In search of network resilience: An optimization-based view
Corresponding Author
Thomas C. Sharkey
Department of Industrial Engineering, Clemson University, Clemson, South Carolina, USA
Correspondence
Thomas C. Sharkey, Department of Industrial Engineering, Clemson University, 263 Freeman Hall, Clemson, SC 29634.
Email: [email protected]
Search for more papers by this authorSarah G. Nurre Pinkley
Department of Industrial Engineering, University of Arkansas, Fayetteville, Arkansas, USA
Search for more papers by this authorDaniel A. Eisenberg
Operations Research Department, Naval Postgraduate School, Monterey, California, USA
Search for more papers by this authorDavid L. Alderson
Operations Research Department, Naval Postgraduate School, Monterey, California, USA
Search for more papers by this authorCorresponding Author
Thomas C. Sharkey
Department of Industrial Engineering, Clemson University, Clemson, South Carolina, USA
Correspondence
Thomas C. Sharkey, Department of Industrial Engineering, Clemson University, 263 Freeman Hall, Clemson, SC 29634.
Email: [email protected]
Search for more papers by this authorSarah G. Nurre Pinkley
Department of Industrial Engineering, University of Arkansas, Fayetteville, Arkansas, USA
Search for more papers by this authorDaniel A. Eisenberg
Operations Research Department, Naval Postgraduate School, Monterey, California, USA
Search for more papers by this authorDavid L. Alderson
Operations Research Department, Naval Postgraduate School, Monterey, California, USA
Search for more papers by this authorFunding information: Defense Threat Reduction Agency, DTRA-18681-M; National Science Foundation, CMMI-1254258
Abstract
Fifty years of research in Networks coincides with 50 years of advances in resilience theory and applications. The purpose of this review is to identify how these two technical communities influenced each other in the past and can bolster each other in the future. Advances in resilience theory show that there are at least four ways networks demonstrate resilience: robustness, rebound, extensibility, and adaptability. Research published in Networks and by the broader network optimization community has focused primarily on technical methods for robustness and rebound. We review this literature to organize seminal problems and papers on the ability of networks to manage increasing stressors and return to normal activities after a stressful event. In contrast, the Networks community has made less progress addressing issues for network extensibility and adaptability. Extensibility refers to the ability to stretch current operations to surprising situations and adaptability refers to the ability to sustain operations into the future. We discuss ways to harness existing network optimization methods to study these forms of resilience and outline their limitations. We conclude by providing a research agenda that ensures the Networks community remains central to future advances in resilience while being pragmatic about the limitations of network optimization for achieving this task.
REFERENCES
- 1H. Aissi and D. Vanderpooten, Robust capacity expansion of a network under demand uncertainty: A bi-objective approach, Networks 68 (2016), 185–199.
- 2M. Al-Kuwaiti, N. Kyriakopoulos, and S. Hussein, A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability, IEEE Commun. Surv. Tutor. 11 (2009), 106–124.
- 3D.L. Alderson and J.C. Doyle, Contrasting views of complexity and their implications for network-centric infrastructures, IEEE Trans. Syst. Man Cybernet. A: Syst. Hum. 40 (2010), 839–852.
- 4D.L. Alderson, G.G. Brown, W.M. Carlyle, and R.K. Wood, “ Solving defender-attacker-defender models for infrastructure defense,” Operations Research, Computing, and Homeland Security, R.K. Wood and R.F. Dell (eds), Institute for Operations Research and the Management Sciences, Hanover, MD, 2011, pp. 28–49.
10.1287/ics.2011.0047 Google Scholar
- 5D.L. Alderson, G.G. Brown, and W.M. Carlyle, “ Assessing and improving operational resilience of critical infrastructures and other systems,” Tutorials in Operations Research: Bridging Data and Decisions, A. Newman and J. Leung (eds), Institute for Operations Research and Management Science, Hanover, MD, 2014, pp. 180–215.
10.1287/educ.2014.0131 Google Scholar
- 6D.L. Alderson, G. Brown, W.M. Carlyle, and R.K. Wood, Assessing and improving the operational resilience of a large highway infrastructure system to worst-case losses, Transp. Sci. 52 (2017), 1012–1034.
- 7N. Alguacil, A. Delgadillo, and J.M. Arroyo, A trilevel programming approach for electric grid defense planning, Comput. Oper. Res. 41 (2014), 282–290.
- 8M.L. Ali, P.-H. Ho, and J. Tapolcai, SRLG failure localization using nested m-trails and their application to adaptive probing, Networks 66 (2015), 347–363.
- 9C. Alvarez, M. Blesa, J. Diaz, M. Serna, and A. Fernandez, Adversarial models for priority-based networks, Networks 45 (2005), 23–35.
- 10E. Álvarez-Miranda and J. Pereira, Designing and constructing networks under uncertainty in the construction stage: Definition and exact algorithmic approach, Comput. Oper. Res. 81 (2017), 178–191.
- 11J. Anderies, C. Folke, B. Walker, and E. Ostrom, Aligning key concepts for global change policy: Robustness, resilience, and sustainability, Ecol. Soc. 18 (2013), 8.
- 12A. Arab, A. Khodaei, Z. Han, and S.K. Khator, Proactive recovery of electric power assets for resiliency enhancement, IEEE Access 3 (2015), 99–109.
- 13A. Arab, A. Khodaei, S.K. Khator, and Z. Han, Electric power grid restoration considering disaster economics, IEEE Access 4 (2016), 639–649.
- 14A. Arulselvan, A. Bley, and I. Ljubić, The incremental connected facility location problem, Comput. Oper. Res. 112 (2019), 104763.
- 15E. Aslan and M. Çelik, Pre-positioning of relief items under road/facility vulnerability with concurrent restoration and relief transportation, IISE Trans. 51 (2019), 847–868.
