Vulnerability and Protection Analysis of Critical Infrastructure Systems
Utilizing the IIM, four pertinent problems encompassing vulnerability and protection of critical infrastructures are formulated and solved. For protection analysis, the Entity Hardening Problem, Targeted Entity Hardening Problem and Auxiliary Entity Allocation Problem are formulated. Qualitatively, under a resource budget, the problems maximize the number of entities protected from failure from an initial failure of a set of entities. Additionally, the model is also used to come up with a metric to analyze the Robustness of critical infrastructure systems. The computational complexity of all these problems is NP-complete. Accordingly, Integer Linear Program solutions (to obtain the optimal solution) and polynomial time sub-optimal Heuristic solutions are proposed for these problems. To analyze the efficacy of the Heuristic solution, comparative studies are performed on real-world and test system data.]]>autBanerjee, JoydeepthsSen, ArunabhadgcDasgupta, ParthadgcXue, GuoliangdgcRaravi, GurulingeshpblArizona State UniversityengDoctoral Dissertation Computer Science 2017https://hdl.handle.net/2286/R.I.4557500Doctoral DissertationAcademic theses156 pages115069901731630032421155859systemIn CopyrightAll Rights Reserved2017TextComputer Science