independently assisting oversight of highly classified programs

coderman coderman at gmail.com
Wed Jan 22 06:45:08 PST 2014


On Wed, Jan 22, 2014 at 4:55 AM, coderman <coderman at gmail.com> wrote:
>... application of graph theory to identify critical high degree
> nodes in these systems and estimate the impact of severing one or few
> links.
> (then further refined by others into a good paper i'll need to dig up,

i can't find it; will check other archives later,...

related below.
[note: where protections or identifications of critical components are
identified, work backwards to direct attacks at least protected areas
with highest impact.]


"The Revenge of Distance: Vulnerability Analysis of Critical
Information Infrastructure"
Sean P. Gorman, Laurie Schintler, Raj Kulkarni, Roger Stough
http://onlinelibrary.wiley.com/doi/10.1111/j.0966-0879.2004.00435.x/abstract


"Identifying Critical Locations in a Spatial Network with Graph Theory"
Urška Demšar, Olga Špatenková, Kirsi Virrantaus2
http://onlinelibrary.wiley.com/doi/10.1111/j.1467-9671.2008.01086.x/abstract?deniedAccessCustomisedMessage=&userIsAuthenticated=false


"On Some Recent Definitions and Analysis Frameworks for Risk,
Vulnerability, and Resilience"
Terje Aven
http://onlinelibrary.wiley.com/doi/10.1111/j.1539-6924.2010.01528.x/abstract?deniedAccessCustomisedMessage=&userIsAuthenticated=false




More information about the cypherpunks mailing list