scholarly journals Binary-Addition Tree Algorithm-Based Resilience Assessment for Binary-State Network Problems

Electronics ◽  
2020 ◽  
Vol 9 (8) ◽  
pp. 1207 ◽  
Author(s):  
Yi-Zhu Su ◽  
Wei-Chang Yeh

Applications in real life are composed of different kinds of network systems; these networks may be interfered by uncontrollable or unpredictable disruptive events involving natural disasters, human errors, evil-intentioned attacks, or other disturbances. Any of these disruptive events will cause networks to malfunction and possibly result in large economic losses. As a result, it is important to assess network resilience which is a measure to describe how a network system recovers its performance and functionality to a satisfactory level from a disruptive event. Inspired by the measures of reliability evaluation used in binary-state networks, this paper proposes a binary-addition tree algorithm-based resilience assessment for binary-state networks and applies it on a wildfire network with wireless sensors. Considering the stochastic nature of disruptive events, the proposed binary-addition tree algorithm-based resilience assessment comprehensively enumerates all the possible disruptive events and all the corresponding recovery strategies, and then calculate the network resilience. Furthermore, recovery cost limit is concerned in this paper for decision makers who choose the recovery strategies with their recovery cost limit and resilience requirement.

Author(s):  
Merve Şener

Critical infrastructures ensure that activities that are vital and important for individuals can be safely delivered to the society uninterruptedly. The damage on these critical infrastructures caused by cyber-attacks whose control is carried out through computers and network systems is very large. Cyber-attacks directly or indirectly affect companies, institutions, and organizations economically and cause great financial losses. In this chapter, two different categories, energy and finance sector, which are described as critical infrastructure, are discussed; cyber-attacks carried out on these sectors, cyber-attack weapons, and economic losses caused by these attacks are examined.


Author(s):  
Jiaxin Wu ◽  
Pingfeng Wang

Abstract Mitigating the effect of potential disruptive events at the operating phase of an engineered system therefore improving the system’s failure resilience is an importance yet challenging task in system operation. For complex networked system, different stakeholders complicate the analysis process by introducing different characteristics, such as different types of material flow, storage, response time, and flexibility. With different types of systems, the resilience can be improved by enhancing the failure restoration capability of the systems with appropriate performance recovery strategies. These methods include but not limit to, rerouting paths, optimal repair sequence and distributed resource centers. Considering different characteristics of disruptive events, effective recovery strategies for the failure restoration must be selected correspondingly. However, the challenge is to develop a generally applicable framework to optimally coordinate different recovery strategies and thus lead to desirable failure restoration performances. This paper presents a post-disruption recovery decision-making framework for networked systems, to help decision-makers optimize recovery strategies, in which the overall recovery task is formulated as an optimization problem to achieve maximum resilience. A case study of an electricity distribution system is used to demonstrate the feasibility of the developed framework and the comparison of several recovery strategies for disruption management.


2021 ◽  
Vol 3 (1) ◽  
pp. 1-6
Author(s):  
Wycliffe Lamech Ogogo

The business world has been significantly affected by network intrusion leading to infringement of privacy and unprecedented economic losses. Therefore, real-time monitoring of network devices is important due to the enhanced and complex network systems in organizations and associated cyber threats. Real-time monitoring provides adequate alerts and updates regarding specific networks and their performance as soon as they occur. Constant monitoring of devices also makes it possible for organizations to detect any possible challenges that the networks may be encountering. This paper examines the effectiveness of real-time monitoring of network devices in a bid to enhance network security. The study was an empirical review of recently published research papers, journals, internet sites, and books with relevant content. The findings of this study revealed that Real-time device monitoring has many potential advantages to organizations by securing their systems thereby enhancing their overall performance.


Sign in / Sign up

Export Citation Format

Share Document