메뉴 건너뛰기




Volumn 222, Issue 2, 2008, Pages 235-243

Identifying critical components in technical infrastructure networks

Author keywords

critical components; electric power systems; infrastructure networks; network analysis; vulnerability

Indexed keywords


EID: 84993783308     PISSN: 1748006X     EISSN: 17480078     Source Type: Journal    
DOI: 10.1243/1748006XJRR138     Document Type: Article
Times cited : (90)

References (24)
  • 4
    • 42749103823 scopus 로고    scopus 로고
    • Structural vulnerability of the North American power grid
    • Albert R. Albert I. Nakarado G.L. Structural vulnerability of the North American power grid. Phys. Rev. E, 2004, 69(025103), 1–4
    • (2004) Phys. Rev. E , vol.69 , Issue.025103 , pp. 1-4
    • Albert, R.1    Albert, I.2    Nakarado, G.L.3
  • 5
    • 2942527530 scopus 로고    scopus 로고
    • A topological analysis of the Italian power grid
    • Crucitti P. Latora V. Marchiori M. A topological analysis of the Italian power grid. Physica A, 2004, 338(1–2), 92–97
    • (2004) Physica A , vol.338 , Issue.1-2 , pp. 92-97
    • Crucitti, P.1    Latora, V.2    Marchiori, M.3
  • 6
    • 21744444048 scopus 로고    scopus 로고
    • Evaluating North American electric grid reliability using the Barabasi—Albert network model
    • Chassin D.P. Posse C. Evaluating North American electric grid reliability using the Barabasi—Albert network model. Physica A, 2005, 355(2–4), 667–677
    • (2005) Physica A , vol.355 , Issue.2-4 , pp. 667-677
    • Chassin, D.P.1    Posse, C.2
  • 7
    • 23844502144 scopus 로고    scopus 로고
    • Modeling cascading failure in the North American power grid
    • Kinney R. Crucitti P. Albert R. Latora V. Modeling cascading failure in the North American power grid. Eur. Phys. J. B, 2005, 46(1), 101–107
    • (2005) Eur. Phys. J. B , vol.46 , Issue.1 , pp. 101-107
    • Kinney, R.1    Crucitti, P.2    Albert, R.3    Latora, V.4
  • 8
    • 33748439665 scopus 로고    scopus 로고
    • Using graph models to analyze the vulnerability of electric power networks
    • Holmgren Å. Using graph models to analyze the vulnerability of electric power networks. Risk Analysis, 2006, 26(4), 955–969
    • (2006) Risk Analysis , vol.26 , Issue.4 , pp. 955-969
    • Holmgren, Å.1
  • 9
    • 33947605019 scopus 로고    scopus 로고
    • Analysing the vulnerability of electric distribution systems: A step toward incorporating the societal consequences of disruptions
    • Johansson J.Jönsson H. Johansson H. Analysing the vulnerability of electric distribution systems: A step toward incorporating the societal consequences of disruptions. Int. J. Emergency Mgmnt, 2007, 4(1), 4–17
    • (2007) Int. J. Emergency Mgmnt , vol.4 , Issue.1 , pp. 4-17
    • Johansson, J.1    Jönsson, H.2    Johansson, H.3
  • 10
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • Albert R. Jeong H. Barabasi A.-L. Error and attack tolerance of complex networks. Nature, 2000, 406, 378–382
    • (2000) Nature , vol.406 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabasi, A.-L.3
  • 11
    • 23644461196 scopus 로고    scopus 로고
    • Locating critical lines in high-voltage electrical power grids
    • Crucitti P. Latora V. Marchiori M. Locating critical lines in high-voltage electrical power grids. Fluctuation and Noise Lett., 2005, 5(2), 201–208
    • (2005) Fluctuation and Noise Lett , vol.5 , Issue.2 , pp. 201-208
    • Crucitti, P.1    Latora, V.2    Marchiori, M.3
  • 12
    • 2942547426 scopus 로고    scopus 로고
    • The revenge of distance: Vulnerability analysis of critical information infrastructure
    • Gorman S.P. Schintler L. Kulkarni R. Stough R. The revenge of distance: Vulnerability analysis of critical information infrastructure. J. Contingencies Crisis Mgmnt, 2004, 12(2), 48–63
