Critical infrastructure systems(CISs)play a key role in the socio-economic activity of a society,but are exposed to an array of disruptive events that can greatly impact their function and performance.Therefore,unders...Critical infrastructure systems(CISs)play a key role in the socio-economic activity of a society,but are exposed to an array of disruptive events that can greatly impact their function and performance.Therefore,understanding the underlying behaviors of CISs and their response to perturbations is needed to better prepare for,and mitigate the impact of,future disruptions.Resilience is one characteristic of CISs that influences the extent and severity of the impact induced by extreme events.Resilience is often dissected into four dimensions:robustness,redundancy,resourcefulness,and rapidity,known as the“4Rs”.This study proposes a framework to assess the resilience of an infrastructure network in terms of these four dimensions under optimal resource allocation strategies and incorporates interdependencies between different CISs,with resilience considered as a stochastic variable.The proposed framework combines an agent-based infrastructure interdependency model,advanced optimization algorithms,Bayesian network techniques,and Monte Carlo simulation to assess the resilience of an infrastructure network.The applicability and flexibility of the proposed framework is demonstrated with a case study using a network of CISs in Austin,Texas,where the resilience of the network is assessed and a“what-if”analysis is performed.展开更多
Lifelines are critical infrastructure systems characterized by a high level of interdependency that can lead to cascading failures after any disaster.Many approaches can be used to analyze infrastructural interdepende...Lifelines are critical infrastructure systems characterized by a high level of interdependency that can lead to cascading failures after any disaster.Many approaches can be used to analyze infrastructural interdependencies,but they are usually not able to describe the sequence of events during emergencies.Therefore,interdependencies need to be modeled also taking into account the time effects.The methodology proposed in this paper is based on a modified version of the Input-output Inoperability Model and returns the probabilities of failure for each node of the system.Lifelines are modeled using graph theory,while perturbations,representing a natural or man-made disaster,are applied to the elements of the network following predetermined rules.The cascading effects among interdependent networks have been simulated using a spatial multilayer approach,while the use of an adjacency tensor allows to consider the temporal dimension and its effects.The method has been tested on a case study based on the 2011 Fukushima Dai-ichi nuclear disaster.Different configurations of the system have been analyzed and their probability of occurrence evaluated.Two models of the nuclear power plant have been developed to evaluate how different spatial scales and levels of detail affect the results.展开更多
The paper aims to study the invulnerability of directed interdependent networks with multiple dependency relations: dependent and supportive. We establish three models and simulate in three network systems to deal wit...The paper aims to study the invulnerability of directed interdependent networks with multiple dependency relations: dependent and supportive. We establish three models and simulate in three network systems to deal with this question. To improve network invulnerability, we’d better avoid dependent relations transmission and add supportive relations symmetrically.展开更多
We propose a model of edge-coupled interdependent networks with directed dependency links(EINDDLs)and develop the theoretical analysis framework of this model based on the self-consistent probabilities method.The phas...We propose a model of edge-coupled interdependent networks with directed dependency links(EINDDLs)and develop the theoretical analysis framework of this model based on the self-consistent probabilities method.The phase transition behaviors and parameter thresholds of this model under random attacks are analyzed theoretically on both random regular(RR)networks and Erd¨os-Renyi(ER)networks,and computer simulations are performed to verify the results.In this EINDDL model,a fractionβof connectivity links within network B depends on network A and a fraction(1-β)of connectivity links within network A depends on network B.It is found that randomly removing a fraction(1-p)of connectivity links in network A at the initial state,network A exhibits different types of phase transitions(first order,second order and hybrid).Network B is rarely affected by cascading failure whenβis small,and network B will gradually converge from the first-order to the second-order phase transition asβincreases.We present the critical values ofβfor the phase change process of networks A and B,and give the critical values of p andβfor network B at the critical point of collapse.Furthermore,a cascading prevention strategy is proposed.The findings are of great significance for understanding the robustness of EINDDLs.展开更多