- 16A. Atamturk and A. Bhardwaj, Network design with probabilistic capacities, Networks 71 (2018), 16–30.
- 17A. Atamturk and M. Zhang, Two-stage robust network flow and design under demand uncertainty, Oper. Res. 55 (2007), 662–673.
- 18I. Averbakh, Emergency path restoration problems, Discrete Optim. 9 (2012), 58–64.
- 19I. Averbakh, Minimizing the makespan in multiserver network restoration problems, Networks 70 (2017), 60–68.
- 20I. Averbakh and J. Pereira, The flowtime network construction problem, IIE Trans. 44 (2012), 681–694.
- 21I. Averbakh and J. Pereira, Network construction problems with due dates, Eur. J. Oper. Res. 244 (2015), 715–729.
- 22I. Averbakh and J. Pereira, Lateness minimization in pairwise connectivity restoration problems, INFORMS J. Comput. 30 (2018), 522–538.
- 23A. Balakrishnan, M. Banciu, K. Glowacka, and P. Mirchandani, Hierarchical approach for survivable network design, Eur. J. Oper. Res. 225 (2013), 223–235.
- 24S. Bao, C. Zhang, M. Ouyang, and L. Miao, An integrated tri-level model for enhancing the resilience of facilities against intentional attacks, Ann. Oper. Res. 283 (2019), 87–117.
- 25F. Barbosa, A. de Sousa, and A. Agra, Design/upgrade of a transparent optical network topology resilient to the simultaneous failure of its critical nodes, Networks 75 (2020), 356–373.
- 26M. Baxter, T. Elgindy, T.A. Ernst, T. Kalinowski, and M.W.P. Savelsbergh, Incremental network design with shortest paths, Eur. J. Oper. Res. 238 (2014), 675–684.
- 27N.O. Baycik and T.C. Sharkey, Interdiction-based approaches to identify damage in disrupted critical infrastructures with dependencies, J. Infrastruct. Syst. 25 (2019), 04019013.
- 28N.O. Baycik and K.M. Sullivan, Robust location of hidden interdictions on a shortest path network, IISE Trans. 51 (2019), 1332–1347.
- 29N.O. Baycik, T.C. Sharkey, and C. Rainwater, Interdicting layered physical and information flow networks, IISE Trans. 50 (2018), 316–331.
- 30H. Bayrak and M.D. Bailey, Shortest path network interdiction with asymmetric information, Networks 52 (2008), 133–140.
- 31F. Bendali, I. Diarrassouba, A.R. Mahjoub, M. Didi Biha, and J. Mailfert, A branch-and-cut algorithm for the k-edge connected subgraph problem, Networks 55 (2010), 13–32.
- 32D. Bertsimas and M. Sim, Robust discrete optimization and network flows, Math. Program. 98 (2003), 49–71.
- 33D. Bienstock, Electrical Transmission System Cascades and Vulnerability: An Operations Research Viewpoint, SIAM-MOS, Philadelphia, PA, 2016.
- 34D. Bienstock and A. Verma, The N − k problem in power grids: New models, formulations, and numerical experiments, SIAM J. Optim. 20 (2010), 2352–2380.
- 35J.S. Borrero, O.A. Prokopyev, and D. Saure, Sequential shortest path interdiction with incomplete information, Decis. Anal. 13 (2015), 68–98.
- 36J.S. Borrero, O.A. Prokopyev, and D. Saure, Sequential interdiction with incomplete information and learning, Oper. Res. 67 (2019), 72–89.
- 37Q. Botton, B. Fortz, L. Gouveia, and M. Poss, Benders decomposition for the Hop-constrained survivable network design problem, INFORMS J. Comput. 25 (2013), 13–26.
- 38Q. Botton, B. Fortz, and L. Gouveia, On the hop-constrained survivable network design problem with reliable edges, Comput. Oper. Res. 64 (2015), 159–167.
- 39J. Boyd. A discourse on winning and losing: Patterns of conflict. Unpublished Briefing, December 7, 1986.
- 40N. Brenner, W. Bialek, and R.D.R. Van Steveninck, Adaptive rescaling maximizes information transmission, Neuron 26 (2000), 695–702.
- 41G. Brown and R. Dell, Formulating linear and integer linear programs: A rogues' gallery, INFORMS Trans. Educ. 7 (2007), 153–159.
10.1287/ited.7.2.153 Google Scholar
- 42G. Brown, M. Carlyle, J. Salmerón, and R.K. Wood, Defending critical infrastructure, Interfaces 36 (2006), 530–544.
- 43G.G. Brown, R.F. Dell, and R.K. Wood, Optimization and persistence, Interfaces 27 (1997), 15–37.
- 44M. Bruneau, S.E. Chang, R.T. Eguchi, G.C. Lee, T.D. O'Rourke, A.M. Reinhorn, M. Shinozuka, K. Tierney, W.A. Wallace, and D. von Winterfeldt, A framework to quantitatively assess and enhance the seismic resilience of communities, Earthquake Spectra 19 (2003), 733–752.
- 45C. Busing, A. Grub, A.M.C.A. Koster, W. Laube, and M. Tieves, Robust spectrum allocation in elastic flexgrid optical networks: Complexity and formulations, Networks 70 (2017), 342–359.
- 46 M. Bynum, A. Staid, B. Arguello, A. Castillo, J.-P. Watson, and C.D. Laird, Proactive operations and investment planning via stochastic optimization to enhance power systems extreme weather resilience, Optim. Online Repos. (2018).
- 47E. Canale, H. Cancela, F. Robledo, P. Romero, and P. Sartor, Diameter constrained reliability: Complexity, distinguished topologies and asymptotic behavior, Networks 66 (2015), 296–305.
- 48E. Canale, P. Romero, and G. Rubino, Factorization and exact evaluation of the source-terminal diameter-constrained reliability, Networks 70 (2017), 283–291.
