A methodology for the identification of critical locations in infrastructures
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Nuclear Engineering, 2004. === Includes bibliographical references (leaves 72-76). === The extreme importance of critical infrastructures to modem society is widely recognized. These infrastructures are complex, interdependent, and ubiqu...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | English |
Published: |
Massachusetts Institute of Technology
2005
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/17749 |
id |
ndltd-MIT-oai-dspace.mit.edu-1721.1-17749 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-MIT-oai-dspace.mit.edu-1721.1-177492019-05-02T15:51:17Z A methodology for the identification of critical locations in infrastructures Lemon, Douglas M. (Douglas Michael), 1967- George E. Apostolakis. Massachusetts Institute of Technology. Dept. of Nuclear Engineering. Massachusetts Institute of Technology. Dept. of Nuclear Engineering. Nuclear Engineering. Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Nuclear Engineering, 2004. Includes bibliographical references (leaves 72-76). The extreme importance of critical infrastructures to modem society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from terrorism, human generated malevolent attack directed toward maximum social disruption, presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This project examines a screening methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vulnerable points. The vulnerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory, and involves various disciplines including quantitative risk assessment and decision analysis. The methodology is illustrated through the presentation of a portion on the analysis conducted on the community of the Massachusetts Institute of Technology. by Douglas M. Lemon. S.M. 2005-06-02T18:29:55Z 2005-06-02T18:29:55Z 2004 2004 Thesis http://hdl.handle.net/1721.1/17749 56504116 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 113 leaves 4237228 bytes 4237035 bytes application/pdf application/pdf application/pdf Massachusetts Institute of Technology |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Nuclear Engineering. |
spellingShingle |
Nuclear Engineering. Lemon, Douglas M. (Douglas Michael), 1967- A methodology for the identification of critical locations in infrastructures |
description |
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Nuclear Engineering, 2004. === Includes bibliographical references (leaves 72-76). === The extreme importance of critical infrastructures to modem society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from terrorism, human generated malevolent attack directed toward maximum social disruption, presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This project examines a screening methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vulnerable points. The vulnerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory, and involves various disciplines including quantitative risk assessment and decision analysis. The methodology is illustrated through the presentation of a portion on the analysis conducted on the community of the Massachusetts Institute of Technology. === by Douglas M. Lemon. === S.M. |
author2 |
George E. Apostolakis. |
author_facet |
George E. Apostolakis. Lemon, Douglas M. (Douglas Michael), 1967- |
author |
Lemon, Douglas M. (Douglas Michael), 1967- |
author_sort |
Lemon, Douglas M. (Douglas Michael), 1967- |
title |
A methodology for the identification of critical locations in infrastructures |
title_short |
A methodology for the identification of critical locations in infrastructures |
title_full |
A methodology for the identification of critical locations in infrastructures |
title_fullStr |
A methodology for the identification of critical locations in infrastructures |
title_full_unstemmed |
A methodology for the identification of critical locations in infrastructures |
title_sort |
methodology for the identification of critical locations in infrastructures |
publisher |
Massachusetts Institute of Technology |
publishDate |
2005 |
url |
http://hdl.handle.net/1721.1/17749 |
work_keys_str_mv |
AT lemondouglasmdouglasmichael1967 amethodologyfortheidentificationofcriticallocationsininfrastructures AT lemondouglasmdouglasmichael1967 methodologyfortheidentificationofcriticallocationsininfrastructures |
_version_ |
1719029352675409920 |