• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种用于识别和排序因恐怖主义导致的基础设施脆弱性的筛选方法。

A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism.

作者信息

Apostolakis George E, Lemon Douglas M

机构信息

Engineering Systems Division and Department of Nuclear Science and Engineering, Massachusetts Institute of Technology, Cambridge, MA 02139-4307, USA.

出版信息

Risk Anal. 2005 Apr;25(2):361-76. doi: 10.1111/j.1539-6924.2005.00595.x.

DOI:10.1111/j.1539-6924.2005.00595.x
PMID:15876210
Abstract

The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex and interdependent. Protecting the critical infrastructures from terrorism presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify and prioritize the vulnerabilities in these infrastructures. This article presents a methodology for the identification and prioritization of vulnerabilities in infrastructures. We model the infrastructures as interconnected digraphs and employ graph theory to identify the candidate vulnerable scenarios. These scenarios are screened for the susceptibility of their elements to a terrorist attack, and a prioritized list of vulnerabilities is produced. The prioritization methodology is based on multiattribute utility theory. The impact of losing infrastructure services is evaluated using a value tree that reflects the perceptions and values of the decisionmaker and the relevant stakeholders. These results, which are conditional on a specified threat, are provided to the decisionmaker for use in risk management. The methodology is illustrated through the presentation of a portion of the analysis conducted on the campus of the Massachusetts Institute of Technology.

摘要

关键基础设施对现代社会的极端重要性已得到广泛认可。这些基础设施复杂且相互依存。保护关键基础设施免受恐怖主义威胁是一项巨大挑战。鉴于社会无法承受与绝对保护相关的成本,有必要识别这些基础设施中的漏洞并确定其优先级。本文提出了一种识别基础设施漏洞并确定其优先级的方法。我们将基础设施建模为相互连接的有向图,并运用图论来识别候选脆弱情景。对这些情景的元素遭受恐怖袭击的易感性进行筛选,从而生成一份按优先级排序的漏洞清单。优先级排序方法基于多属性效用理论。使用反映决策者和相关利益相关者认知与价值观的价值树来评估失去基础设施服务的影响。这些以特定威胁为条件的结果提供给决策者用于风险管理。通过展示对麻省理工学院校园进行的部分分析来说明该方法。

相似文献

1
A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism.一种用于识别和排序因恐怖主义导致的基础设施脆弱性的筛选方法。
Risk Anal. 2005 Apr;25(2):361-76. doi: 10.1111/j.1539-6924.2005.00595.x.
2
A risk-based approach to setting priorities in protecting bridges against terrorist attacks.一种基于风险的方法,用于确定在保护桥梁免受恐怖袭击方面的优先事项。
Risk Anal. 2004 Aug;24(4):963-84. doi: 10.1111/j.0272-4332.2004.00500.x.
3
Ranking the risks from multiple hazards in a small community.对一个小社区中多种灾害的风险进行排名。
Risk Anal. 2009 Mar;29(3):438-56. doi: 10.1111/j.1539-6924.2008.01164.x. Epub 2008 Dec 8.
4
Development of a security vulnerability assessment process for the RAMCAP chemical sector.为RAMCAP化工行业开发安全漏洞评估流程。
J Hazard Mater. 2007 Apr 11;142(3):689-94. doi: 10.1016/j.jhazmat.2006.06.133. Epub 2006 Jul 6.
5
Risk analysis for critical asset protection.关键资产保护的风险分析。
Risk Anal. 2007 Oct;27(5):1265-81. doi: 10.1111/j.1539-6924.2007.00955.x.
6
Modeling the demand reduction input-output (I-O) inoperability due to terrorism of interconnected infrastructures.模拟因相互关联的基础设施遭受恐怖主义袭击而导致的需求减少投入产出(I-O)不可用性。
Risk Anal. 2004 Dec;24(6):1437-51. doi: 10.1111/j.0272-4332.2004.00540.x.
7
Risk-based decision making for terrorism applications.恐怖主义应用中的基于风险的决策制定。
Risk Anal. 2009 Mar;29(3):321-35. doi: 10.1111/j.1539-6924.2008.01196.x. Epub 2009 Jan 29.
8
A framework for linking cybersecurity metrics to the modeling of macroeconomic interdependencies.一个将网络安全指标与宏观经济相互依存关系建模相联系的框架。
Risk Anal. 2007 Oct;27(5):1283-97. doi: 10.1111/j.1539-6924.2007.00957.x.
9
Risk management for Leontief-based interdependent systems.基于列昂惕夫的相互依存系统的风险管理。
Risk Anal. 2004 Oct;24(5):1215-29. doi: 10.1111/j.0272-4332.2004.00520.x.
10
Infrastructure Vulnerability Assessment Model (I-VAM).基础设施脆弱性评估模型(I-VAM)
Risk Anal. 2007 Jun;27(3):571-83. doi: 10.1111/j.1539-6924.2007.00907.x.

引用本文的文献

1
Identifying power outage hotspots to support risk management planning.识别停电热点以支持风险管理规划。
Risk Anal. 2025 Jun;45(6):1271-1281. doi: 10.1111/risa.17663. Epub 2024 Oct 9.
2
Threats Detection during Human-Computer Interaction in Driver Monitoring Systems.驾驶员监控系统中的人机交互中的威胁检测。
Sensors (Basel). 2022 Mar 19;22(6):2380. doi: 10.3390/s22062380.
3
Review of Modeling Methodologies for Managing Water Distribution Security.供水安全管理建模方法综述
J Water Resour Plan Manag. 2020 Jun 13;146(8):1-23. doi: 10.1061/(ASCE)WR.1943-5452.0001265.