2020
DOI: 10.1109/tits.2019.2909177
|View full text |Cite
|
Sign up to set email alerts
|

Operational Perspectives Into the Resilience of the U.S. Air Transportation Network Against Intelligent Attacks

Abstract: Protecting critical infrastructures has been deemed a natural security imperative by the U.S. Government for the past 20 years. The resilience of transportation infrastructures is of particular importance, as they serve a crucial rule in economic development and citizen mobility throughout the world. This paper presents a defender-attacker-defender model to analyze the potential impacts of intelligent attacks and worst case disruptions on the U.S. air transportation network, as well as possible protection step… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 28 publications
(27 reference statements)
0
7
0
Order By: Relevance
“…(4) In research studies on attack/recover strategies, as well as investigations on identifications of influential nodes/edges to network resilience and flight delay propagations, most frequent adopted select criteria are to choose node/edge by random or by values of topological metrics. Sophisticated algorithms, such as Monte Carlo Tree Search algorithm [73], adaptive saving and rerouting edge strategy [74], and defender-attacker-defender optimization model [78], have been applied for more effective attack strategies. While to the best of our knowledge, recover strategies still rely on topological indices.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…(4) In research studies on attack/recover strategies, as well as investigations on identifications of influential nodes/edges to network resilience and flight delay propagations, most frequent adopted select criteria are to choose node/edge by random or by values of topological metrics. Sophisticated algorithms, such as Monte Carlo Tree Search algorithm [73], adaptive saving and rerouting edge strategy [74], and defender-attacker-defender optimization model [78], have been applied for more effective attack strategies. While to the best of our knowledge, recover strategies still rely on topological indices.…”
Section: Resultsmentioning
confidence: 99%
“…(2) Under complex network framework, conventional attack strategy and recover strategy are to remove and recover nodes/edges one by one based on the values of topological metrics. Monte Carlo Tree Search algorithm [73], adaptive saving and rerouting edge strategy [74], and defender-attacker-defender optimization model [78] have been employed for more effective attack strategy. While, to the best of our knowledge, investigations about recover strategy still rely on topological indices.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, more and more attacks on and failures of complex networks have caused huge losses to people's production and lives. As some rare occurrences in the past have shown, complex networks are still vulnerable to diverse attacks [3][4][5][6]. To prevent these losses, it is necessary to design robust networks to combat these malicious attacks.…”
Section: Introductionmentioning
confidence: 99%