Optimization Problems in Infrastructure Security
详细信息    查看全文
  • 关键词:Blocking ; Coverage ; Evacuation ; Infrastructure security ; Interference ; Mobile robots ; Patrolling
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2016
  • 出版时间:2016
  • 年:2016
  • 卷:9482
  • 期:1
  • 页码:3-13
  • 全文大小:218 KB
  • 参考文献:1.Ahlswede, R., Wegener, I.: Search Problems. Wiley-Interscience, New York (1987)MATH
    2.Almeida, A., Ramalho, G.L., Santana, H., Azevedo Tedesco, P., Menezes, T., Corruble, V., Chevaleyre, Y.: Recent advances on multi-agent patrolling. In: Bazzan, A.L.C., Labidi, S. (eds.) SBIA 2004. LNCS (LNAI), vol. 3171, pp. 474–483. Springer, Heidelberg (2004)CrossRef
    3.Alpern, S., Gal, S.: The Theory of Search Games and Rendezvous, vol. 55. Kluwer Academic Publishers, New York (2003)MATH
    4.Baeza Yates, R., Culberson, J., Rawlins, G.: Searching in the plane. Inf. Comput. 106(2), 234–252 (1993)CrossRef MathSciNet MATH
    5.Beck, A.: On the linear search problem. Isr. J. Math. 2(4), 221–228 (1964)CrossRef MATH
    6.Bellman, R.: An optimal search. SIAM Rev. 5(3), 274 (1963)CrossRef
    7.Benkoski, S., Monticino, M., Weisinger, J.: A survey of the search theory literature. Naval Res. Logistics (NRL) 38(4), 469–494 (1991)CrossRef MATH
    8.Bhattacharya, B., Burmester, M., Hu, Y., Kranakis, E., Shi, Q., Wiese, A.: Optimal movement of mobile sensors for barrier coverage of a planar region. TCS 410(52), 5515–5528 (2009)CrossRef MathSciNet MATH
    9.Biringer, B., Vugrin, E., Warren, D.: Critical Infrastructure System Security and Resiliency. CRC Press, Boca Raton (2013)CrossRef
    10.Bonato, A., Nowakowski, R.: The Game of Cops and Robbers on Graphs. American Mathematical Society, Providence (2011)CrossRef MATH
    11.Chen, D.Z., Gu, Y., Li, J., Wang, H.: Algorithms on minimizing the maximum sensor movement for barrier coverage of a linear domain. In: Fomin, F.V., Kaski, P. (eds.) SWAT 2012. LNCS, vol. 7357, pp. 177–188. Springer, Heidelberg (2012)CrossRef
    12.Chrobak, M., Gąsieniec, L., Gorry, T., Martin, R.: Group search on the line. In: Italiano, G.F., Margaria-Steffen, T., Pokorný, J., Quisquater, J.-J., Wattenhofer, R. (eds.) SOFSEM 2015. LNCS, vol. 8939, pp. 164–176. Springer, Heidelberg (2015)
    13.Collins, A., Czyzowicz, J., Gasieniec, L., Kosowski, A., Kranakis, E., Krizanc, D., Martin, R., Morales Ponce, O.: Optimal patrolling of fragmented boundaries. In: Proceedings of SPAA (2013)
    14.Czyzowicz, J., Gąsieniec, L., Gorry, T., Kranakis, E., Martin, R., Pajak, D.: Evacuating robots via unknown exit in a disk. In: Kuhn, F. (ed.) DISC 2014. LNCS, vol. 8784, pp. 122–136. Springer, Heidelberg (2014)
    15.Czyzowicz, J., Gąsieniec, L., Kosowski, A., Kranakis, E.: Boundary patrolling by mobile agents with distinct maximal speeds. In: Demetrescu, C., Halldórsson, M.M. (eds.) ESA 2011. LNCS, vol. 6942, pp. 701–712. Springer, Heidelberg (2011)CrossRef
    16.Czyzowicz, J., Gasieniec, L., Kosowski, A., Kranakis, E., Krizanc, D., Taleb, N.: When patrolmen become corrupted: monitoring a graph using faulty mobile robots. In: Elbassioni, K., Makino, K. (eds.) ISAAC 2015. LNCS, vol. 9472, pp. 343–354. Springer, Heidelberg (2015). doi:10.​1007/​978-3-662-48971-0_​30 CrossRef
    17.Czyzowicz, J., Kranakis, E., Krizanc, D., Lambadaris, I., Narayanan, L., Opatrny, J., Stacho, L., Urrutia, J., Yazdani, M.: On minimizing the maximum sensor movement for barrier coverage of a line segment. In: Ruiz, P.M., Garcia-Luna-Aceves, J.J. (eds.) ADHOC-NOW 2009. LNCS, vol. 5793, pp. 194–212. Springer, Heidelberg (2009)CrossRef
    18.Czyzowicz, J., Kranakis, E., Krizanc, D., Lambadaris, I., Narayanan, L., Opatrny, J., Stacho, L., Urrutia, J., Yazdani, M.: On minimizing the sum of sensor movements for barrier coverage of a line segment. In: Nikolaidis, I., Wu, K. (eds.) ADHOC-NOW 2010. LNCS, vol. 6288, pp. 29–42. Springer, Heidelberg (2010)CrossRef
    19.Czyzowicz, J., Kranakis, E., Krizanc, D., Narayanan, L., Opatrny, J.: Robot-assisted restoration of barrier coverage. In: Workshop on Approximation and Online Algorithms, pp. 119–131. Springer (2014)
    20.Czyzowicz, J., Kranakis, E., Krizanc, D., Narayanan, L., Opatrny, J., Shende, S.: Wireless autonomous robot evacuation from equilateral triangles and squares. In: Papavassiliou, S., Ruehrup, S. (eds.) ADHOC-NOW 2015. LNCS, vol. 9143, pp. 181–194. Springer, Switzerland (2015)CrossRef
    21.Dobbie, J.: A survey of search theory. Oper. Res. 16(3), 525–537 (1968)CrossRef MATH
    22.Dobrev, S.: Personal communication