- 49J.M. Carlson and J. Doyle, Highly optimized tolerance: Robustness and design in complex systems, Phys. Rev. Lett. 84 (2000), 2529–2532.
- 50A. Castillo, T. Nakashima-Paniagua, and J. Doucette, Dual-failure restorability analysis of span-restorable meta-mesh networks, Networks 75 (2020), 405–419.
- 51B. Cavdaroglu, E. Hammel, J.E. Mitchell, T.C. Sharkey, and W.A. Wallace, Integrating restoration and scheduling decisions for disrupted interdependent infrastructure systems, Ann. Oper. Res. 203 (2013), 279–294.
- 52M. Çelik, Network restoration and recovery in humanitarian operations: Framework, literature review, and research directions, Surv. Oper. Res. Manage. Sci. 21 (2016), 47–61.
- 53M. Çelik, O. Ergun, and P. Keskinocak, The post-disaster debris clearance problem under incomplete information, Oper. Res. 63 (2015), 65–85.
- 54Y. Cheng, D. Medhi, and J.P.G. Sterbenz, Geodiverse routing with path delay and skew requirement under area-based challenges, Networks 66 (2015), 335–346.
- 55M. Chiang, S.H. Low, A.R. Calderbank, and J.C. Doyle, Layering as optimization decomposition: A mathematical theory of network architectures, Proc. IEEE 95 (2007), 255–312.
- 56M. Chimani, M. Kandyba, I. Ljubić, and P. Mutzel, Orientation-based models for {0,1,2}-survivable network design: Theory and practice, Math. Program. Ser. B 124 (2010), 413–439.
- 57R.L. Church and M.P. Scaparra, Protecting critical assets: The r-interdiction median problem with fortification, Geogr. Anal. 39 (2007), 129–146.
- 58D.D. Clark, The design philosophy of the DARPA internet protocols, Proc. ACM SIGCOMM '88, ACM Comput. Commun. Rev., 18, 1988, pp. 106–114.
- 59T.G. Crainic, X. Fu, M. Gendreau, W. Rei, and S.W. Wallace, Progressive hedging-based metaheuristics for stochastic network design, Networks 58 (2011), 114–124.
- 60M. Csete and J.C. Doyle, Bow ties, metabolism and disease, Trends Biotechnol. 22 (2004), 446–450.
- 61C.A. Cullenbine, R.K. Wood, and A.M. Newman, Theoretical and computational advances for network diversion, Networks 62 (2013), 225–242.
- 62V. Dakos, S.R. Carpenter, E.H. van Nes, and M. Scheffer, Resilience indicators: Prospects and limitations for early warnings of regime shifts, Philos. Trans. R. Soc. B: Biol. Sci. 370 (2015), 20130263.
- 63R.J. Dawson and A.A. Farrag, Fault-tolerant extensions of star networks, Networks 21 (1991), 373–385.
- 64V. Diarrassouba, A.R. Gabrel, L.G. Mahjoub, and P. Pesneau, Integer programming formulations for the k-edge-connected 3-hop-constrained network design problem, Networks 67 (2016), 148–169.
- 65T. Ding, C. Li, C. Yan, F. Li, and Z. Bie, A bilevel optimization model for risk assessment and contingency ranking in transmission system reliability evaluation, IEEE Trans. Power Syst. 32 (2017), 3803–3813.
- 66T. Ding, L. Yao, and F. Li, A multi-uncertainty-set based two-stage robust optimization to defender-attacker-defender model for power system protection, Reliab. Eng. Syst. Saf. 169 (2018), 179–186.
- 67J.C. Doyle and M. Csete, Rules of engagement, Nature 446 (2007), 860.
- 68J.C. Doyle and M. Csete, Architecture, constraints, and behavior, Proc. Natl. Acad. Sci. U. S. A. 108 (2011), 15624–15630.
- 69J.C. Doyle, D.L. Alderson, L. Li, S. Low, M. Roughan, S. Shalunov, R. Tanaka, and W. Willinger, The “robust yet fragile” nature of the internet, Proc. Natl. Acad. Sci. U. S. A. 102 (2005), 14497–14502.
- 70D.A. Eisenberg, How to think about resilient infrastructure systems, Ph.D. thesis, Arizona State University, 2018.
- 71D.A. Eisenberg, D.L. Alderson, M. Kitsak, A. Ganin, and I. Linkov, Network foundation for command and control (C2) systems: Literature review, IEEE Access 6 (2018), 68782–68794.
- 72D.A. Eisenberg, T.P. Seager, and D.L. Alderson, Rethinking resilience analytics, Risk Anal. 39 (2019), 1870–1884.
- 73K. Engel, T. Kalinowski, and M.W.P. Savelsbergh, Incremental network design with minimum spanning trees, J. Graph Algorithms Appl. 21 (2017), 417–432.
10.7155/jgaa.00423 Google Scholar
- 74A. Faghih and M.A. Dahleh, On enhancing resilience to cascading failures via post-disturbance tweaking of line reactances, IEEE Trans. Power Syst. 34 (2019), 4921–4930.
- 75Y. Fang and G. Sansavini, Emergence of antifragility by optimum postdisruption restoration planning of infrastructure networks, J. Infrastruct. Syst. 23 (2017), 04017024.
- 76 Y. Fang, C. Fang, E. Zio, and M. Xie, Resilient critical infrastructure planning under disruptions considering recovery scheduling, IEEE Trans. Eng. Manage. (2019), 1–15.
- 77Y.-P. Fang and G. Sansavini, Optimum post-disruption restoration under uncertainty for enhancing critical infrastructure resilience, Reliab. Eng. Syst. Saf. 185 (2019), 1–11.
- 78Y.-P. Fang and E. Zio, An adaptive robust framework for the optimization of the resilience of interdependent infrastructures under natural hazards, Eur. J. Oper. Res. 276 (2019), 1119–1136.
