Springer Science & Business Media, Jun 22, 2011 - Technology & Engineering - 204 pages
The safe management of the complex distributed systems and critical infrastructures which constitute the backbone of modern industry and society entails identifying and quantifying their vulnerabilities to design adequate protection, mitigation, and emergency action against failure. In practice, there is no fail-safe solution to such problems and various frameworks are being proposed to effectively integrate different methods of complex systems analysis in a problem-driven approach to their solution.
Vulnerable Systems reflects the current state of knowledge on the procedures which are being put forward for the risk and vulnerability analysis of critical infrastructures. Classical methods of reliability and risk analysis, as well as new paradigms based on network and systems theory, including simulation, are considered in a dynamic and holistic way.
Readers of Vulnerable Systems will benefit from its structured presentation of the current knowledge base on this subject. It will enable graduate students, researchers and safety and risk analysts to understand the methods suitable for different phases of analysis and to identify their criticalities in application.
What people are saying - Write a review
We haven't found any reviews in the usual places.
5 Conceptual Frameworks for Vulnerability Assessment
6 Methods of Analysis
7 Concluding Considerations
Other editions - View all
agent-based modeling agents analyzing Apostolakis applied attacks behavior blackout cascading failures clustering coefficient complex networks complex systems connected consequences critical infrastructures critical load damage defined developed dynamics effects efficiency electric power system electric power transmission elements Eusgeld evaluation event tree example factors failure cascade failure propagation federation framework function global graph grid hazards and threats high level architecture HLA standard human error human reliability identified IEEE interactions interconnected interdependency links interface IRGC Kirwan Kröger large number Latora methods modeling and simulation network systems network theory nodes outage overall overhead lines overload parameters performance physical probabilistic probability PSFs quantify quantitative random graph Reliab Eng Syst risk analysis risk assessment RTI software safety SCADA scenarios Schläpfer SHERPA shortest paths specific step structure substation system operating Table task techniques THERP vulnerability analysis vulnerability assessment Zio and Sansavini