Skip to main content
Top

2018 | OriginalPaper | Chapter

9. Disruption, Protection, and Resilience

Authors : Richard L. Church, Alan Murray

Published in: Location Covering Models

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A number of location covering models have been developed to address problems of security and safety. Bell et al. (2011) applies the LSCP to identify aircraft alert sites to respond to security threats to the U.S. border and other key assets. Bao et al. (2015) dealt with the problem of locating watchtower locations for forest fire detection and monitoring. Zhang and Du (2012) describe an approach to locate a set of radars, and assign power levels to each of them so that all crucial points along a river are monitored, or covered, while minimizing the total power being used. Other interesting examples can be found in Agnetis et al. (2009), Bar-Noy et al. (2013), and Pan (2010). Addressed is the location of a set of facilities that can guard, protect or respond in an emergency, developed under the assumption that system components are always available and ready to act. In addition, it is almost always assumed that the network infrastructure will always be usable and that services such as emergency response can be made using the best routes on an unimpeded network. That is, the system always works and there are no disruptions to service.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Richard Church wishes to thank Prof. Heinimann of ETH for the gracious invitation to attend a day of meetings at the Risk Center of ETH in which a number of applications of the N − 1 analysis were presented.
 
Literature
go back to reference Agnetis A, Grande E, Mirchandani PB, Pacifici A (2009) Covering a line segment with variable radius discs. Comput Oper Res 36:1423–1436CrossRef Agnetis A, Grande E, Mirchandani PB, Pacifici A (2009) Covering a line segment with variable radius discs. Comput Oper Res 36:1423–1436CrossRef
go back to reference Alderson DL, Brown GG, Carlyle WM, Wood RK (2011) Solving defender-attacker-defender models for infrastructure defense. Department of Operations Research, Naval Postgraduate School, Monterey, CA Alderson DL, Brown GG, Carlyle WM, Wood RK (2011) Solving defender-attacker-defender models for infrastructure defense. Department of Operations Research, Naval Postgraduate School, Monterey, CA
go back to reference Bao S, Xiao N, Lai Z, Zhang H, Kim C (2015) Optimizing watchtower locations for forest fire monitoring using location models. Fire Saf J 71:100–109 Bao S, Xiao N, Lai Z, Zhang H, Kim C (2015) Optimizing watchtower locations for forest fire monitoring using location models. Fire Saf J 71:100–109
go back to reference Bar-Noy A, Rawitz D, Terlecky P (2013) Maximizing barrier coverage lifetime with mobile sensors. In: European symposium on algorithms. Springer, Berlin, pp 97–108 Bar-Noy A, Rawitz D, Terlecky P (2013) Maximizing barrier coverage lifetime with mobile sensors. In: European symposium on algorithms. Springer, Berlin, pp 97–108
go back to reference Başdere M, Aras N, Altınel İK, Afşar S (2013) A leader-follower game for the point coverage problem in wireless sensor networks. Eur J Ind Eng 7(5):635–656CrossRef Başdere M, Aras N, Altınel İK, Afşar S (2013) A leader-follower game for the point coverage problem in wireless sensor networks. Eur J Ind Eng 7(5):635–656CrossRef
go back to reference Bell JE, Griffis SE, Cunningham WA, Eberlan JA (2011) Location optimization of strategic alert sites for homeland defense. Omega 39(2):151–158CrossRef Bell JE, Griffis SE, Cunningham WA, Eberlan JA (2011) Location optimization of strategic alert sites for homeland defense. Omega 39(2):151–158CrossRef
go back to reference Berman O, Drezner T, Drezner Z, Wesolowsky GO (2009) A defensive maximal covering problem on a network. Int Trans Oper Res 16(1):69–86CrossRef Berman O, Drezner T, Drezner Z, Wesolowsky GO (2009) A defensive maximal covering problem on a network. Int Trans Oper Res 16(1):69–86CrossRef
go back to reference Choi Y, Suzuki T (2013) Protection strategies for critical retail facilities: applying interdiction median and maximal covering problems with fortification. J Oper Res Soc Jpn 56(1):38–55CrossRef Choi Y, Suzuki T (2013) Protection strategies for critical retail facilities: applying interdiction median and maximal covering problems with fortification. J Oper Res Soc Jpn 56(1):38–55CrossRef
