Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Simulating Network Robustness for Critical Infrastructure Networks

Dekker, A.H.

    We examine the robustness of critical infrastructure networks in the face of terrorist attack, using a simulation experiment that incorporates link capacity; and an extension of data farming which we call network farming. Our results show that symmetrical designed networks generally outperform randomly generated networks, although ring-like structures are very vulnerable. Under targeted attacks, most networks begin to fail when the number of attacks is equal to the node connectivity. Examining the distribution of real-world terrorist attacks, we show that these can be modelled by a Poisson statistical distribution, leading to recommendations for the node connectivity required at different threat levels.
Cite as: Dekker, A.H. (2005). Simulating Network Robustness for Critical Infrastructure Networks. In Proc. Twenty-Eighth Australasian Computer Science Conference (ACSC2005), Newcastle, Australia. CRPIT, 38. Estivill-Castro, V., Ed. ACS. 59-68.
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS
 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 16 Nov 2007