Abstract

Free AccessAboutSectionsView PDF ToolsAdd to favoritesDownload CitationsTrack CitationsPermissionsReprints ShareShare onFacebookTwitterLinked InEmail Go to SectionFree Access HomeINFORMS TutORials in Operations ResearchEmerging Theory, Methods, and Applications Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning DefensesGerald G. Brown, W. Matthew Carlyle, Javier Salmerón, Kevin WoodGerald G. Brown, W. Matthew Carlyle, Javier Salmerón, Kevin WoodPublished Online:14 Oct 2014https://doi.org/10.1287/educ.1053.0018Abstract We describe new bilevel programming models to (1) help make the country's critical infrastructure more resilient to attacks by terrorists, (2) help governments and businesses plan those improvements, and (3) help influence related public policy on investment incentives, regulations, etc. An intelligent attacker (terrorists) and defender (us) are key features of all these models, along with information transparency: These are Stackelberg games, as opposed to two-person, zero-sum games. We illustrate these models with applications to electric power grids, subways, airports, and other critical infrastructure. For instance, one model identifies locations for a given set of electronic sensors that minimize the worst-case time to detection of a chemical, biological, or radiological contaminant introduced into the Washington, D.C. subway system. The paper concludes by reporting insights we have gained through forming “red teams,” each of which gathers open-source data on a real-world system, develops an appropriate attacker-defender or defender-attacker model, and solves the model to identify vulnerabilities in the system or to plan an optimal defense. This publication has no references to display. Your Access Options Login Options INFORMS Member Login Nonmember Login Purchase Options Save for later Item saved, go to cart Tutorials in OR, TutorialsNew $20.00 Add to cart Tutorials in OR, TutorialsNew Checkout Other Options Token Access Insert token number Claim access using a token Restore guest access Applies for purchases made as a guest Previous Back to Top Next FiguresReferencesRelatedInformationCited ByOn Time-Dependent Critical Platforms and Tracks in Metro SystemsJunwei Wang, Yue Gao, Yao Cheng18 February 2022 | Transportation Science, Vol. 56, No. 4Optimal Power Flow in Distribution Networks Under N – 1 Disruptions: A Multistage Stochastic Programming ApproachHaoxiang Yang, Harsha Nagarajan5 November 2021 | INFORMS Journal on Computing, Vol. 34, No. 2Modeling Defender-Attacker Problems as Robust Linear Programs with Mixed-Integer Uncertainty SetsJuan S. Borrero, Leonardo Lozano17 February 2021 | INFORMS Journal on Computing, Vol. 33, No. 4Mitigating Interdiction Risk with FortificationLe Thi Khanh Hien, Melvyn Sim, Huan Xu24 February 2020 | Operations Research, Vol. 68, No. 2Interdiction Games and Monotonicity, with Application to Knapsack ProblemsMatteo Fischetti, Ivana Ljubić, Michele Monaci, Markus Sinnl26 April 2019 | INFORMS Journal on Computing, Vol. 31, No. 2A Backward Sampling Framework for Interdiction Problems with FortificationLeonardo Lozano, J. Cole Smith21 December 2016 | INFORMS Journal on Computing, Vol. 29, No. 1 Emerging Theory, Methods, and ApplicationsSeptember 2005 Article Information Metrics Downloaded 239 times in the past 12 months Information Published Online:October 14, 2014 Copyright © 2005, INFORMSCite asGerald G. BrownW. Matthew CarlyleJavier SalmerónKevin Wood (2014) Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning Defenses. INFORMS TutORials in Operations Research null(null):102-123. https://doi.org/10.1287/educ.1053.0018 Keywordscritical infrastructure protectionbilevel programmixed-integer programhomeland securityPDF download

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.