- 79A.A. Farrag and R.J. Dawson, Designing optimal fault-tolerant star networks, Networks 19 (1989), 707–716.
- 80R. Faturechi and E. Miller-Hooks, Measuring the performance of transportation infrastructure systems in disasters: A comprehensive review, J. Infrastruct. Syst. 21 (2015), 04014025.
- 81 Federal Emergency Management Agency, National Preparedness Goal, second edn, Washington D.C., Department of Homeland Security, 2015.
- 82
M. Finkel and M. Tlamim, On Flexibility: Recovery from Technological and Doctrinal Surprise on the Battlefield, Palo Alto, CA, Stanford University Press, 2011.
10.1515/9780804777155 Google Scholar
- 83C. Folke, Resilience: The emergence of a perspective for social–ecological systems analyses, Glob. Environ. Chang. 16 (2006), 253–267.
- 84B. Fortz, A.R. Mahjoub, S.T. McCormick, and P. Pesneau, Two-edge connected subgraphs with bounded rings: Polyhedral results and branch-and-cut, Math. Program. 105 (2006), 85–111.
- 85H. Fotouhi, S. Moryadee, and E. Miller-Hooks, Quantifying the resilience of an urban traffic-electric power coupled system, Reliab. Eng. Syst. Saf. 163 (2017), 79–94.
- 86Y. Fouquet, D. Nace, M. Pioro, M. Poss, and M. Zotkiewicz, Generalized elastic flow rerouting scheme, Networks 66 (2015), 267–281.
- 87R. Francis and B. Bekera, A metric and frameworks for resilience analysis of engineered and infrastructure systems, Reliab. Eng. Syst. Saf. 121 (2014), 90–103.
- 88D.R. Fulkerson and G.C. Harding, Maximizing minimum source-sink path subject to a budget constraint, Math. Program. 13 (1977), 116–118.
- 89Y. Gao, D. Simchi-Levi, C.-P. Teo, and Z. Yan, Disruption risk mitigation in supply chains – The risk exposure index revisited, Oper. Res. 67 (2019), 831–852.
- 90R. Gedik, H. Medal, C. Rainwater, E.A. Pohl, and S.J. Mason, Vulnerability assessment and re-routing of freight trains under disruptions: A coal supply chain network application, Transp. Res. E: Logist. Transp. Rev. 71 (2014), 45–57.
- 91P.M. Ghare, D.C. Montgomery, and W.C. Turner, Optimal interdiction policy for a flow network, Nav. Res. Logist. 18 (1971), 37–45.
- 92C. Ghedini, C. Ribeiro, and L. Sabattini, Toward fault-tolerant multi-robot networks, Networks 70 (2017), 388–400.
- 93N. Ghorbani-Renani, A.D. González, K. Barker, and N. Morshedlou, Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience, Reliab. Eng. Syst. Saf. 199 (2020), 106907.
- 94R. Girão-Silva, B. Nedic, M. Gunkel, and T. Gomes, Shared risk link group disjointness and geodiverse routing: A trade-off between benefit and practical effort, Networks 75 (2020), 374–391.
- 95N. Goldbeck, P. Angeloudis, and W.Y. Ochieng, Resilience assessment for interdependent urban infrastructure systems using dynamic network flow models, Reliab. Eng. Syst. Saf. 188 (2019), 62–79.
- 96B.L. Golden, A problem in network interdiction, Nav. Res. Logist. 25 (1978), 711–713.
- 97T. Gomes, L. Raposo, and G. Ellinas, Dedicated protection of multicast sessions in mixed-graph sparse-splitting optical networks, Networks 70 (2017), 360–372.
- 98A.D. González, L. Dueñas-Osorio, M. Sánchez-Silva, and A.L. Medaglia, The interdependent network design problem for optimal infrastructure system restoration, Comput. Aided Civil Inf. Eng. 31 (2016), 334–350.
- 99A.D. González, A. Chapman, L. Dueñas-Osorio, M. Mesbahi, and M.R. D'Souza, Efficient infrastructure restoration strategies using the recovery operator, Comput. Aided Civil Inf. Eng. 32 (2017), 991–1006.
- 100L. Gouveia and M. Leitner, Design of survivable networks with vulnerability constraints, Eur. J. Oper. Res. 258 (2017), 89–103.
- 101E. Grass and K. Fischer, Two-stage stochastic programming in disaster management: A literature survey, Surv. Oper. Res. Manage. Sci. 21 (2016), 85–100.
- 102F. Harary and J.P. Hayes, Node fault tolerance in graphs, Networks 27 (1996), 19–23.
- 103E.A. Heath, J.E. Mitchell, and T.C. Sharkey, Applying ranking and selection procedures to long-term mitigation for improved network restoration, EURO J. Comput. Optim. 4 (2016), 447–481.
- 104P. Hines, E. Cotilla-Sanchez, and S. Blumsack, 2010. Potential indicators of cascading failure risk in power systems. https://cnls.lanl.gov/∼chertkov/SmarterGrids/Talks/Hines2.pdf.
- 105P. Hines, E. Cotilla-Sanchez, and S. Blumsack, Topological models and critical slowing down: Two approaches to power system blackout risk analysis, 2011 44th Hawaii International Conference on System Sciences, IEEE, 2011, pp. 1–10.
- 106P. Hines, E. Cotilla-Sanchez, B. O'hara, and C. Danforth, Estimating dynamic instability risk by measuring critical slowing down, 2011 IEEE Power and Energy Society General Meeting, IEEE, 2011, pp. 1–5.
- 107A. Hmaity, M. Savi, F. Musumeci, M. Tornatore, and A. Pattavina, Protection strategies for virtual network functions placement and service chains provisioning, Networks 70 (2017), 373–387.
- 108C.S. Holling, Resilience and stability of ecological systems, Annu. Rev. Ecol. Syst. 4 (1973), 1–23.
