Promoting resiliency in emergency communication networks: A network interdiction modeling approach

Michael R. Bartolacci, Stanko Dimitrov, Larry J. LeBlanc

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Emergency communication networks provide the basis for preparing for, and responding to, manmade and natural disasters. With the increasing importance of information security, emergency network operators such as non-governmental organizations (NGOs), local and national governmental agencies, and traditional network operators must deal with the possibility of sabotage and hacking of such networks. A network interdiction modeling approach is proposed that can be utilized for planning purposes in order to identify and protect critical parts of the network infrastructure. These critical nodes or links represent opportunities where investment or "hardening" of such infrastructure may reduce or prevent reductions in network traffic flows created by nefarious actors prior, during, or after an emergency or disaster.

Original languageEnglish (US)
Title of host publicationProceedings of the 50th Annual Hawaii International Conference on System Sciences, HICSS 2017
EditorsTung X. Bui, Ralph Sprague
PublisherIEEE Computer Society
Pages2509-2516
Number of pages8
ISBN (Electronic)9780998133102
StatePublished - 2017
Event50th Annual Hawaii International Conference on System Sciences, HICSS 2017 - Big Island, United States
Duration: Jan 3 2017Jan 7 2017

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
Volume2017-January
ISSN (Print)1530-1605

Conference

Conference50th Annual Hawaii International Conference on System Sciences, HICSS 2017
Country/TerritoryUnited States
CityBig Island
Period1/3/171/7/17

All Science Journal Classification (ASJC) codes

  • General Engineering

Fingerprint

Dive into the research topics of 'Promoting resiliency in emergency communication networks: A network interdiction modeling approach'. Together they form a unique fingerprint.

Cite this