    23.Dumitrescu, A., Ghosh, A., Tóth, C.D.: On fence patrolling by mobile agents. Electr. J. Comb. 21(3), 1–15 (2014). P3.4
    24.Emek, Y., Langner, T., Uitto, J., Wattenhofer, R.: Solving the ANTS problem with asynchronous finite state machines. In: Esparza, J., Fraigniaud, P., Husfeldt, T., Koutsoupias, E. (eds.) ICALP 2014, Part II. LNCS, vol. 8573, pp. 471–482. Springer, Heidelberg (2014)
    25.Kapelko, R., Kranakis, E.: On the displacement for covering a square with randomly placed sensors. In: Papavassiliou, S., Ruehrup, S. (eds.) ADHOC-NOW 2015. LNCS, vol. 9143, pp. 148–162. Springer, Switzerland (2015)
    26.Kawamura, A., Kobayashi, Y.: Fence patrolling by mobile agents with distinct speeds. In: Chao, K.-M., Hsu, T., Lee, D.-T. (eds.) ISAAC 2012. LNCS, vol. 7676, pp. 598–608. Springer, Heidelberg (2012)CrossRef
    27.Kranakis, E., Krizanc, D., Luccio, F., Smith, B.: Maintaining intruder detection capability in a rectangular domain with sensors. In: Algosensors 2015, Patras, Greece (2015)
    28.Kranakis, E., Krizanc, D., Morales-Ponce, O., Narayanan, L., Opatrny, J., Shende, S.: Expected sum and maximum of displacement of random sensors for coverage of a domain. In: Proceedings of the Twenty-Fifth Annual ACM Symposium on Parallelism in Algorithms and Architectures, pp. 73–82. ACM (2013)
    29.Kranakis, E., Shaikhet, G.: Displacing random sensors to avoid interference. In: Cai, Z., Zelikovsky, A., Bourgeois, A. (eds.) COCOON 2014. LNCS, vol. 8591, pp. 501–512. Springer, Heidelberg (2014)
    30.Kranakis, E., Shaikhet, G.: Sensor allocation problems on the real line. J. Appl. Probab. (2015, to appear)
    31.Kumar, S., Lai, T.H., Arora, A.: Barrier coverage with wireless sensors. In: Proceedings of the 11th Annual International Conference on Mobile Computing and Networking, pp. 284–298. ACM (2005)
    32.Lenzen, C., Lynch, N., Newport, C., Radeva, T.: Trade-offs between selection complexity and performance when searching the plane without communication. In: Proceedings of PODC, pp. 252–261 (2014)
    33.Lewis, T.G.: Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. John Wiley & Sons, Hoboken (2014)
    34.López-Ortiz, A., Sweet, G.: Parallel searching on a lattice. In: Proceedings of CCCG, pp. 125–128 (2001)
    35.Machado, A., Ramalho, G.L., Zucker, J.-D., Drogoul, A.: Multi-agent patrolling: an empirical analysis of alternative architectures. In: Sichman, J.S., Bousquet, F., Davidsson, P. (eds.) MABS 2002. LNCS (LNAI), vol. 2581, pp. 155–170. Springer, Heidelberg (2003)CrossRef
    36.Nahin, P.: Chases and Escapes: The Mathematics of Pursuit and Evasion. Princeton University Press, Princeton (2012)
    37.O’Rourke, J.: Art Gallery Theorems and Algorithms, vol. 57. Oxford University Press, Oxford (1987)MATH
    38.Park, T., Shi, H.: Extending the lifetime of barrier coverage by adding sensors to a bottleneck region. In: 12th IEEE Consumer Communications and Networking Conference (CCNC). IEEE (2015)
    39.Pasqualetti, F., Zanella, F., Peters, J.R., Spindler, M., Carli, R., Bullo, F.: Camera network coordination for intruder detection. IEEE Trans. Contr. Sys. Techn. 22(5), 1669–1683 (2014)CrossRef
    40.Radvanovsky, R.S., McDougall, A.: Critical Infrastructure: Homeland Security and Emergency Preparedness. CRC Press, Boca Raton (2009)CrossRef
    41.Saipulla, A., Westphal, C., Liu, B., Wang, J.: Barrier coverage of line-based deployed wireless sensor networks. In: INFOCOM, pp. 127–135. IEEE (2009)
    42.Stone, L.: Theory of Optimal Search. Academic Press, New York (1975)MATH
    43.Xie, H., Li, M., Wang, W., Wang, C., Li, X., Zhang, Y.: Minimal patching barrier healing strategy for barrier coverage in hybrid wsns. In: 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC), pp. 1558–1563. IEEE (2014)
  • 作者单位:Evangelos Kranakis (16)
    Danny Krizanc (17)

    16. School of Computer Science, Carleton University, Ottawa, ON, Canada
    17. Department of Mathematics and Computer Science, Wesleyan University, Middletown, CT, USA
  • 丛书名:Foundations and Practice of Security
  • ISBN:978-3-319-30303-1
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
文摘
How do we identify and prioritize risks and make smart choices based on fiscal constraints and limited resources? The main goal of infrastructure security is to secure, withstand, and rapidly recover from potential threats that may affect critical resources located within a given bounded region. In order to strengthen and maintain secure, functioning, and resilient critical infrastructure, proactive and coordinated efforts are necessary.
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via email.