The theory of network science has attracted great interest of many researchers in the realm of biomathematics and public health,and numerous valuable epidemic models have been developed.In previous studies,it is commo...The theory of network science has attracted great interest of many researchers in the realm of biomathematics and public health,and numerous valuable epidemic models have been developed.In previous studies,it is common to set up a one-to-one correspondence between the nodes of a multi-layer network,ignoring the more complex situations in reality.In the present work,we explore this situation by setting up a partially coupled model of a two-layer network and investigating the impact of asymptomatic infected individuals on epidemics.We propose a self-discovery mechanism for asymptomatic infected individuals,taking into account situations such as nucleic acid testing in the community and individuals performing self-antigen testing during the epidemic.Considering these factors together,through the microscopic Markov chain approach(MMCA)and extensive Monte Carlo(MC)numerical simulations,we find that the greater the coupling between the networks,the more information dissemination is facilitated.In order to control the epidemics,more asymptomatic infected individuals should be made aware of their infection.Massive adoption of nucleic acid testing and individual adoption of antigenic self-testing can help to contain epidemic outbreaks.Meanwhile,the epidemic threshold of the proposed model is derived,and then miscellaneous factors affecting the epidemic threshold are also discussed.Current results are conducive to devising the prevention and control policies of pandemics.展开更多
The performance model proposed by this study represents an innovative approach to deal with performance assessment in ATM (air traffic management). It is based on Bayesian networks methodology, which presents severa...The performance model proposed by this study represents an innovative approach to deal with performance assessment in ATM (air traffic management). It is based on Bayesian networks methodology, which presents several advantages but also some drawbacks as highlighted along the paper. We illustrate the main steps required for building the model and present a number of interesting results. The contribution of the paper is two-fold: (1) It presents a new methodological approach to deal with a problem which is of strategic importance for ANSPs (air navigation service providers); (2) It provides insights on the interdependencies between factors influencing performance. Both results are considered particularly important nowadays, due to the SES (Single European Sky) performance scheme and its related target setting process.展开更多
The disintegration of networks is a widely researched topic with significant applications in fields such as counterterrorism and infectious disease control. While the traditional approaches for achieving network disin...The disintegration of networks is a widely researched topic with significant applications in fields such as counterterrorism and infectious disease control. While the traditional approaches for achieving network disintegration involve identifying critical sets of nodes or edges, limited research has been carried out on edge-based disintegration strategies. We propose a novel algorithm, i.e., a rank aggregation elite enumeration algorithm based on edge-coupled networks(RAEEC),which aims to implement tiling for edge-coupled networks by finding important sets of edges in the network while balancing effectiveness and efficiency. Our algorithm is based on a two-layer edge-coupled network model with one-to-one links, and utilizes three advanced edge importance metrics to rank the edges separately. A comprehensive ranking of edges is obtained using a rank aggregation approach proposed in this study. The top few edges from the ranking set obtained by RAEEC are then used to generate an enumeration set, which is continuously iteratively updated to identify the set of elite attack edges.We conduct extensive experiments on synthetic networks to evaluate the performance of our proposed method, and the results indicate that RAEEC achieves a satisfactory balance between efficiency and effectiveness. Our approach represents a significant contribution to the field of network disintegration, particularly for edge-based strategies.展开更多
With society's increasing dependence on critical infrastructure such as power grids and communications systems, the robustness of these systems has attracted significant attention.Failure of some nodes can trigger a ...With society's increasing dependence on critical infrastructure such as power grids and communications systems, the robustness of these systems has attracted significant attention.Failure of some nodes can trigger a cascading failure, which completely fragments the network, necessitating recovery efforts to improve robustness of complex systems. Inspired by real-world scenarios, this paper proposes repair models after two kinds of network failures, namely complete and incomplete collapse. In both models, three kinds of repair strategies are possible, including random selection(RS), node selection based on single network node degree(SD), and node selection based on double network node degree(DD). We find that the node correlation in each of the two coupled networks affects repair efficiency. Numerical simulation and analysis results suggest that the repair node ratio and repair strategies may have a significant impact on the economics of the repair process. The results of this study thus provide insight into ways to improve the robustness of coupled networks after cascading failures.展开更多