10.1146/annurev.es.04.110173.000245 Google Scholar
- 109E. Hollnagel, Resilience engineering and the built environment, Build. Res. Inf. 42 (2014), 221–228.
- 110 E. Hollnagel, J. Pariés, D.D. Woods, and J. Wreathall (eds), Resilience Engineering in Practice: A Guidebook, Ashgate Publishing, Ltd., Surrey, UK, 2013.
- 111 E. Hollnagel, D.D. Woods, and N. Leveson (eds), Resilience Engineering: Concepts and Precepts, Ashgate Press, Aldershot, UK, 2006.
- 112S. Hosseini, K. Barker, and J.E. Ramirez-Marquez, A review of definitions and measures of system resilience, Reliab. Eng. Syst. Saf. 145 (2016), 47–61.
- 113S. Hosseini, D. Ivanov, and A. Dolgui, Review of quantitative methods for supply chain resilience analysis, Transp. Res. E: Logist. Transp. Rev. 125 (2019), 285–307.
- 114R. Houthooft, S. Sahhaf, W. Tavernier, F. De Turck, D. Colle, and M. Pickavet, Optimizing robustness in geometric routing via embedding redundancy and regeneration, Networks 66 (2015), 320–334.
- 115D. Huygens, M. Labbé, A.R. Mahjoub, and P. Pesneau, The two-edge connected hop-constrained network design problem: Valid inequalities and branch-and-cut, Networks 49 (2007), 116–133.
- 116S. Iloglu and L.A. Albert, An integrated network design and scheduling problem for network recovery and emergency response, Oper. Res. Perspect. 5 (2018), 218–231.
- 117S. Iloglu and L.A. Albert, A maximal multiple coverage and network restoration problem for disaster recovery, Oper. Res. Perspect. 7 (2020), 100132.
- 118E. Israeli and R.K. Wood, Shortest path network interdiction, Networks 40 (2002), 97–111.
- 119P. Jaillet and M.R. Wagner, “ Online optimization – An introduction,” Risk and Optimization in an Uncertain World, J.J. Hasenbein (ed.), Institute for Operations Research and Management Science, Hanover, MD, 2010, pp. 142–152.
10.1287/educ.1100.0072 Google Scholar
- 120U. Janjarassuk and J. Linderoth, Reformulation and sampling to solve a stochastic network interdiction problem, Networks 52 (2008), 120–132.
- 121H.S. Jeong, J.H. Qiao, D.M. Abraham, M. Lawley, J.-P. Richard, and Y. Yih, Minimizing the consequences of intentional attack on water infrastructure, Comput. Aided Civil Inf. Eng. 21 (2006), 79–92.
- 122M. Jonsson, J. Rak, and A. Somani, Preface: Design of resilient communication networks, Networks 70 (2017), 281–282.
- 123I. Kalesnikau, M. Pióro, M. Poss, D. Nace, and A. Tomaszewski, A robust optimization model for affine/quadratic flow thinning: A traffic protection mechanism for networks with variable link capacity, Networks 75 (2020), 420–437.
- 124T. Kalinowski, D. Matsypura, and M.W.P. Savelsbergh, Incremental network design with maximum flows, Eur. J. Oper. Res. 242 (2015), 51–62.
- 125P. Kaplunovich and K. Turitsyn, Fast and reliable screening of n − 2 contingencies, IEEE Trans. Power Syst. 31 (2016), 4243–4252.
- 126H. Kerivin and A.R. Mahjoub, Design of survivable networks: A survey, Networks 46 (2005), 1–21.
- 127T. Kim, S.J. Wright, D. Bienstock, and S. Harnett, Analyzing vulnerability of power systems with continuous optimization formulations, IEEE Trans. Netw. Sci. Eng. 3 (2016), 132–146.
- 128
U.G. Knight, Power Systems in Emergencies: From Contingency Planning to Crisis Management, Hoboken, NJ, Wiley, 2001.
10.1002/9781118878323 Google Scholar
- 129M. Kucharzak, K. Walkowiak, P. Kopec, D. Bulira, and A. Kasprzak, Integer programming, constraint programming, and metaheuristic approaches for static optimization of anycast flows in elastic optical networks, Networks 66 (2015), 253–266.
- 130Z. Lanir, Fundamental surprises, Decision Research, Eugene, OR, 1986.
- 131G. Laporte, J.A. Mesa, and F. Perea, A game theoretic framework for the robust railway transit network design problem, Transp. Res. B: Methodol. 44 (2010), 447–459.
- 132E.E. Lee, J.E. Mitchell, and W.A. Wallace, Restoration of services in interdependent infrastructure systems: A network flows approach, IEEE Trans. Syst. Man Cybernet. C: Appl. Rev. 37 (2007), 1303–1317.
- 133F. Liberatore, M.P. Scaparra, and M.S. Daskin, Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification, Comput. Oper. Res. 38 (2011), 357–366.
- 134A.L. Liestman, Fault-tolerant broadcast graphs, Networks 15 (1985), 159–171.
- 135T. Lin and Z. Zhou, Robust network function virtualization, Networks 75 (2020), 438–462.
- 136Y. Liu, G. Pedrielli, H. Li, L.H. Lee, C. Chen, and J.F. Shortle, Optimal computing budget allocation for stochastic N − k problem in the power grid system, IEEE Trans. Reliab. 68 (2019), 778–789.
- 137I. Ljubić, P. Mutzel, and B. Zey, Stochastic survivable network design problems: Theory and practice, Eur. J. Oper. Res. 256 (2017), 333–348.
- 138R. Loggins, R.G. Little, J.E. Mitchell, T.C. Sharkey, and W.A. Wallace, CRISIS: Modeling the restoration of interdependent civil and social infrastructure systems following an extreme event, Nat. Hazards Rev. 20 (2019), 04019004.
- 139S.H. Low, A duality model of TCP and queue management algorithms, IEEE/ACM Trans. Netw. 11 (2003), 525–536.
