On Wed, Jan 22, 2014 at 4:55 AM, coderman <coderman@gmail.com> wrote:
... application of graph theory to identify critical high degree nodes in these systems and estimate the impact of severing one or few links. (then further refined by others into a good paper i'll need to dig up,
i can't find it; will check other archives later,... related below. [note: where protections or identifications of critical components are identified, work backwards to direct attacks at least protected areas with highest impact.] "The Revenge of Distance: Vulnerability Analysis of Critical Information Infrastructure" Sean P. Gorman, Laurie Schintler, Raj Kulkarni, Roger Stough http://onlinelibrary.wiley.com/doi/10.1111/j.0966-0879.2004.00435.x/abstract "Identifying Critical Locations in a Spatial Network with Graph Theory" Urška Demšar, Olga Špatenková, Kirsi Virrantaus2 http://onlinelibrary.wiley.com/doi/10.1111/j.1467-9671.2008.01086.x/abstract?deniedAccessCustomisedMessage=&userIsAuthenticated=false "On Some Recent Definitions and Analysis Frameworks for Risk, Vulnerability, and Resilience" Terje Aven http://onlinelibrary.wiley.com/doi/10.1111/j.1539-6924.2010.01528.x/abstract?deniedAccessCustomisedMessage=&userIsAuthenticated=false