The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,exi...The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,existing defense or detection approaches often require additional circuitry to perform security verification,and are thus constrained by time and resource limitations.Considering the scale of actual engineering tasks and tight project schedules,it is usually difficult to implement designs for all modules in field programmable gate array(FPGA)circuits.Some studies have pointed out that the failure of key modules tends to cause greater damage to the network.Therefore,under limited conditions,priority protection designs need to be made on key modules to improve protection efficiency.We have conducted research on FPGA designs including single FPGA systems and multi-FPGA systems,to identify key modules in FPGA systems.For the single FPGA designs,considering the topological structure,network characteristics,and directionality of FPGA designs,we propose a node importance evaluationmethod based on the technique for order preference by similarity to an ideal solution(TOPSIS)method.Then,for the multi-FPGA designs,considering the influence of nodes in intra-layer and inter-layers,they are constructed into the interdependent network,and we propose a method based on connection strength to identify the important modules.Finally,we conduct empirical research using actual FPGA designs as examples.The results indicate that compared to other traditional indexes,node importance indexes proposed for different designs can better characterize the importance of nodes.展开更多
Aiming at the problem that it is difficult to build model and identify the vulnerable equipment for aviation armament System-of-Systems(SoS)due to complex equipment interaction relationships and high confrontation,the...Aiming at the problem that it is difficult to build model and identify the vulnerable equipment for aviation armament System-of-Systems(SoS)due to complex equipment interaction relationships and high confrontation,the interdependent network theory is introduced to solve it.Firstly,a two-layer heterogeneous interdependent network model for aviation armament SoS is proposed,which reflects the information interaction,functional dependency and inter-network dependence effectively.Secondly,using the attack cost to describe the confrontation process and taking the comprehensive impact on kill chains as the entry point,the node importance index and the attack cost measurement method are constructed.Thirdly,the identification of vulnerable nodes is transformed into the optimization problem of node combinatorial selection,and the vulnerable node identification method based on tabu search is proposed.Based on vulnerable nodes,a robustness enhancement strategy for aviation armament SoS network is presented.Finally,the above methods are used to an aerial confrontation SoS,and the results verify the rationality and effectiveness of the proposed methods.展开更多
Critical infrastructures are becoming increasingly interdependent and vulnerable to cascading failures. Existing studies have analyzed the vulnerability of interdependent networks to cascading failures from the static...Critical infrastructures are becoming increasingly interdependent and vulnerable to cascading failures. Existing studies have analyzed the vulnerability of interdependent networks to cascading failures from the static perspective of network topology structure. This paper develops a more realistic cascading failures model that considers the dynamic redistribution of load in power network to explore the vulnerability of interdependent power-water networks. In this model, the critical tolerance threshold is originally proposed to indicate the vulnerability of network to cascading failures. In addition, some key parameters that are important to network vulnerability are identified and quantified through numerical simulation. Results show that cascading failures can be prevented when the values of tolerance parameter are above a critical tolerance threshold. Otherwise interdependent networks collapse after attacking a critical fraction of power nodes. Interdependent networks become more vulnerable with the increase in interdependence strength, which implies the importance of protecting those interconnected nodes to reduce the consequences of cascading failures. Interdependent networks are most vulnerable under high-load attack, which shows the significance of protecting high-load nodes.展开更多
