2018
DOI: 10.1007/978-3-319-99843-5_13
|View full text |Cite
|
Sign up to set email alerts
|

Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…In this paper, we argue that an integrated approach based on fortification models is a more effective and accurate tool to allocate protection resources than a sequential approach based on vulnerability metrics, thus extending the work of [9]. To prove our claim, we consider the most recent measures recently proposed in the literature to assess rail transport systems' vulnerability, in addition to those identified in [9]. These include metrics belonging to the three aforementioned categories (i.e., connectivity, path length and flow) and also metrics for each combination of two out of three of these criteria.…”
Section: Introductionmentioning
confidence: 93%
See 3 more Smart Citations
“…In this paper, we argue that an integrated approach based on fortification models is a more effective and accurate tool to allocate protection resources than a sequential approach based on vulnerability metrics, thus extending the work of [9]. To prove our claim, we consider the most recent measures recently proposed in the literature to assess rail transport systems' vulnerability, in addition to those identified in [9]. These include metrics belonging to the three aforementioned categories (i.e., connectivity, path length and flow) and also metrics for each combination of two out of three of these criteria.…”
Section: Introductionmentioning
confidence: 93%
“…The integrated approach deployed in this paper relies on a novel bi-level multi-criteria optimisation model, namely the Railway Fortification Problem (RFP). As reported in Section 2.2, previous models have typically focused only on one specific network feature (i.e., connectivity, path length, and flow) [9]. RFP combines these features, thus generating robust solutions with respect to multiple criteria.…”
Section: Integrated Approachmentioning
confidence: 99%
See 2 more Smart Citations
“…Critical infrastructures are network-based systems hence, they are composed of nodes and edges. The literature shows that node criticality, which is the focus of this paper, can be addressed from different metric-based perspectives (e.g., degree, maximal flow, shortest path) [6][7][8][9][10]. However, each metric provides a specific insight while neglecting others.…”
Section: Introductionmentioning
confidence: 99%