1.

Record Nr.

UNINA9910786668703321

Titolo

Examining robustness and vulnerability of networked systems / / edited by Sergiy Butenko, Eduardo L. Pasiliao and Volodymyr Shylo

Pubbl/distr/stampa

Amsterdam, Netherlands ; ; Fairfax, Virginia : , : IOS Press, , 2014

©2014

ISBN

1-61499-391-2

Descrizione fisica

1 online resource (320 p.)

Collana

NATO Science for Peace and Security Series - D: Information and Communication Security, , 1879-8292 ; ; Volume 37

Disciplina

005.8

Soggetti

Computer networks - Security measures

Computer networks - Mathematical models

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

"The NATO Advanced Research Workshop on "Examining RoKi bustness and Vulnerability of Critical Infrastructure Networks" was held in Kyiv, e v, Ukraine on June 3-5, 2013."

Nota di bibliografia

Includes bibliographical references at the end of each chapters and indexes.

Nota di contenuto

""EXAMINING ROBUSTNESS AND VULNERABILITY OF NETWORKED SYSTEMS""; ""Preface""; ""Contents""; ""A Survey of Interdependency Models for Critical Infrastructure Networks""; ""Using GRASP for the Cover by s-Defective Independent Sets Problem""; ""Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance""; ""Variable Neighborhood Search for Edge-Ratio Network Clustering""; ""On Data Clustering: Exact and Approximate Solutions""; ""A Hybrid Metaheuristic for the Maximum k-Plex Problem""

""Monotonic and Non-Monotonic Infections on Networks""""Navigation Function Based Decentralized Control of A Multi-Agent System with Network Connectivity Constraints""; ""Evaluation of the Reliability of Repairable sâ??t Networks by Fast Simulation Method""; ""Analysis and Design of Robust Network Clusters with Bounded Diameter""; ""Multiobjective Particle Swarm Optimization for a Multicast Routing Problem""; ""Robust Networked Control Systems with Communication Constraints""; ""Hop-Constrained Tree-Shaped Networks""

""Bilinear Markovian Processes of Search for Stationary and Moving



Objects""""On Risk-Averse Weighted k-Club Problems""; ""Distributed Computer Attack Detection System for Corporate Networks""; ""Optimal Balanced Packing Using Phi-Function Technique""; ""Security in Wireless Networks: A Tutorial""; ""Approximation Algorithms for Detecting Critical Nodes""; ""Subject Index""; ""Author Index""

Sommario/riassunto

Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algor