Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/88980
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Building and Real Estate-
dc.creatorYao, X-
dc.creatorWei, HH-
dc.creatorShohet, IM-
dc.creatorSkibniewski, MJ-
dc.date.accessioned2021-01-15T07:14:34Z-
dc.date.available2021-01-15T07:14:34Z-
dc.identifier.issn2076-3417-
dc.identifier.urihttp://hdl.handle.net/10397/88980-
dc.language.isoenen_US
dc.publisherMolecular Diversity Preservation International (MDPI)en_US
dc.rights© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).en_US
dc.rightsThe following publication Yao X, Wei H-H, Shohet IM, Skibniewski MJ. Assessment of Terrorism Risk to Critical Infrastructures : the Case of a Power-Supply Substation. Applied Sciences. 2020; 10(20):7162, is available at https://doi.org/10.3390/app10207162en_US
dc.subjectCritical infrastructureen_US
dc.subjectRisk assessmenten_US
dc.subjectTerrorismen_US
dc.titleAssessment of terrorism risk to critical infrastructures : the case of a power-supply substationen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage1-
dc.identifier.epage17-
dc.identifier.volume10-
dc.identifier.issue20-
dc.identifier.doi10.3390/app10207162-
dcterms.abstractThis paper presents a novel approach for estimating the vulnerability level of critical infrastructure confronting potential terrorist threats and assessing the usefulness of various protection strategies for critical infrastructure (CI). A methodology, utilizing a combination of topological network analysis and game theory, is presented to evaluate the effectiveness of protection strategies for certain components in the infrastructure under various attack scenarios. This paper focuses on protective strategies that are based on different attack scenarios as well as on the connectivity of the critical infrastructure components. The methodology proposed allows optimization of protection strategies in terms of investment in critical infrastructure protection in order to reduce expenditures on local infrastructure protection or on a single critical infrastructure for small projects. A case study of a power-supply substation is included to validate the analytical framework. The results indicate that the framework is highly applicable to other types of critical infrastructures facing similar threats. The results suggest that when only terrorist attacks are considered, improving the robustness of CI has a much higher effectiveness and efficiency than improving CI redundancy. The research methodology in this paper can be applied to a wide range of critical infrastructures and systems that may be at risk from manmade extreme events.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationApplied sciences, 2020, v. 10, no. 20, 7162, p. 1-17-
dcterms.isPartOfApplied sciences-
dcterms.issued2020-
dc.identifier.scopus2-s2.0-85092743924-
dc.identifier.artn7162-
dc.description.validate202101 bcrc-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_Scopus/WOSen_US
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryCCen_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Yao_Assessment_terrorism_risk.pdf1.08 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

52
Last Week
0
Last month
Citations as of Sep 22, 2024

Downloads

23
Citations as of Sep 22, 2024

SCOPUSTM   
Citations

7
Citations as of Sep 26, 2024

WEB OF SCIENCETM
Citations

4
Citations as of Jun 20, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.