{"id":"https://openalex.org/W1589829976","doi":"https://doi.org/10.1109/drcn.2015.7148995","title":"Modelling robustness of critical infrastructure networks","display_name":"Modelling robustness of critical infrastructure networks","publication_year":2015,"publication_date":"2015-03-01","ids":{"openalex":"https://openalex.org/W1589829976","doi":"https://doi.org/10.1109/drcn.2015.7148995","mag":"1589829976"},"language":"en","primary_location":{"id":"doi:10.1109/drcn.2015.7148995","is_oa":false,"landing_page_url":"https://doi.org/10.1109/drcn.2015.7148995","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 11th International Conference on the Design of Reliable Communication Networks (DRCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015464222","display_name":"Srinath Pinnaka","orcid":null},"institutions":[{"id":"https://openalex.org/I20382870","display_name":"Missouri University of Science and Technology","ror":"https://ror.org/00scwqd12","country_code":"US","type":"education","lineage":["https://openalex.org/I20382870"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Srinath Pinnaka","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Missouri University of Science and Technology, Rolla, MO, USA","Dept. of Electrical & Computer Engineering, Missouri Univ. of Science & Technology, Rolla, MO 65409, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Missouri University of Science and Technology, Rolla, MO, USA","institution_ids":["https://openalex.org/I20382870"]},{"raw_affiliation_string":"Dept. of Electrical & Computer Engineering, Missouri Univ. of Science & Technology, Rolla, MO 65409, USA","institution_ids":["https://openalex.org/I20382870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088805688","display_name":"Rajgopal Yarlagadda","orcid":null},"institutions":[{"id":"https://openalex.org/I20382870","display_name":"Missouri University of Science and Technology","ror":"https://ror.org/00scwqd12","country_code":"US","type":"education","lineage":["https://openalex.org/I20382870"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rajgopal Yarlagadda","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Missouri University of Science and Technology, Rolla, MO, USA","Dept. of Electrical & Computer Engineering, Missouri Univ. of Science & Technology, Rolla, MO 65409, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Missouri University of Science and Technology, Rolla, MO, USA","institution_ids":["https://openalex.org/I20382870"]},{"raw_affiliation_string":"Dept. of Electrical & Computer Engineering, Missouri Univ. of Science & Technology, Rolla, MO 65409, USA","institution_ids":["https://openalex.org/I20382870"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058060546","display_name":"Egemen K. \u00c7etinkaya","orcid":"https://orcid.org/0000-0002-6394-4565"},"institutions":[{"id":"https://openalex.org/I20382870","display_name":"Missouri University of Science and Technology","ror":"https://ror.org/00scwqd12","country_code":"US","type":"education","lineage":["https://openalex.org/I20382870"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Egemen K. Cetinkaya","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Missouri University of Science and Technology, Rolla, MO, USA","Dept. of Electrical & Computer Engineering, Missouri Univ. of Science & Technology, Rolla, MO 65409, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Missouri University of Science and Technology, Rolla, MO, USA","institution_ids":["https://openalex.org/I20382870"]},{"raw_affiliation_string":"Dept. of Electrical & Computer Engineering, Missouri Univ. of Science & Technology, Rolla, MO 65409, USA","institution_ids":["https://openalex.org/I20382870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015464222"],"corresponding_institution_ids":["https://openalex.org/I20382870"],"apc_list":null,"apc_paid":null,"fwci":3.5788,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.92536318,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"95","last_page":"98"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interdependent-networks","display_name":"Interdependent networks","score":0.8945755362510681},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.8252427577972412},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.8086048364639282},{"id":"https://openalex.org/keywords/cascading-failure","display_name":"Cascading failure","score":0.7812986373901367},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.761961817741394},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7074593305587769},{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.6880075931549072},{"id":"https://openalex.org/keywords/critical-infrastructure-protection","display_name":"Critical infrastructure protection","score":0.5204325318336487},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.512577474117279},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5039023756980896},{"id":"https://openalex.org/keywords/complex-network","display_name":"Complex