    • (2004) J. Contingencies Crisis Mgmnt , vol.12 , Issue.2 , pp. 48-63
    • Gorman, S.P.1    Schintler, L.2    Kulkarni, R.3    Stough, R.4
  • 13
    • 18644364822 scopus 로고    scopus 로고
    • A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism
    • Apostolakis G.E. Lemon D.M. A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Analysis, 2005, 24(2), 361–376
    • (2005) Risk Analysis , vol.24 , Issue.2 , pp. 361-376
    • Apostolakis, G.E.1    Lemon, D.M.2
  • 14
    • 33645902544 scopus 로고    scopus 로고
    • Importance and exposure in road network vulnerability analysis
    • Jenelius E. Petersen T. Mattson L.-G. Importance and exposure in road network vulnerability analysis. Transp. Res. Part A, 2006, 40, 537–560
    • (2006) Transp. Res. Part A , vol.40 , pp. 537-560
    • Jenelius, E.1    Petersen, T.2    Mattson, L.-G.3
  • 15
    • 0037972855 scopus 로고    scopus 로고
    • New approaches to assessing vulnerability and resilience
    • Buckle P. Mars G. New approaches to assessing vulnerability and resilience. Aust. J. Emergency Mgmnt, 2002, 15(2), 8–14
    • (2002) Aust. J. Emergency Mgmnt , vol.15 , Issue.2 , pp. 8-14
    • Buckle, P.1    Mars, G.2
  • 16
    • 0034934567 scopus 로고    scopus 로고
    • Coming to terms with vulnerability: A critique of the food security definition
    • Dilley M. Boudreau T.E. Coming to terms with vulnerability: A critique of the food security definition. Food Policy, 2001, 26, 229–247
    • (2001) Food Policy , vol.26 , pp. 229-247
    • Dilley, M.1    Boudreau, T.E.2
  • 17
    • 0141467166 scopus 로고    scopus 로고
    • Disaster mitigation: The concept of vulnerability revisited
    • Weichselgartner J. Disaster mitigation: The concept of vulnerability revisited. Disaster Prevention Mgmnt, 2001, 10(2), 85–94
    • (2001) Disaster Prevention Mgmnt , vol.10 , Issue.2 , pp. 85-94
    • Weichselgartner, J.1
  • 18
    • 33645274938 scopus 로고    scopus 로고
    • On the definition of vulnerability in measuring risks to infrastructures
    • Haimes Y.Y. On the definition of vulnerability in measuring risks to infrastructures. Risk Analysis, 2006, 26(2), 293–296
    • (2006) Risk Analysis , vol.26 , Issue.2 , pp. 293-296
    • Haimes, Y.Y.1
  • 20
  • 21
    • 37649029427 scopus 로고    scopus 로고
    • Vulnerability and protection of infrastructure networks
    • Latora V. Marchiori M. Vulnerability and protection of infrastructure networks. Phys. Rev. E, 2005, 71(015103), 1–4
    • (2005) Phys. Rev. E , vol.71 , Issue.015103 , pp. 1-4
    • Latora, V.1    Marchiori, M.2
  • 22
    • 0032190827 scopus 로고    scopus 로고
    • An approach to vulnerability analysis of complex industrial systems
    • Einarsson S. Rausand M. An approach to vulnerability analysis of complex industrial systems. Risk Analysis, 1998, 18(5), 535–546
    • (1998) Risk Analysis , vol.18 , Issue.5 , pp. 535-546
    • Einarsson, S.1    Rausand, M.2
  • 23
    • 0036525623 scopus 로고    scopus 로고
    • Controlling cascading failure: Understanding the vulnerabilities of interconnected infrastructures
    • Little R.G. Controlling cascading failure: Understanding the vulnerabilities of interconnected infrastructures. J. Urban Technol., 2002, 9(1), 109–123
    • (2002) J. Urban Technol , vol.9 , Issue.1 , pp. 109-123
    • Little, R.G.1
  • 24
    • 33751078297 scopus 로고    scopus 로고
    • Methodology for ranking the elements of water-supply networks
    • Michaud D. Apostolakis G.E. Methodology for ranking the elements of water-supply networks. J. Infrastructure Systems, 2006, 12(4), 230–242
    • (2006) J. Infrastructure Systems , vol.12 , Issue.4 , pp. 230-242
    • Michaud, D.1    Apostolakis, G.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.