메뉴 건너뛰기




Volumn 426, Issue , 2016, Pages 59-74

A general framework for critical infrastructure interdependencies modeling using economic input-output model and network analysis

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX NETWORKS; ECONOMIC ANALYSIS; LARGE SCALE SYSTEMS; PUBLIC WORKS; SYSTEMS ANALYSIS;

EID: 84958093258     PISSN: 21945357     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-319-29643-2_5     Document Type: Conference Paper
Times cited : (7)

References (22)
  • 3
    • 0003732354 scopus 로고
    • 2nd edn. Oxford University Press, New York
    • Leontief, W.: Input-Output Economics. 2nd edn. Oxford University Press, New York (1986).
    • (1986) Input-Output Economics
    • Leontief, W.1
  • 6
    • 0035696915 scopus 로고    scopus 로고
    • Identifying Understanding and analyzing critical infrastructure interdependencies
    • Rinaldi, S.M., Peerenboom P.J.: Identifying Understanding and analyzing critical infrastructure interdependencies. IEEE Control Syst. Mag. 11–25 (2001).
    • (2001) IEEE Control Syst. Mag , pp. 11-25
    • Rinaldi, S.M.1    Peerenboom, P.J.2
  • 9
    • 34249856448 scopus 로고    scopus 로고
    • A risk-based input-output methodology for measuring the effects of the august 2003 northeast blackout
    • Anderson, C.W., Santos, J.R., Haimes, Y.Y.: A risk-based input-output methodology for measuring the effects of the august 2003 northeast blackout. Econ. Model. Disaster Impact Anal. 19(2), 183–204 (2007).
    • (2007) Econ. Model. Disaster Impact Anal , vol.19 , Issue.2 , pp. 183-204
    • Anderson, C.W.1    Santos, J.R.2    Haimes, Y.Y.3
  • 10
    • 84958083889 scopus 로고    scopus 로고
    • The Fight Against Terror—Singapore’s National Security Strategy, Accessed 16 July 2015
    • Cf. National Security Coordination Centre.: The Fight Against Terror—Singapore’s National Security Strategy (2004). www.nscs.gov.sg/public/download.ashx?id=48. Accessed 16 July 2015.
    • (2004) Cf. National Security Coordination Centre
  • 12
    • 85046299009 scopus 로고    scopus 로고
    • QGIS Geographic Information System
    • QGIS Development Team
    • QGIS Development Team.: QGIS Geographic Information System. Open Source Geospatial Foundation (2009) http://qgis.osgeo.org.
    • (2009) Open Source Geospatial Foundation
  • 13
    • 42749108762 scopus 로고    scopus 로고
    • Model for cascading failures in complex networks.
    • Crucitti, P., Latora, V., Marchiori, M.: Model for cascading failures in complex networks. Phys. Rev. E 69, 045104 (2004).
    • (2004) Phys. Rev. E , vol.69
    • Crucitti, P.1    Latora, V.2    Marchiori, M.3
  • 14
    • 84866174683 scopus 로고    scopus 로고
    • Vulnerability analysis of interdependent infrastructure systems under edge attack strategies.
    • Wang, S., Hong, L., Ouyang, M., Zhang, J., Chen, X.: Vulnerability analysis of interdependent infrastructure systems under edge attack strategies. Saf. Sci. 51, 328–337 (2013).
    • (2013) Saf. Sci , vol.51 , pp. 328-337
    • Wang, S.1    Hong, L.2    Ouyang, M.3    Zhang, J.4    Chen, X.5
  • 17
    • 33748439665 scopus 로고    scopus 로고
    • Using graph models to analyze the vulnerability of electric power networks
    • Holmgren, Å.J.: Using graph models to analyze the vulnerability of electric power networks. Risk Anal. 26(4), 955–969 (2006).
    • (2006) Risk Anal , vol.26 , Issue.4 , pp. 955-969
    • Holmgren, Å.J.1
  • 19
    • 33745198559 scopus 로고    scopus 로고
    • Center for Connected Learning and Computer-Based Modeling, Northwestern University. Evanston, I
    • Wilensky, et al.: HubNet. http://ccl.northwestern.edu/netlogo/hubnet.html. Center for Connected Learning and Computer-Based Modeling, Northwestern University. Evanston, IL (1999).
    • (1999) Hubnet
    • Wilensky1
  • 20
    • 84879972864 scopus 로고    scopus 로고
    • Identifying Vulnerabilities in Critical Infrastructures by Network Analysis
    • Lam, C.Y., Lin, J., Sim, M.S., Tai, K.: Identifying Vulnerabilities in Critical Infrastructures by Network Analysis. Int. J. Crit. Infrastruct. 9(3), 190–210 (2013).
    • (2013) Int. J. Crit. Infrastruct , vol.9 , Issue.3 , pp. 190-210
    • Lam, C.Y.1    Lin, J.2    Sim, M.S.3    Tai, K.4
  • 21
    • 84893848754 scopus 로고    scopus 로고
    • An agent-based modeling and evolutionary optimization approach for vulnerability analysis of critical infrastructure networks
    • Communications in Computer and Information Science, vol., pp. , . Springer
    • Kizhakkedath, A., Tai, K., Sim, M.S., Tiong, R.L.K., Lin, J.: An agent-based modeling and evolutionary optimization approach for vulnerability analysis of critical infrastructure networks. In: AsiaSim 2013—Proceedings of the 13th International Conference on Systems Simulation, Singapore, Communications in Computer and Information Science, vol. 402, pp. 176–187. Springer (2013).
    • (2013) Asiasim 2013—Proceedings of the 13Th International Conference on Systems Simulation, Singapore , vol.402 , pp. 176-187
    • Kizhakkedath, A.1    Tai, K.2    Sim, M.S.3    Tiong, R.L.K.4    Lin, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.