go back to reference Church RL, Scaparra MP (2007) Protecting critical assets: the r-interdiction median problem with fortification. Geogr Anal 39(2):129–146CrossRef Church RL, Scaparra MP (2007) Protecting critical assets: the r-interdiction median problem with fortification. Geogr Anal 39(2):129–146CrossRef
go back to reference Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr 94(3):491–502CrossRef Church RL, Scaparra MP, Middleton RS (2004) Identifying critical infrastructure: the median and covering facility interdiction problems. Ann Assoc Am Geogr 94(3):491–502CrossRef
go back to reference Corley HW, Sha DY (1982) Most vital links and nodes in weighted networks. Oper Res Lett 1(4):157–160CrossRef Corley HW, Sha DY (1982) Most vital links and nodes in weighted networks. Oper Res Lett 1(4):157–160CrossRef
go back to reference Dong L, Xu-Chen L, Xiang-Tao Y, Fei W (2010) A model for allocating protection resources in military logistics distribution system based on maximal covering problem. In 2010 international conference on logistics systems and intelligent management, vol 1. IEEE, Piscataway, NJ, pp. 98–101 Dong L, Xu-Chen L, Xiang-Tao Y, Fei W (2010) A model for allocating protection resources in military logistics distribution system based on maximal covering problem. In 2010 international conference on logistics systems and intelligent management, vol 1. IEEE, Piscataway, NJ, pp. 98–101
go back to reference Farahani RZ, Hassani A, Mousavi SM, Baygi MB (2014) A hybrid artificial bee colony for disruption in a hierarchical maximal covering location problem. Comput Ind Eng 75:129–141CrossRef Farahani RZ, Hassani A, Mousavi SM, Baygi MB (2014) A hybrid artificial bee colony for disruption in a hierarchical maximal covering location problem. Comput Ind Eng 75:129–141CrossRef
go back to reference Lei TL (2013) Identifying critical facilities in hub-and-spoke networks: a hub interdiction median problem. Geogr Anal 45(2):105–122CrossRef Lei TL (2013) Identifying critical facilities in hub-and-spoke networks: a hub interdiction median problem. Geogr Anal 45(2):105–122CrossRef
go back to reference Mahmoodjanloo M, Parvasi SP, Ramezanian R (2016) A tri-level covering fortification model for facility protection against disturbance in r-interdiction median problem. Comput Ind Eng 102:219–232CrossRef Mahmoodjanloo M, Parvasi SP, Ramezanian R (2016) A tri-level covering fortification model for facility protection against disturbance in r-interdiction median problem. Comput Ind Eng 102:219–232CrossRef
go back to reference Maliszewski PJ (2011) Interdiction models and homeland security risks. J Homel Secur Emerg Manag 8(1): Article 4 Maliszewski PJ (2011) Interdiction models and homeland security risks. J Homel Secur Emerg Manag 8(1): Article 4
go back to reference Murray AT, Grubesic T (eds) (2007) Critical infrastructure: reliability and vulnerability. Springer, Berlin Murray AT, Grubesic T (eds) (2007) Critical infrastructure: reliability and vulnerability. Springer, Berlin
go back to reference Murray AT, Grubesic TH (2013) Fortifying large scale, geospatial networks: implications for supervisory control. In: Laing C, Badii A, Vickers P (eds) Securing critical infrastructures and critical control systems: approaches for threat protection. Information Science Reference, Hershey, pp 224–246 Murray AT, Grubesic TH (2013) Fortifying large scale, geospatial networks: implications for supervisory control. In: Laing C, Badii A, Vickers P (eds) Securing critical infrastructures and critical control systems: approaches for threat protection. Information Science Reference, Hershey, pp 224–246
go back to reference O’Hanley JR, Church RL (2011) Designing robust coverage networks to hedge against worst-case facility losses. Eur J Oper Res 209(1):23–36CrossRef O’Hanley JR, Church RL (2011) Designing robust coverage networks to hedge against worst-case facility losses. Eur J Oper Res 209(1):23–36CrossRef