network","score":0.4995696544647217},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44499480724334717},{"id":"https://openalex.org/keywords/natural-disaster","display_name":"Natural disaster","score":0.4211767911911011},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3551344871520996},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34944450855255127},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3308270573616028},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15912923216819763},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.11480742692947388},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.07023552060127258}],"concepts":[{"id":"https://openalex.org/C101142422","wikidata":"https://www.wikidata.org/wiki/Q17101727","display_name":"Interdependent networks","level":3,"score":0.8945755362510681},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.8252427577972412},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.8086048364639282},{"id":"https://openalex.org/C119323957","wikidata":"https://www.wikidata.org/wiki/Q5048226","display_name":"Cascading failure","level":4,"score":0.7812986373901367},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.761961817741394},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7074593305587769},{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.6880075931549072},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.5204325318336487},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.512577474117279},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5039023756980896},{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.4995696544647217},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44499480724334717},{"id":"https://openalex.org/C166566181","wikidata":"https://www.wikidata.org/wiki/Q8065","display_name":"Natural disaster","level":2,"score":0.4211767911911011},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3551344871520996},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34944450855255127},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3308270573616028},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15912923216819763},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.11480742692947388},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.07023552060127258},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/drcn.2015.7148995","is_oa":false,"landing_page_url":"https://doi.org/10.1109/drcn.2015.7148995","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 11th International Conference on the Design of Reliable Communication Networks (DRCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1249378934","https://openalex.org/W1488182941","https://openalex.org/W1589762028","https://openalex.org/W1968164782","https://openalex.org/W1980156780","https://openalex.org/W1985538586","https://openalex.org/W2013948839","https://openalex.org/W2058654052","https://openalex.org/W2083420849","https://openalex.org/W2107170824","https://openalex.org/W2113188272","https://openalex.org/W2129004433","https://openalex.org/W2132022337","https://openalex.org/W2159863842","https://openalex.org/W3146908316","https://openalex.org/W6629264399","https://openalex.org/W6635403268"],"related_works":["https://openalex.org/W2076616403","https://openalex.org/W2371613754","https://openalex.org/W2034117965","https://openalex.org/W1584873820","https://openalex.org/W3204651252","https://openalex.org/W2811082449","https://openalex.org/W2965637875","https://openalex.org/W2135039713","https://openalex.org/W4304585125","https://openalex.org/W4205609164"],"abstract_inverted_index":{"Critical":[0],"infrastructure":[1,89,100],"networks":[2,26,42,74],"are":[3,75],"becoming":[4],"increasingly":[5],"interdependent.":[6],"An":[7],"attack":[8,105],"or":[9,14],"disaster":[10],"in":[11,19,43,71],"a":[12,16,20,59],"network":[13,21,90],"on":[15,28,78,87,103],"single":[17],"node":[18],"will":[22],"affect":[23],"the":[24,38,44,63,72,79,96,104],"other":[25],"dependent":[27],"it.":[29],"Therefore,":[30],"it":[31],"is":[32],"important":[33],"to":[34,54,61],"assess":[35],"and":[36,49,69],"understand":[37],"vulnerability":[39],"of":[40,46,65,98],"interdependent":[41,66,73],"presence":[45],"natural":[47],"disasters":[48],"malicious":[50],"attacks":[51],"that":[52,95],"lead":[53],"cascading":[55],"failures.":[56],"We":[57,83],"develop":[58],"framework":[60,86],"analyse":[62],"robustness":[64],"networks.":[67],"Nodes":[68],"links":[70],"attacked":[76],"based":[77],"graph":[80],"centrality":[81],"metrics.":[82],"apply":[84],"our":[85],"critical":[88,99],"data.":[91],"Our":[92],"results":[93],"indicate":[94],"importance":[97],"varies":[101],"depending":[102],"strategy.":[106]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
