LEADER 04328nam 2200625 450 001 9910786668703321 005 20230803203444.0 010 $a1-61499-391-2 035 $a(CKB)3710000000149598 035 $a(EBL)1720838 035 $a(SSID)ssj0001376534 035 $a(PQKBManifestationID)11875068 035 $a(PQKBTitleCode)TC0001376534 035 $a(PQKBWorkID)11368988 035 $a(PQKB)10634957 035 $a(MiAaPQ)EBC1720838 035 $a(Au-PeEL)EBL1720838 035 $a(CaPaEBR)ebr10898081 035 $a(CaONFJC)MIL621557 035 $a(OCoLC)882610505 035 $a(EXLCZ)993710000000149598 100 $a20140808h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aExamining robustness and vulnerability of networked systems /$fedited by Sergiy Butenko, Eduardo L. Pasiliao and Volodymyr Shylo 210 1$aAmsterdam, Netherlands ;$aFairfax, Virginia :$cIOS Press,$d2014. 210 4$dİ2014 215 $a1 online resource (320 p.) 225 1 $aNATO Science for Peace and Security Series - D: Information and Communication Security,$x1879-8292 ;$vVolume 37 300 $a"The NATO Advanced Research Workshop on "Examining RoKi bustness and Vulnerability of Critical Infrastructure Networks" was held in Kyiv, e v, Ukraine on June 3-5, 2013." 311 $a1-61499-390-4 320 $aIncludes bibliographical references at the end of each chapters and indexes. 327 $a""EXAMINING ROBUSTNESS AND VULNERABILITY OF NETWORKED SYSTEMS""; ""Preface""; ""Contents""; ""A Survey of Interdependency Models for Critical Infrastructure Networks""; ""Using GRASP for the Cover by s-Defective Independent Sets Problem""; ""Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance""; ""Variable Neighborhood Search for Edge-Ratio Network Clustering""; ""On Data Clustering: Exact and Approximate Solutions""; ""A Hybrid Metaheuristic for the Maximum k-Plex Problem"" 327 $a""Monotonic and Non-Monotonic Infections on Networks""""Navigation Function Based Decentralized Control of A Multi-Agent System with Network Connectivity Constraints""; ""Evaluation of the Reliability of Repairable sa???t Networks by Fast Simulation Method""; ""Analysis and Design of Robust Network Clusters with Bounded Diameter""; ""Multiobjective Particle Swarm Optimization for a Multicast Routing Problem""; ""Robust Networked Control Systems with Communication Constraints""; ""Hop-Constrained Tree-Shaped Networks"" 327 $a""Bilinear Markovian Processes of Search for Stationary and Moving Objects""""On Risk-Averse Weighted k-Club Problems""; ""Distributed Computer Attack Detection System for Corporate Networks""; ""Optimal Balanced Packing Using Phi-Function Technique""; ""Security in Wireless Networks: A Tutorial""; ""Approximation Algorithms for Detecting Critical Nodes""; ""Subject Index""; ""Author Index"" 330 $aModern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algor 410 0$aNATO science for peace and security series.$nSub-series D,$pInformation and communication security. 606 $aComputer networks$xSecurity measures$vCongresses 606 $aComputer networks$xMathematical models$vCongresses 615 0$aComputer networks$xSecurity measures 615 0$aComputer networks$xMathematical models 676 $a005.8 702 $aButenko$b Sergiy 702 $aPasiliao$b Eduardo L. 702 $aShylo$b Volodymyr 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910786668703321 996 $aExamining robustness and vulnerability of networked systems$93743858 997 $aUNINA