go back to reference O’Hanley JR, Church RL, Gilless JK (2007a) Locating and protecting critical reserve sites to minimize expected and worst-case losses. Biol Conserv 134(1):130–141CrossRef O’Hanley JR, Church RL, Gilless JK (2007a) Locating and protecting critical reserve sites to minimize expected and worst-case losses. Biol Conserv 134(1):130–141CrossRef
go back to reference O’Hanley JR, Church RL, Gilless JK (2007b) The importance of in situ site loss in nature reserve selection: balancing notions of complementarity and robustness. Biol Conserv 135(2):170–180CrossRef O’Hanley JR, Church RL, Gilless JK (2007b) The importance of in situ site loss in nature reserve selection: balancing notions of complementarity and robustness. Biol Conserv 135(2):170–180CrossRef
go back to reference Pan A (2010) The applications of maximal covering model in typhoon emergency shelter location problem. In 2010 I.E. international conference on industrial engineering and engineering management (IEEM). IEEE, Piscataway, NJ, pp. 1727–1731 Pan A (2010) The applications of maximal covering model in typhoon emergency shelter location problem. In 2010 I.E. international conference on industrial engineering and engineering management (IEEM). IEEE, Piscataway, NJ, pp. 1727–1731
go back to reference Parfomak PW (2014) Physical security of the U.S. power grid: high voltage transformer substations, report 7–7500 (R4304), Congressional Research Service, Washington, DC Parfomak PW (2014) Physical security of the U.S. power grid: high voltage transformer substations, report 7–7500 (R4304), Congressional Research Service, Washington, DC
go back to reference Salmeron J, Wood K, Baldick R (2004) Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 19(2):905–912CrossRef Salmeron J, Wood K, Baldick R (2004) Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 19(2):905–912CrossRef
go back to reference Scaparra MP, Church RL (2008) An exact solution approach for the interdiction median problem with fortification. Eur J Oper Res 189(1):76–92CrossRef Scaparra MP, Church RL (2008) An exact solution approach for the interdiction median problem with fortification. Eur J Oper Res 189(1):76–92CrossRef
go back to reference Scaparra MP, Church R (2012) Protecting supply systems to mitigate potential disaster: a model to fortify capacitated facilities. Int Reg Sci Rev 35(2):188–210CrossRef Scaparra MP, Church R (2012) Protecting supply systems to mitigate potential disaster: a model to fortify capacitated facilities. Int Reg Sci Rev 35(2):188–210CrossRef
go back to reference Scaparra MP, Church RL (2015) Location problems under disaster events. In: Saldanha-da-Gama F, Stefan N, Gilbert L (eds) Location science. Springer International Publishing, Cham, pp 623–642 Scaparra MP, Church RL (2015) Location problems under disaster events. In: Saldanha-da-Gama F, Stefan N, Gilbert L (eds) Location science. Springer International Publishing, Cham, pp 623–642
go back to reference Snyder LV, Scaparra MP, Daskin MS, Church RL (2006) Planning for disruptions in supply chain networks. In: Johnson P, Norman B, Secomandi N (eds) Models, methods, and applications for innovative decision making. INFORMS, Baltimore, MD, pp 234–257 Snyder LV, Scaparra MP, Daskin MS, Church RL (2006) Planning for disruptions in supply chain networks. In: Johnson P, Norman B, Secomandi N (eds) Models, methods, and applications for innovative decision making. INFORMS, Baltimore, MD, pp 234–257
go back to reference Swain R (1971) A decomposition algorithm for a class of facility location problems. PhD dissertation, Cornell University, Ithaca, NY Swain R (1971) A decomposition algorithm for a class of facility location problems. PhD dissertation, Cornell University, Ithaca, NY
go back to reference Wall Street Journal (2014) Assault on California power station raises alarm for potential for terrorism Wall Street Journal (2014) Assault on California power station raises alarm for potential for terrorism
go back to reference Zhang Z, Du DZ (2012) Radar placement along banks of river. J Glob Optim 52(4):729–741CrossRef Zhang Z, Du DZ (2012) Radar placement along banks of river. J Glob Optim 52(4):729–741CrossRef
Metadata
Title
Disruption, Protection, and Resilience
Authors
Richard L. Church
Alan Murray
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-99846-6_9