Assessing the impact of vulnerability modeling in the protection of critical infrastructure
AbstractThis paper examines the impact of arc metrics on the computational performance and spatial similarity in network interdiction modeling. Computational impact is measured in the number of iterations and total time required to reach an optimal solution. A combination of spatial analytical tools is offered as a methodology to assess the similarity in defense resource allocation when applying different arc interdiction metrics. An experimental design was devised and implemented using two real-world sub-networks of the Los Angeles County roadway system. This paper shows that arc metric selection has a limited effect on the spatial allocation of defense resources though metric choice does directly impact computation time. These results have direct implications to public policy and decision-making by enabling a modeler to increase his/her situational awareness and also their confidence in resource allocation decisions by selecting metrics that will improve their solution capabilities. Copyright Springer-Verlag 2012
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.
Bibliographic InfoArticle provided by Springer in its journal Journal of Geographical Systems.
Volume (Year): 14 (2012)
Issue (Month): 4 (October)
Contact details of provider:
Web page: http://www.springerlink.com/link.asp?id=103079
Network interdiction; Bi-level optimization; Spatial analysis; Critical infrastructure protection; Homeland security; C61; C02; C13; R4; Z18; H56;
Find related papers by JEL classification:
- C61 - Mathematical and Quantitative Methods - - Mathematical Methods; Programming Models; Mathematical and Simulation Modeling - - - Optimization Techniques; Programming Models; Dynamic Analysis
- C02 - Mathematical and Quantitative Methods - - General - - - Mathematical Economics
- C13 - Mathematical and Quantitative Methods - - Econometric and Statistical Methods and Methodology: General - - - Estimation: General
- R4 - Urban, Rural, Regional, Real Estate, and Transportation Economics - - Transportation Economics
- Z18 - Other Special Topics - - Cultural Economics - - - Public Policy
- H56 - Public Economics - - National Government Expenditures and Related Policies - - - National Security and War
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Timothy Matisziw & Alan Murray & Tony Grubesic, 2009. "Exploring the vulnerability of network infrastructure to disruption," The Annals of Regional Science, Springer, vol. 43(2), pages 307-321, June.
- Alan Murray & Timothy Matisziw & Tony Grubesic, 2007. "Critical network infrastructure analysis: interdiction and system flow," Journal of Geographical Systems, Springer, vol. 9(2), pages 103-117, June.
- Nie, Xiaofeng & Batta, Rajan & Drury, Colin G. & Lin, Li, 2009. "Passenger grouping with risk levels in an airport security system," European Journal of Operational Research, Elsevier, vol. 194(2), pages 574-584, April.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Guenther Eichhorn) or (Christopher F. Baum).
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.