- 140J.T. Margolis, K.M. Sullivan, S.J. Mason, and M. Magagnotti, A multi-objective optimization model for designing resilient supply chain networks, Int. J. Prod. Econ. 204 (2018), 174–185.
- 141L. Martins, T. Gomes, and D. Tipper, Efficient heuristics for determining node-disjoint path pairs visiting specified nodes, Networks 70 (2017), 292–307.
- 142T.C. Matisziw, A.T. Murray, and T.H. Grubesic, Strategic network restoration, Netw. Spatial Econ. 10 (2010), 345–361.
- 143L.R. Matthews, G.E. Gounaris, and I.G. Kevrekidis, Designing networks with resiliency to edge failures using two-stage robust optimization, Eur. J. Oper. Res. 279 (2019), 704–720.
- 144L.-G. Mattsson and E. Jenelius, Vulnerability and resilience of transport systems – A discussion of recent research, Transp. Res. A: Policy Pract. 81 (2015), 16–34.
- 145A.W. McMasters and T.M. Mustin, Optimal interdiction of a supply network, Nav. Res. Logist. 17 (1970), 261–268.
- 146D. Mendonça and W.A. Wallace, Factors underlying organizational resilience: The case of electric power restoration in New York City after 11 September 2001, Reliab. Eng. Syst. Saf. 141 (2015), 83–91.
- 147S.B. Miles, H.V. Burton, and H. Kang, Community of practice for modeling disaster recovery, Nat. Hazards Rev. 20 (2018), 04018023.
- 148E. Miller-Hooks, Adaptive least-expected time paths in stochastic, time-varying transportation and data networks, Networks 37 (2001), 35–52.
- 149P.M. Murray-Tuite and X.A. Fei, A methodology for assessing transportation network terrorism risk with attacker and defender interactions, Comput. Aided Civil Inf. Eng. 25 (2010), 396–410.
- 150K. Myslitski, J. Rak, and L. Kuszner, Toward fast calculation of communication paths for resilient routing, Networks 70 (2017), 308–326.
- 151C. Natalino, A. de Sousa, L. Wosinska, and M. Furdek, Content placement in 5G-enabled edge/core data center networks resilient to link cut attacks, Networks 75 (2020), 392–404.
- 152 National Research Council, 2012. Disaster resilience: A national imperative. https://doi.org/10.17226/13457.
- 153C. Nemeth, R. Wears, D. Woods, E. Hollnagel, and R. Cook, “Minding the gaps: Creating resilience in health care,” Advances in Patient Safety: New Directions and Alternative Approaches (Vol. 3: Performance and Tools), Agency for Healthcare Research and Quality (US), 2008.
- 154G. Nemeth and G. Retvari, Rate-adaptive multipath routing: Distributed, centralized, and hybrid architectures, Networks 66 (2015), 118–135.
- 155N. Ni, B.J. Howell, and T.C. Sharkey, Modeling the impact of unmet demand in supply chain resiliency planning, Omega 81 (2018), 1–18.
- 156P.J. Nicholas and D.L. Alderson, Fast design of wireless mesh networks to defend against worst-case jamming, Mil. Oper. Res. 23 (2018), 5–20.
- 157S.G. Nurre and T.C. Sharkey, Integrated network design and scheduling problems with parallel identical machines: Complexity results and dispatching rules, Networks 63 (2014), 306–326.
- 158S.G. Nurre and T.C. Sharkey, Online scheduling problems with flexible release dates: Applications to infrastructure restoration, Comput. Oper. Res. 92 (2018), 1–16.
- 159S.G. Nurre, B. Cavdaroglu, J.E. Mitchell, T.C. Sharkey, and W.A. Wallace, Restoring infrastructure systems: An integrated network design and scheduling problem, Eur. J. Oper. Res. 223 (2012), 794–806.
- 160F. Ordonez and J. Zhao, Robust capacity expansion of network flows, Networks 50 (2007), 136–145.
- 161
F.P.B. Osinga, Science, Strategy and War: The Strategic Theory of John Boyd, New York, Routledge, 2007.
10.4324/9780203088869 Google Scholar
- 162M. Ouyang, Review on modeling and simulation of interdependent critical infrastructure systems, Reliab. Eng. Syst. Saf. 121 (2014), 43–60.
- 163M. Ouyang, A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks, Eur. J. Oper. Res. 262 (2017), 1072–1084.
- 164M. Ouyang and Y. Fang, A mathematical framework to optimize critical infrastructure resilience against intentional attacks, Comput. Aided Civil Inf. Eng. 32 (2017), 909–929.
- 165F. Pan and D.P. Morton, Minimizing a stochastic maximum-reliability path, Networks 52 (2008), 111–119.
- 166A. Papachristodoulou, L. Li, and J.C. Doyle, Methodological frameworks for large-scale network analysis and design, Comput. Commun. Rev. 34 (2004), 7–20.
- 167D. Papadimitriou and B. Fortz, A rolling horizon heuristic for the multiperiod network design and routing problem, Networks 66 (2015), 364–379.
- 168J. Park, T.P. Seager, P.S.C. Rao, M. Convertino, and I. Linkov, Integrating risk and resilience approaches to catastrophe management in engineering systems, Risk Anal. 33 (2013), 356–367.
- 169A. Pasic, P. Babarczi, and J. Tapolcai, Unambiguous switching link group failure localization in all-optical networks, Networks 70 (2017), 327–341.
- 170R. Patriarca, J. Bergstrom, G. Di Gravio, and F. Costantino, Resilience engineering: Current status of the research and future challenges, Saf. Sci. 102 (2018), 79–100.
- 171B.S. Pay, J.R.W. Merrick, and Y. Song, Stochastic network interdiction with incomplete preference, Networks 73 (2019), 3–22.