本文建立了节点和连边耦合的二元相互依赖网络模型(binary interdependent networks with node and edge coupling,BINNEC).该模型中,网络A节点随机依赖网络B多条边从而形成边依赖群,当边依赖群的失效比例超过网络失效容忍度μ时,导致网...本文建立了节点和连边耦合的二元相互依赖网络模型(binary interdependent networks with node and edge coupling,BINNEC).该模型中,网络A节点随机依赖网络B多条边从而形成边依赖群,当边依赖群的失效比例超过网络失效容忍度μ时,导致网络A的节点失效.基于自平衡概率法建立起理论分析框架,通过对3种经典网络结构下的BINNEC网络进行计算机仿真验证,并分析了该模型面对随机攻击下的相变行为和关键阈值.研究结果表明3种网络结构下的BINNEC网络和一元耦合网络一样脆弱,网络的相变行为都是一阶相变.当网络节点的边依赖群规模m越大,网络鲁棒性增强;在网络的边依赖群规模一定时,节点的失效容忍度μ越大网络鲁棒性越强.本文进一步研究在m和μ相同条件下,网络的度分布对BINNEC的影响.研究可以为此类二元耦合网络鲁棒性提供一定的理论依据,同时也为现实网络的安全设计提供指导意义.展开更多
文摘Critical infrastructure systems(CISs)play a key role in the socio-economic activity of a society,but are exposed to an array of disruptive events that can greatly impact their function and performance.Therefore,understanding the underlying behaviors of CISs and their response to perturbations is needed to better prepare for,and mitigate the impact of,future disruptions.Resilience is one characteristic of CISs that influences the extent and severity of the impact induced by extreme events.Resilience is often dissected into four dimensions:robustness,redundancy,resourcefulness,and rapidity,known as the“4Rs”.This study proposes a framework to assess the resilience of an infrastructure network in terms of these four dimensions under optimal resource allocation strategies and incorporates interdependencies between different CISs,with resilience considered as a stochastic variable.The proposed framework combines an agent-based infrastructure interdependency model,advanced optimization algorithms,Bayesian network techniques,and Monte Carlo simulation to assess the resilience of an infrastructure network.The applicability and flexibility of the proposed framework is demonstrated with a case study using a network of CISs in Austin,Texas,where the resilience of the network is assessed and a“what-if”analysis is performed.
基金the European Research Council under the Grant agreement no.ERC_IDEAL RESCUE_637842 of the project IDEAL RESCUE_Integrated Design and Control of Sustainable Communities during Emergencies.
文摘Lifelines are critical infrastructure systems characterized by a high level of interdependency that can lead to cascading failures after any disaster.Many approaches can be used to analyze infrastructural interdependencies,but they are usually not able to describe the sequence of events during emergencies.Therefore,interdependencies need to be modeled also taking into account the time effects.The methodology proposed in this paper is based on a modified version of the Input-output Inoperability Model and returns the probabilities of failure for each node of the system.Lifelines are modeled using graph theory,while perturbations,representing a natural or man-made disaster,are applied to the elements of the network following predetermined rules.The cascading effects among interdependent networks have been simulated using a spatial multilayer approach,while the use of an adjacency tensor allows to consider the temporal dimension and its effects.The method has been tested on a case study based on the 2011 Fukushima Dai-ichi nuclear disaster.Different configurations of the system have been analyzed and their probability of occurrence evaluated.Two models of the nuclear power plant have been developed to evaluate how different spatial scales and levels of detail affect the results.
文摘The paper aims to study the invulnerability of directed interdependent networks with multiple dependency relations: dependent and supportive. We establish three models and simulate in three network systems to deal with this question. To improve network invulnerability, we’d better avoid dependent relations transmission and add supportive relations symmetrically.
基金the National Natural Science Foundation of China(Grant Nos.61973118,51741902,11761033,12075088,and 11835003)Project in JiangXi Province Department of Science and Technology(Grant Nos.20212BBE51010 and 20182BCB22009)the Natural Science Foundation of Zhejiang Province(Grant No.Y22F035316)。
文摘We propose a model of edge-coupled interdependent networks with directed dependency links(EINDDLs)and develop the theoretical analysis framework of this model based on the self-consistent probabilities method.The phase transition behaviors and parameter thresholds of this model under random attacks are analyzed theoretically on both random regular(RR)networks and Erd¨os-Renyi(ER)networks,and computer simulations are performed to verify the results.In this EINDDL model,a fractionβof connectivity links within network B depends on network A and a fraction(1-β)of connectivity links within network A depends on network B.It is found that randomly removing a fraction(1-p)of connectivity links in network A at the initial state,network A exhibits different types of phase transitions(first order,second order and hybrid).Network B is rarely affected by cascading failure whenβis small,and network B will gradually converge from the first-order to the second-order phase transition asβincreases.We present the critical values ofβfor the phase change process of networks A and B,and give the critical values of p andβfor network B at the critical point of collapse.Furthermore,a cascading prevention strategy is proposed.The findings are of great significance for understanding the robustness of EINDDLs.
基金supported by the National Natural Science Foundation of China(Grant No.62173247).
