Modelling critical infrastructures in presence of lack of data with simulated annealing - Like algorithms

Vincenzo Fioriti, Silvia Ruzzante, Elisa Castorini, A. Di Pietro, Alberto Tofani

Research output: Contribution to conferencePaper

Abstract

We propose a method to analyze inter-dependencies of technological networks and infrastructures when dealing with few available data or missing data. We suggest a simple inclusive index for inter-dependencies and note that even introducing broad simplifications, it is not possible to provide enough information to whatever analysis framework. Hence we resort to a Simulated Annealing-like algorithm (SAFE) to calculate the most probable cascading failure scenarios following a given unfavourable event in the network, compatibly with the previously known data. SAFE gives an exact definition of the otherwise vague notion of criticality and individuates the "critical" links/nodes. Moreover, a uniform probability distribution is used to approximate the unknown or missing data in order to cope with the recent finding that Critical Infrastructures such as the power system exhibit the self-organizing criticality phenomenon. A toy example based on a real topology is given; SAFE proves to be a reasonably fast, accurate and computationally simple evaluation tool in presence of more than 50% missing data. © 2009 Springer Berlin Heidelberg.
Original languageEnglish
DOIs
Publication statusPublished - 2009
Event28th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2009 - , Germany
Duration: 1 Jan 2009 → …

Conference

Conference28th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2009
CountryGermany
Period1/1/09 → …

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Fioriti, V., Ruzzante, S., Castorini, E., Di Pietro, A., & Tofani, A. (2009). Modelling critical infrastructures in presence of lack of data with simulated annealing - Like algorithms. Paper presented at 28th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2009, Germany. https://doi.org/10.1007/978-3-642-04468-7_8