  • 32
    • 0034978053 scopus 로고    scopus 로고
    • Landscape connectivity: A graph-theoretic perspective
    • Urban, D., & Keitt, T. H. (2001). Landscape connectivity: A graph-theoretic perspective. Ecology, 82, 1205-1218.
    • (2001) Ecology , vol.82 , pp. 1205-1218
    • Urban, D.1    Keitt, T.H.2
  • 33
    • 0009075090 scopus 로고
    • Removing arcs from a network
    • Wollmer, R. (1964). Removing arcs from a network. Operations Research, 12, 934-940.
    • (1964) Operations Research , vol.12 , pp. 934-940
    • Wollmer, R.1
  • 34
    • 84876055934 scopus 로고    scopus 로고
    • Bridge fix awaits further tests
    • October 29, 2009. URL, (last accessed 3/16/10)
    • Woo, S. (2009). Bridge fix awaits further tests. The Wall Street Journal, October 29, 2009. URL: http://online. wsj. com/article/SB125673037933212851. html (last accessed 3/16/10).
    • (2009) The Wall Street Journal
    • Woo, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.