GAP SECURITY IN THE INFRASTRUCTURE PROTECTION: VULNERABILITIES OF NETWORK INDUSTRIES

Authors

  • Josef ŘÍHA Author

DOI:

https://doi.org/10.71934/

Keywords:

Axiomatic design, convolution, critical infrastructure, multi-atribute utility theory, networkoriented systems, network graph theory, object-oriented systems, redundancy, risk triplet, vulnerability

Abstract

This paper addresses the gap security in the infrastructure protection relating to the
vulnerabilities of network industries, as well as axioms for a deep understanding of
infrastructure systems. There are major differences between object-oriented systems and
network-oriented systems. The network-oriented infrastructures systems need better-supported
techniques for the comparison of project alternatives, e.g. a new conceptual approach and
extended analytical tools. This paper suggests a new approach, using traditional network graph
theory that couples with MAUT (Multi-Atribute Utility Theory) and MCDA (Multi-Criteria
Decision Analysis). 

Downloads

Download data is not yet available.

Published

2025-04-09