Show simple item record

dc.contributor.authorLemon, Douglas M.
dc.date.accessioned2016-06-01T14:53:11Z
dc.date.available2016-06-01T14:53:11Z
dc.date.issued2004-06
dc.identifier.urihttp://hdl.handle.net/1721.1/102756
dc.description.abstractThe extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from terrorism, human generated malevolent attack directed toward maximum social disruption, presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This paper presents a methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vulnerable points. The vulnerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory. The methodology is illustrated through the presentation of a portion on the analysis conducted on the campus of the Massachusetts Institute of Technology.en_US
dc.language.isoen_USen_US
dc.publisherMassachusetts Institute of Technology. Engineering Systems Divisionen_US
dc.relation.ispartofseriesESD Working Papers;ESD-WP-2004-01
dc.titleA Methodology for the Identification of Critical Locations in Infrastructuresen_US
dc.typeWorking Paperen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record