On Wed, Jan 22, 2014 at 4:55 AM, coderman
... application of graph theory to identify critical high degree nodes in these systems and estimate the impact of severing one or few links. (then further refined by others into a good paper i'll need to dig up,
i can't find it; will check other archives later,... related below. [note: where protections or identifications of critical components are identified, work backwards to direct attacks at least protected areas with highest impact.] "The Revenge of Distance: Vulnerability Analysis of Critical Information Infrastructure" Sean P. Gorman, Laurie Schintler, Raj Kulkarni, Roger Stough http://onlinelibrary.wiley.com/doi/10.1111/j.0966-0879.2004.00435.x/abstract "Identifying Critical Locations in a Spatial Network with Graph Theory" Urška Demšar, Olga Špatenková, Kirsi Virrantaus2 http://onlinelibrary.wiley.com/doi/10.1111/j.1467-9671.2008.01086.x/abstract?deniedAccessCustomisedMessage=&userIsAuthenticated=false "On Some Recent Definitions and Analysis Frameworks for Risk, Vulnerability, and Resilience" Terje Aven http://onlinelibrary.wiley.com/doi/10.1111/j.1539-6924.2010.01528.x/abstract?deniedAccessCustomisedMessage=&userIsAuthenticated=false