文摘The theory of network science has attracted great interest of many researchers in the realm of biomathematics and public health,and numerous valuable epidemic models have been developed.In previous studies,it is common to set up a one-to-one correspondence between the nodes of a multi-layer network,ignoring the more complex situations in reality.In the present work,we explore this situation by setting up a partially coupled model of a two-layer network and investigating the impact of asymptomatic infected individuals on epidemics.We propose a self-discovery mechanism for asymptomatic infected individuals,taking into account situations such as nucleic acid testing in the community and individuals performing self-antigen testing during the epidemic.Considering these factors together,through the microscopic Markov chain approach(MMCA)and extensive Monte Carlo(MC)numerical simulations,we find that the greater the coupling between the networks,the more information dissemination is facilitated.In order to control the epidemics,more asymptomatic infected individuals should be made aware of their infection.Massive adoption of nucleic acid testing and individual adoption of antigenic self-testing can help to contain epidemic outbreaks.Meanwhile,the epidemic threshold of the proposed model is derived,and then miscellaneous factors affecting the epidemic threshold are also discussed.Current results are conducive to devising the prevention and control policies of pandemics.
文摘The performance model proposed by this study represents an innovative approach to deal with performance assessment in ATM (air traffic management). It is based on Bayesian networks methodology, which presents several advantages but also some drawbacks as highlighted along the paper. We illustrate the main steps required for building the model and present a number of interesting results. The contribution of the paper is two-fold: (1) It presents a new methodological approach to deal with a problem which is of strategic importance for ANSPs (air navigation service providers); (2) It provides insights on the interdependencies between factors influencing performance. Both results are considered particularly important nowadays, due to the SES (Single European Sky) performance scheme and its related target setting process.
基金supported by the National Natural Science Foundation of China (Grant Nos. 61877046, 12271419, and 62106186)the Natural Science Basic Research Program of Shaanxi (Program No. 2022JQ-620)the Fundamental Research Funds for the Central Universities (Grant Nos. XJS220709, JB210701, and QTZX23002)。
文摘The disintegration of networks is a widely researched topic with significant applications in fields such as counterterrorism and infectious disease control. While the traditional approaches for achieving network disintegration involve identifying critical sets of nodes or edges, limited research has been carried out on edge-based disintegration strategies. We propose a novel algorithm, i.e., a rank aggregation elite enumeration algorithm based on edge-coupled networks(RAEEC),which aims to implement tiling for edge-coupled networks by finding important sets of edges in the network while balancing effectiveness and efficiency. Our algorithm is based on a two-layer edge-coupled network model with one-to-one links, and utilizes three advanced edge importance metrics to rank the edges separately. A comprehensive ranking of edges is obtained using a rank aggregation approach proposed in this study. The top few edges from the ranking set obtained by RAEEC are then used to generate an enumeration set, which is continuously iteratively updated to identify the set of elite attack edges.We conduct extensive experiments on synthetic networks to evaluate the performance of our proposed method, and the results indicate that RAEEC achieves a satisfactory balance between efficiency and effectiveness. Our approach represents a significant contribution to the field of network disintegration, particularly for edge-based strategies.
基金supported by the National Natural Science Foundation of China(60972145)the National Aerospace Science Foundation of China(20140751008)
文摘With society's increasing dependence on critical infrastructure such as power grids and communications systems, the robustness of these systems has attracted significant attention.Failure of some nodes can trigger a cascading failure, which completely fragments the network, necessitating recovery efforts to improve robustness of complex systems. Inspired by real-world scenarios, this paper proposes repair models after two kinds of network failures, namely complete and incomplete collapse. In both models, three kinds of repair strategies are possible, including random selection(RS), node selection based on single network node degree(SD), and node selection based on double network node degree(DD). We find that the node correlation in each of the two coupled networks affects repair efficiency. Numerical simulation and analysis results suggest that the repair node ratio and repair strategies may have a significant impact on the economics of the repair process. The results of this study thus provide insight into ways to improve the robustness of coupled networks after cascading failures.
基金supported by the Natural Science Foundation of China under Grant Nos.62362008,61973163,61972345,U1911401.
