Contribution to Assessments of Impacts on the Critical Infrastructure

Article Preview

Abstract:

Assessing the vulnerability of critical infrastructure objects is of major concern when dealing with the process of dependability and risk management. Special attention is paid to the objects of higher interest, such as nuclear power plants. In spite of the protection of these objects, there is still a certain level of a potential threat. The aim of the paper is to describe a possible way of assessments of the consequences when attacking on an object of critical infrastructure. Several characteristics of the impacts outcomes were obtained. For this reason, as well as for modelling of adversary ́s behaviour impact, fuzzy logic tools have been used.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

578-587

Citation:

Online since:

October 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] R. A. Blais, M. D. Henry, S. R. Lilley, J. A. Pan, M. Grimes, Y. Y. Haimes, Risk-based methodology for assessing and managing the severity of a terrorist attack 2009 IEEE Systems and Information Engineering Design Symposium, SIEDS '09, art. no. 5166175: 171-176.

DOI: 10.1109/sieds.2009.5166175

Google Scholar

[2] M. Bohner, A. Peterson, Dynamic Equations on Time Scales: An Introduction with Applications. Birkhäuser, Boston, (2001).

Google Scholar

[3] M. Bohner, S. Sanyal, The Stochastic Dynamic Exponential and Geometric Brownian Motion on Isolated Time Scale. Community Mathematical Anals 2010; 8: 120-135.

Google Scholar

[4] M. Csörgö, Random Walk and Brownian Local Times in Wiener Sheets. Periodica Mathematica Hungarica 61 (2010) 1-21.

DOI: 10.1007/s10998-010-3001-7

Google Scholar

[5] A. F. Desmond, G. R. Chapman, Modelling Task Completion Data with Inverse Gaussian Mixtures. Applied Statistics 4(42) (1993) 603-613.

DOI: 10.2307/2986178

Google Scholar

[6] K. A. Doksum, A. Hóyland, Models for Variable-Stress Accelerated Life Testing Experiments Based on Wiener Processes and the Inverse Gaussian Distribution. Technometrics 1(34)(1992) 74-82.

DOI: 10.2307/1269554

Google Scholar

[7] A. Studzinski, K. Pietrucha-Urbanik, Risk Indicators of Water Network Operation. International Conference On Safety & Environment In Process & Power Industry, PT 1 Book Series: Chemical Engineering Transactions 26 (2012).

Google Scholar

[8] T. J. Kelly, K. C. Hofacre, T. L. Derringer, K. B. Riggs, E. N. Koglin, Testing of safe buildings detection technologies and other homeland security technologies in EPA's Environmental Technology Verification (ETV) program, Proceedings of the Air and Waste Management Association's Annual Meeting and Exhibition 2004; 3449-3457.

Google Scholar

[9] R. L. Kemp, Assessing the vulnerability of buildings, Journal of Applied Fire Science 14 (1) (2007) 53-61.

Google Scholar

[10] J. Mueller, Assessing Measures Designed to Protect the Homeland, Policy Studies Journal 1(38) (2010) 1-21.

Google Scholar

[11] K. Pietrucha-Urbanik, A. Studziński, Analysis of water pipe breakage in Krosno, Poland. Environmental Engineering IV, Pawłowski A., Dudzińska M. R. Pawłowski L. (eds), Taylor & Francis Group, London, 2013, 59-62.

Google Scholar

[12] M. G. Stewart, Cost effectiveness of risk mitigation strategies for protection of buildings against terrorist attack. Journal of Performance of Constructed Facilities 2(22) (2008) 115-120.

DOI: 10.1061/(asce)0887-3828(2008)22:2(115)

Google Scholar

[13] D. Valis, Z. Vintr, J. Malach, Selected aspects of physical structures vulnerability - state-of-the-art. Eksploatacja i Niezawodnosc - Maintenance and Reliability 14(3) (2012) 189-194.

Google Scholar

[14] G. S. French, D. Gootzit, Defining and assessing vulnerability of infrastructure to terrorist attack, Vulnerability, Uncertainty, and Risk: Analysis, Modelling, and Management. Proceedings of the ICVRAM 2011 and ISUMA 2011 Conferences 2011; 782-789.

DOI: 10.1061/41170(400)95

Google Scholar

[15] W. H. Zehrt Jr, P. F. Acosta, Analysis and design of structures to withstand terrorist attack, Proceedings of the Structures Congress and Exposition 2003; 585-592.

Google Scholar

[16] Š. Čorňák, The assessment of brake fluids based on glycols and the toxicity. Transport Means - Proceedings of the International Conference, 1(1) (2012) 135-140.

Google Scholar

[17] Š. Čorňák, Selected problems of drivers microclimate. In: Transport Means – Proceedings of the 13th International Conference. Kaunas: Kaunas University of Technology, (2009).

Google Scholar

[18] D. Vališ, K. Pietrucha-Urbanik, Contribution to diffusion processes application in the area of critical infrastructure security assessment. In: Applied Mechanics and Materials. Zurich, Switzerland: Trans Tech Publications, 2013, pp.539-548.

DOI: 10.4028/www.scientific.net/amm.436.539

Google Scholar