2015
DOI: 10.1111/risa.12333
|View full text |Cite
|
Sign up to set email alerts
|

Operational Models of Infrastructure Resilience

Abstract: We propose a definition of infrastructure resilience that is tied to the operation (or function) of an infrastructure as a system of interacting components and that can be objectively evaluated using quantitative models. Specifically, for any particular system, we use quantitative models of system operation to represent the decisions of an infrastructure operator who guides the behavior of the system as a whole, even in the presence of disruptions. Modeling infrastructure operation in this way makes it possibl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
102
0
5

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 142 publications
(107 citation statements)
references
References 79 publications
0
102
0
5
Order By: Relevance
“…There is a growing body of work in largescale optimization and game theory that leverages the specialized structure of these networks to discover specific vulnerabilities and to identify limited defensive investments that can maximally increase robustness and resilience (e.g., Ref. [4,25]). Bridging the gap between the specific recommendations of these highly detailed models and the insights from more general models described here is an important goal for ongoing research.…”
Section: Discussionmentioning
confidence: 99%
“…There is a growing body of work in largescale optimization and game theory that leverages the specialized structure of these networks to discover specific vulnerabilities and to identify limited defensive investments that can maximally increase robustness and resilience (e.g., Ref. [4,25]). Bridging the gap between the specific recommendations of these highly detailed models and the insights from more general models described here is an important goal for ongoing research.…”
Section: Discussionmentioning
confidence: 99%
“…In the outer level, the defender can use many strategies, such as those summarized in the literature (Ouyang et al., ; Ouyang, ; Hausken and Levitin, ) to mitigate system vulnerability against disruptive events. For illustrative purposes, this article considers two typical preevent defense strategies, which have also been considered by other scholars in the literature (Brown et al., ; Alderson et al., , ). One is to protect some components (nodes or lines) to make them invulnerable under attacks; the other is to build new invulnerable lines to increase system redundancy.…”
Section: Model Formulationmentioning
confidence: 99%
“…If we denote all operation decision variables Pbold-italicS=(PiS)i=1,2,..|V|, Pbold-italicD=(PiD)i=1,2,..|V|, P L = ((PlL)bold-italici0.33em=1,2,..|L|, false(PlLfalse)bold-italici0.33em=1,2,..|bold-italicLnew|) by a single vector y , and the attack decision variables xbold-italicV=(xiV)i=1,2,,|V|,xbold-italicL=(xiL)i=1,2,,|L| by a single vector x (the attack center variables Om,m=1,2,M, are not included, as they are fully correlated with x V , x L ), then the proposed VM‐MSLAs model is simply described by min w max x min y , V ( w , x , y ). This type of tri‐level model is usually solved by the following solution framework (Brown et al., ; Alderson et al., , ; Zeng and Zhao, ). This framework begins by solving a subproblem max x , min y , and V (…”
Section: Solution Algorithmmentioning
confidence: 99%
See 2 more Smart Citations