04328nam 2200625 450 991078666870332120230803203444.01-61499-391-2(CKB)3710000000149598(EBL)1720838(SSID)ssj0001376534(PQKBManifestationID)11875068(PQKBTitleCode)TC0001376534(PQKBWorkID)11368988(PQKB)10634957(MiAaPQ)EBC1720838(Au-PeEL)EBL1720838(CaPaEBR)ebr10898081(CaONFJC)MIL621557(OCoLC)882610505(EXLCZ)99371000000014959820140808h20142014 uy 0engur|n|---|||||txtccrExamining robustness and vulnerability of networked systems /edited by Sergiy Butenko, Eduardo L. Pasiliao and Volodymyr ShyloAmsterdam, Netherlands ;Fairfax, Virginia :IOS Press,2014.©20141 online resource (320 p.)NATO Science for Peace and Security Series - D: Information and Communication Security,1879-8292 ;Volume 37"The NATO Advanced Research Workshop on "Examining RoKi bustness and Vulnerability of Critical Infrastructure Networks" was held in Kyiv, e v, Ukraine on June 3-5, 2013."1-61499-390-4 Includes bibliographical references at the end of each chapters and indexes.""EXAMINING ROBUSTNESS AND VULNERABILITY OF NETWORKED SYSTEMS""; ""Preface""; ""Contents""; ""A Survey of Interdependency Models for Critical Infrastructure Networks""; ""Using GRASP for the Cover by s-Defective Independent Sets Problem""; ""Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance""; ""Variable Neighborhood Search for Edge-Ratio Network Clustering""; ""On Data Clustering: Exact and Approximate Solutions""; ""A Hybrid Metaheuristic for the Maximum k-Plex Problem""""Monotonic and Non-Monotonic Infections on Networks""""Navigation Function Based Decentralized Control of A Multi-Agent System with Network Connectivity Constraints""; ""Evaluation of the Reliability of Repairable sâ??t Networks by Fast Simulation Method""; ""Analysis and Design of Robust Network Clusters with Bounded Diameter""; ""Multiobjective Particle Swarm Optimization for a Multicast Routing Problem""; ""Robust Networked Control Systems with Communication Constraints""; ""Hop-Constrained Tree-Shaped Networks""""Bilinear Markovian Processes of Search for Stationary and Moving Objects""""On Risk-Averse Weighted k-Club Problems""; ""Distributed Computer Attack Detection System for Corporate Networks""; ""Optimal Balanced Packing Using Phi-Function Technique""; ""Security in Wireless Networks: A Tutorial""; ""Approximation Algorithms for Detecting Critical Nodes""; ""Subject Index""; ""Author Index""Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algorNATO science for peace and security series.Sub-series D,Information and communication security.Computer networksSecurity measuresCongressesComputer networksMathematical modelsCongressesComputer networksSecurity measuresComputer networksMathematical models005.8Butenko SergiyPasiliao Eduardo L.Shylo VolodymyrMiAaPQMiAaPQMiAaPQBOOK9910786668703321Examining robustness and vulnerability of networked systems3743858UNINA