- 172M. Poss and C. Raack, Affine recourse for the robust network design problem: Between static and dynamic routing, Networks 61 (2013), 180–198.
- 173D.K. Pradhan and F.J. Meyer, Communication structures in fault-tolerant distributed systems, Networks 23 (1993), 379–389.
- 174R. Rahmaniani, T.G. Crainic, M. Gendreau, and W. Rei, Accelerating the Benders decomposition method: Application to stochastic network design problems, SIAM J. Optim. 28 (2018), 875–903.
- 175J. Rak and J.P.G. Sterbenz, Preface: Optimization issues in resilient network design and modeling, Networks 66 (2015), 251–252.
- 176J. Rak, P.E. Heegaard, and B.E. Helvik, Resilience of communication networks to random failures and disasters: An optimization perspective, Networks 75 (2020), 337–339.
- 177A.W. Righi, T.A. Saurin, and P. Wachs, A systematic literature review of resilience engineering: Research areas and a research agenda proposal, Reliab. Eng. Syst. Saf. 141 (2015), 142–152.
- 178S.M. Rinaldi, J.P. Peerenboom, and T.K. Kelly, Identifying, understanding, and analyzing critical infrastructure interdependencies, IEEE Control Syst. Mag. 21 (2001), 11–25.
- 179C.M. Rocco, J.E. Ramirez-Marquez, D.E. Salazar, and C. Yajure, Assessing the vulnerability of a power system through a multiple objective contingency screening approach, IEEE Trans. Reliab. 60 (2011), 394–403.
- 180M. Rysz, P.A. Krokhmal, and E.L. Pasiliao, Detecting resilient structures in stochastic networks: A two-stage stochastic optimization approach, Networks 69 (2017), 189–204.
- 181J. Salmerón, Deception tactics for network interdiction: A multiobjective approach, Networks 60 (2012), 45–58.
- 182J. Salmerón and R.K. Wood, The value of recovery transformers in protecting an electric transmission grid against attack, IEEE Trans. Power Syst. 30 (2015), 96–104.
- 183J. Salmerón, R.K. Wood, and R. Baldick, Analysis of electric grid security under terrorist threat, IEEE Trans. Power Syst. 19 (2004), 905–912.
- 184J. Salmerón, R.K. Wood, and R. Baldick, Worst-case interdiction analysis of large-scale electric power grids, IEEE Trans. Power Syst. 24 (2009), 96–104.
- 185E. Sanci and M.S. Daskin, Integrating location and network restoration decisions in relief networks under uncertainty, Eur. J. Oper. Res. 279 (2019), 335–350.
- 186H. Sarhadi, D.M. Tulett, and M. Verma, An analytical approach to the protection planning of a rail intermodal terminal network, Eur. J. Oper. Res. 257 (2017), 511–525.
- 187T.A. Saurin and N.J.B. Werle, A framework for the analysis of slack in socio-technical systems, Reliab. Eng. Syst. Saf. 167 (2017), 439–451.
- 188M.P. Scaparra and R.L. Church, An exact solution approach for the interdiction median problem with fortification, Eur. J. Oper. Res. 189 (2008), 76–92.
- 189M. Scheffer, S.R. Carpenter, T.M. Lenton, J. Bascompte, W. Brock, V. Dakos, J. Van de Koppel, I.A. Van de Leemput, S.A. Levin, E.H. Van Nes, M. Pascual, and J. Vandermeer, Anticipating critical transitions, Science 338 (2012), 344–348.
- 190M. Schmitz, V.J. Garcia, and D.P. Bernardon, Matheuristic for emergency response in the electric distribution system with unforeseen islanding, Electr. Power Syst. Res. 169 (2019), 1–17.
- 191K.M. Schumacher, A.E.M. Cohn, and R.L.-Y. Chen, Algorithm for the n − 2 security-constrained unit commitment problem with transmission switching, INFORMS J. Comput. 29 (2017), 645–659.
- 192
T.P. Seager, S.S. Clark, D.A. Eisenberg, J.E. Thomas, M.M. Hinrichs, R. Kofronand, C.N. Jensen, L.R. McBurnett, M. Snell, and D.L. Alderson, “ Redesigning resilient infrastructure research,” Resilience and Risk, I. Linkov and J.M. Palma-Oliveira (eds), Heidelberg, Germany, Springer, 2017, pp. 81–119.
10.1007/978-94-024-1123-2_3 Google Scholar
- 193J.A. Sefair and J.C. Smith, Dynamic shortest-path interdiction, Networks 68 (2016), 315–330.
- 194J.A. Sefair and J.C. Smith, Exact algorithms and bounds for the dynamic assignment interdiction problem, Nav. Res. Logist. 64 (2017), 373–387.
- 195A. Sen, A. Mazumder, S. Banerjee, A. Das, C. Zhou, and S. Shirazipourazad, Region-based fault-tolerant distributed file storage system design in networks, Networks 66 (2015), 380–395.
- 196T.C. Sharkey, B. Cavdaroglu, H. Nguyen, J. Mitchell, and W. Wallace, Interdependent network restoration: On the value of information-sharing, Eur. J. Oper. Res. 244 (2015), 309–321.
- 197T.C. Sharkey, S.G. Nurre, H. Nguyen, J.H. Chow, J.E. Mitchell, and W.A. Wallace, Identification and classification of restoration interdependencies in the wake of Hurricane Sandy, J. Infrastruct. Syst. 22 (2016), 04015007.
- 198S. Shen and J.C. Smith, Polynomial-time algorithms for solving a class of critical node problems on trees and series-parallel graphs, Networks 60 (2012), 103–119.
- 199J. Silva, T. Gomes, D. Tipper, L. Martins, and V. Kounev, An effective algorithm for computing all-terminal reliability bounds, Networks 66 (2015), 282–295.
- 200M. Silva, M. Poss, and N. Maculan, Solving the bifurcated and nonbifurcated robust network loading problem with k-adaptive routing, Networks 72 (2018), 151–170.
