Show simple item record

dc.contributor.advisorGeorge E. Apostolakis.en_US
dc.contributor.authorLemon, Douglas M. (Douglas Michael), 1967-en_US
dc.contributor.otherMassachusetts Institute of Technology. Dept. of Nuclear Engineering.en_US
dc.date.accessioned2005-06-02T18:29:55Z
dc.date.available2005-06-02T18:29:55Z
dc.date.copyright2004en_US
dc.date.issued2004en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/17749
dc.descriptionThesis (S.M.)--Massachusetts Institute of Technology, Dept. of Nuclear Engineering, 2004.en_US
dc.descriptionIncludes bibliographical references (leaves 72-76).en_US
dc.description.abstractThe extreme importance of critical infrastructures to modem society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from terrorism, human generated malevolent attack directed toward maximum social disruption, presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This project examines a screening methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vulnerable points. The vulnerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory, and involves various disciplines including quantitative risk assessment and decision analysis. The methodology is illustrated through the presentation of a portion on the analysis conducted on the community of the Massachusetts Institute of Technology.en_US
dc.description.statementofresponsibilityby Douglas M. Lemon.en_US
dc.format.extent113 leavesen_US
dc.format.extent4237228 bytes
dc.format.extent4237035 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsM.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582
dc.subjectNuclear Engineering.en_US
dc.titleA methodology for the identification of critical locations in infrastructuresen_US
dc.typeThesisen_US
dc.description.degreeS.M.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Nuclear Engineeringen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Nuclear Science and Engineering
dc.identifier.oclc56504116en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record