2008
DOI: 10.1243/1748006xjrr138
|View full text |Cite
|
Sign up to set email alerts
|

Identifying critical components in technical infrastructure networks

Abstract: A new method for identifying and ranking critical components and sets of components in technical infrastructures is presented. The criticality of a component or a set of components is defined as the vulnerability of the system to failure in a specific component, or set of components. The identification of critical components is increasingly difficult when considering multiple simultaneous failures. This is especially difficult when dealing with failures of multiple components with synergistic consequences, i.e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
32
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(33 citation statements)
references
References 22 publications
0
32
0
1
Order By: Relevance
“…The method for determining critical elements in technical infrastructure networks [9] facilitates the definition and ranking of such groups of elements (as well as groups of elements whose failure does not give a synergistic effect). The found critical elements or sets of elements can then be studied in more detail using probabilistic methods of risk analysis [10].…”
Section: Definition and Ranking Of Critical Elementsmentioning
confidence: 99%
See 1 more Smart Citation
“…The method for determining critical elements in technical infrastructure networks [9] facilitates the definition and ranking of such groups of elements (as well as groups of elements whose failure does not give a synergistic effect). The found critical elements or sets of elements can then be studied in more detail using probabilistic methods of risk analysis [10].…”
Section: Definition and Ranking Of Critical Elementsmentioning
confidence: 99%
“…The determination of such sections of main gas pipelines and their combinations is complicated by the fact that in the current configuration of the Unified Gas Supply System of Russia there are about 500 edges. Therefore, at this stage of the study of critical objects of the gas industry, the authors proposed the use of the method of determining critical elements in the networks [9]. Its application is justified by the need to assess the importance of the gas sector's critical objects.…”
Section: Introductionmentioning
confidence: 99%
“…Recent literature reviews reflect a growing attention in the research of infrastructure vulnerability, and contributions are produced in various disciplines and applied in many different fields [41]. In current research, because different disciplines have their own characteristics, the definitions of vulnerability are always different, especially between natural science and social science, and sometimes they seem ambiguous [42]. Generally speaking, there are two commonly accepted interpretations in research literature [19].…”
Section: Vulnerability Of Infrastructurementioning
confidence: 99%
“…The other is that vulnerability applies to express a critical system component, a geographical location, or an aspect of a system [39]. According to these interpretations, there are different types of vulnerability analyses, ranging from global vulnerability analysis [44] and critical component analysis [42] to critical geographical locations analysis [45].…”
Section: Vulnerability Of Infrastructurementioning
confidence: 99%
“…The ability of e j to impact network performance in an adverse manner is a function of the network's vulnerability [34,52,53], similar in concept to a lack of robustness in the "resilience triangle" literature in civil infrastructure [10]. Jonsson et al [30] define vulnerability as the magnitude of damage given the occurrence of a particular disruptive event, noting that the vulnerability of a network is highly dependent upon the type and extent of disruption e j . We measure vulnerability as network performance after the removal of a set of nodes or links based only on topological features (i.e., without load redistribution leading to potential cascading failures).…”
Section: Introductionmentioning
confidence: 99%