- 201A.M. Smith, A.D. González, L. Dueñas-Osorio, and R.M. D'Souza, Interdependent network recovery games, Risk Anal. 40 (2020), 134–152.
- 202J.C. Smith and Y. Song, A survey of network interdiction models and algorithms, Eur. J. Oper. Res. 283 (2020), 797–811.
- 203L.V. Snyder, Facility location under uncertainty: A review, IIE Trans. 38 (2006), 537–554.
- 204L.V. Snyder, Z. Atan, P. Peng, Y. Rong, A.J. Schmitt, and B. Sinsoysal, OR/MS models for supply chain disruptions: A review, IIE Trans. 48 (2016), 89–109.
- 205K. Sundar, C. Coffrin, H. Nagarajan, and R. Bent, Probabilistic N − k failure-identification for power systems, Networks 71 (2018), 302–321.
- 206Y. Tan, A.K. Das, P. Arabshahi, and D.S. Kirschen, Distribution systems hardening against natural disasters, IEEE Trans. Power Syst. 33 (2018), 6849–6860.
- 207Y. Tan, F. Qiu, A.K. Das, D.S. Kirschen, P. Arabshahi, and J. Wang, Scheduling post-disaster repairs in electricity distribution networks, IEEE Trans. Power Syst. 34 (2019), 2611–2621.
- 208S.E. Terblanche, R. Wessaly, and J.M. Hattingh, Survivable network design with demand uncertainty, Eur. J. Oper. Res. 210 (2011), 10–26.
- 209 J.E. Thomas, D.A. Eisenberg, T.P. Seager, and E. Fisher, A resilience engineering approach to integrating human and socio-technical system capacities and processes for national infrastructure resilience, J. Homeland Secur. Emerg. Manage. 16 (2019).
- 210E.L. Tucker, M.S. Daskin, B.V. Sweet, and W.J. Hopp, Incentivizing resilient supply chain design to prevent drug shortages: Policy analysis using two- and multi-stage stochastic programs, IISE Trans. 52 (2020), 394–412.
- 211A. Ulusan and O. Ergun, Restoration of services in disrupted infrastructure systems: A network science approach, PLoS ONE 13 (2018), e0192272.
- 212B. Vass, L. Németh, and J. Tapolcai, The Earth is nearly flat: Precise and approximate algorithms for detecting vulnerable regions of networks in the plane and on the sphere, Networks 75 (2020), 340–355.
- 213Q. Wang, J. Watson, and Y. Guan, Two-stage robust optimization for N − k contingency-constrained unit commitment, IEEE Trans. Power Syst. 28 (2013), 2366–2375.
- 214Y. Wang and R. Baldick, Interdiction analysis of electric grids combining cascading outage and medium-term impacts, IEEE Trans. Power Syst. 29 (2014), 2160–2168.
- 215Y. Wang, C. Chen, J. Wang, and R. Baldick, Research on resilience of power systems under natural disasters – A review, IEEE Trans. Power Syst. 31 (2016), 1604–1613.
- 216R. Wollmer, Removing arcs from a network, Oper. Res. 12 (1964), 934–940.
- 217R.K. Wood, Deterministic network interdiction, Math. Comput. Model. 17 (1993), 1–18.
- 218
D.D. Woods, “ Essentials of resilience, revisited. Chapter 4,” Handbook on Resilience of Socio-Technical Systems, M. Ruth and S. Goessling-Reisemann (eds), Northampton, MA, Edward Elgar Publishing, 2019.
10.4337/9781786439376.00009 Google Scholar
- 219D.D. Woods, Risk and human performance: Measuring the potential for disaster, Reliab. Eng. Syst. Saf. 29 (1990), 387–405.
- 220D.D. Woods, Four concepts for resilience and the implications for the future of resilience engineering, Reliab. Eng. Syst. Saf. 141 (2015), 5–9.
- 221D.D. Woods, The theory of graceful extensibility: Basic rules that govern adaptive systems, Environ. Syst. Decis. 38 (2018), 433–457.
10.1007/s10669-018-9708-3 Google Scholar
- 222 D.D. Woods and M. Branlat, “ Basic patterns in how adaptive systems fail,” Resilience Engineering Perspectives Volume 3: Resilience Engineering in Practice, E. Hollnagel, J. Pariès, D.D. Woods, and J. Wreathall (eds), Surrey, UK, Ashgate, 2011, pp. 127–144.
- 223D.D. Woods and J. Wreathall, Stress-strain plots as a basis for assessing system resilience, Resilience Eng. Perspect. 1 (2008), 145–161.
- 224D.D. Woods, Y.J. Chan, and J. Wreathall, The stress–strain model of resilience operationalizes the four cornerstones of resilience engineering, 5th Resilience Engineering Symposium, 2014, pp. 17–22.
- 225S. Yang, S. Trajanovski, and F.A. Kuipers, Availability-based path selection and network vulnerability assessment, Networks 66 (2015), 306–319.
- 226I. Yanıkoglu, B.L. Gorissen, and D. den Hertog, A survey of adjustable robust optimization, Eur. J. Oper. Res. 277 (2019), 799–813.
- 227W. Yuan, L. Zhao, and B. Zeng, Optimal power grid protection through a defender-attacker-defender model, Reliab. Eng. Syst. Saf. 121 (2014), 83–89.
- 228X.-Y. Zhang, Z. Zheng, and K.-Y. Cai, A fortification model for decentralized supply systems and its solution algorithms, IEEE Trans. Reliab. 67 (2018), 381–400.
- 229S. Zhao, Y. Zou, X. Lin, D. Aliprantis, H. Villegas, M. Chen, and A. Castillo, Leveraging generators with complementary capabilities for robust multi-stage power grid operations, IEEE Trans. Control Netw. Syst. 7 (2020), 1441–1452.