GAP SECURITY IN THE INFRASTRUCTURE PROTECTION: VULNERABILITIES OF NETWORK INDUSTRIES
DOI:
https://doi.org/10.71934/Keywords:
Axiomatic design, convolution, critical infrastructure, multi-atribute utility theory, networkoriented systems, network graph theory, object-oriented systems, redundancy, risk triplet, vulnerabilityAbstract
This paper addresses the gap security in the infrastructure protection relating to the
vulnerabilities of network industries, as well as axioms for a deep understanding of
infrastructure systems. There are major differences between object-oriented systems and
network-oriented systems. The network-oriented infrastructures systems need better-supported
techniques for the comparison of project alternatives, e.g. a new conceptual approach and
extended analytical tools. This paper suggests a new approach, using traditional network graph
theory that couples with MAUT (Multi-Atribute Utility Theory) and MCDA (Multi-Criteria
Decision Analysis).
Downloads
Published
Issue
Section
License
Copyright (c) 2025 The Science For Population Protection

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Published under license