2013
DOI: 10.1007/978-3-642-45037-2_17
|View full text |Cite
|
Sign up to set email alerts
|

An Agent-Based Modeling and Evolutionary Optimization Approach for Vulnerability Analysis of Critical Infrastructure Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…The clustering algorithm is that of grouping finite arcos as valid transaction. In this manner, the results are used to analyze the proposed anti-money laundering after fraudulent properties of data processing technologies [15] [16].There are no rules on regular money laundering and money laundering as we choose a suitable strategy to track down. Therefore, with the central decision tree algorithm, we can more efficiently identify extraordinary transactions data [17].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The clustering algorithm is that of grouping finite arcos as valid transaction. In this manner, the results are used to analyze the proposed anti-money laundering after fraudulent properties of data processing technologies [15] [16].There are no rules on regular money laundering and money laundering as we choose a suitable strategy to track down. Therefore, with the central decision tree algorithm, we can more efficiently identify extraordinary transactions data [17].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Ouyang [8] carried out an in-depth review of modeling and simulation approaches used to assess the vulnerability of critical infrastructure systems. These approaches include (see also [9,10]): Computational and optimization approaches, i.e., object-oriented programming, and agent-based modeling; simulation approaches, such as system dynamics-based modeling; network-based approaches; economic based approaches; and other approaches (for instance, approaches based on the implementation of petri-nets, dynamic control system theory, Bayesian networks). In the stream of the computational approach, Behrooz et al [11] used an optimization model to deal with the problem of demand uncertainty in the daily planning of natural gas transmission.…”
Section: Literaturementioning
confidence: 99%
“…The elementary critical infrastructure network constructed in QGIS contains the geographical location of the nodes and links, which provides the possibility of extension to geographical area damage simulation in future work. The failure scenarios within the physical infrastructure network, comprising of one-node failures, two-node failures and three-node failures, are simulated by assuming different combinations of failed nodes and computing the resulting impact on all critical infrastructure sectors interconnected in the I/O model (Kizhakkedath et al, 2013;Lam et al, 2013;Tai et al, 2013). Figure 4 shows the graphical representation of the Netlogo program for 'one physical network' consisting of the telecommunication network and 'two physical networks' consisting of the telecommunication network and the electrical grid.…”
Section: Combining I/o Model and Physical Critical Infrastructure Netmentioning
confidence: 99%