文摘The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,existing defense or detection approaches often require additional circuitry to perform security verification,and are thus constrained by time and resource limitations.Considering the scale of actual engineering tasks and tight project schedules,it is usually difficult to implement designs for all modules in field programmable gate array(FPGA)circuits.Some studies have pointed out that the failure of key modules tends to cause greater damage to the network.Therefore,under limited conditions,priority protection designs need to be made on key modules to improve protection efficiency.We have conducted research on FPGA designs including single FPGA systems and multi-FPGA systems,to identify key modules in FPGA systems.For the single FPGA designs,considering the topological structure,network characteristics,and directionality of FPGA designs,we propose a node importance evaluationmethod based on the technique for order preference by similarity to an ideal solution(TOPSIS)method.Then,for the multi-FPGA designs,considering the influence of nodes in intra-layer and inter-layers,they are constructed into the interdependent network,and we propose a method based on connection strength to identify the important modules.Finally,we conduct empirical research using actual FPGA designs as examples.The results indicate that compared to other traditional indexes,node importance indexes proposed for different designs can better characterize the importance of nodes.
基金supported by the Fundamental Research Funds for the Central Universities,China.
文摘Aiming at the problem that it is difficult to build model and identify the vulnerable equipment for aviation armament System-of-Systems(SoS)due to complex equipment interaction relationships and high confrontation,the interdependent network theory is introduced to solve it.Firstly,a two-layer heterogeneous interdependent network model for aviation armament SoS is proposed,which reflects the information interaction,functional dependency and inter-network dependence effectively.Secondly,using the attack cost to describe the confrontation process and taking the comprehensive impact on kill chains as the entry point,the node importance index and the attack cost measurement method are constructed.Thirdly,the identification of vulnerable nodes is transformed into the optimization problem of node combinatorial selection,and the vulnerable node identification method based on tabu search is proposed.Based on vulnerable nodes,a robustness enhancement strategy for aviation armament SoS network is presented.Finally,the above methods are used to an aerial confrontation SoS,and the results verify the rationality and effectiveness of the proposed methods.
基金Acknowledgments This work is supported by National Natural Science Foundation of China (No. 71501158 71471146) and "the Fundamental Research Funds for the Central Universities". The authors would like to thank the referees for their efforts to improve the quality of this paper.
文摘Critical infrastructures are becoming increasingly interdependent and vulnerable to cascading failures. Existing studies have analyzed the vulnerability of interdependent networks to cascading failures from the static perspective of network topology structure. This paper develops a more realistic cascading failures model that considers the dynamic redistribution of load in power network to explore the vulnerability of interdependent power-water networks. In this model, the critical tolerance threshold is originally proposed to indicate the vulnerability of network to cascading failures. In addition, some key parameters that are important to network vulnerability are identified and quantified through numerical simulation. Results show that cascading failures can be prevented when the values of tolerance parameter are above a critical tolerance threshold. Otherwise interdependent networks collapse after attacking a critical fraction of power nodes. Interdependent networks become more vulnerable with the increase in interdependence strength, which implies the importance of protecting those interconnected nodes to reduce the consequences of cascading failures. Interdependent networks are most vulnerable under high-load attack, which shows the significance of protecting high-load nodes.
文摘本文建立了节点和连边耦合的二元相互依赖网络模型(binary interdependent networks with node and edge coupling,BINNEC).该模型中,网络A节点随机依赖网络B多条边从而形成边依赖群,当边依赖群的失效比例超过网络失效容忍度μ时,导致网络A的节点失效.基于自平衡概率法建立起理论分析框架,通过对3种经典网络结构下的BINNEC网络进行计算机仿真验证,并分析了该模型面对随机攻击下的相变行为和关键阈值.研究结果表明3种网络结构下的BINNEC网络和一元耦合网络一样脆弱,网络的相变行为都是一阶相变.当网络节点的边依赖群规模m越大,网络鲁棒性增强;在网络的边依赖群规模一定时,节点的失效容忍度μ越大网络鲁棒性越强.本文进一步研究在m和μ相同条件下,网络的度分布对BINNEC的影响.研究可以为此类二元耦合网络鲁棒性提供一定的理论依据,同时也为现实网络的安全设计提供指导意义.