مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

279
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Providing the Pattern for the Prioritization of Critical Infrastructures in Targeted Attacks

Pages

  77-95

Abstract

 The pattern of war has been changed in ever more deadly ways as modern and intelligent weapons and more destructive specifications have been taken recently. The potential enemies are trying to attack the important centers and destroy Critical Infrastructures at the local or national level in new wars. The main purpose of this study is to identify the major infrastructures assets which are located in a geographical areas that could be affected by any incident and also have inherent specification of high attractiveness for the enemies and the proposed model is very different with the classification issue of vital, sensitive, and Important of the passive defense organization. The five main criteria includes; (1) passive defense considerations, (2) surrounding environment of infrastructure, (3) fundamental specifications of infrastructure, (4) attack consequences, and (5) dependency The score and weight are assigned to each criterion in which those values show the importance of a structure in the desired rank. A higher score means there is higher attack potential by enemies. It should be noted, in order to analyze the data and research outputs, the inferential statistical analysis was performed. Initially, by using the Kruskal-Wallis Test, similarities between the weights of experts were analyzed and 22 criteria based on the similarity of answers were confirmed. Finally, by using principal component analysis (PCA), the important criteria of secondary in each of the main criteria were determined.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    ESKANDARI, MOHAMMAD, OMIDVAR, BABAK, MODIRI, MAHDI, & NEKOOIE, MOHAMMAD ALI. (2020). Providing the Pattern for the Prioritization of Critical Infrastructures in Targeted Attacks. EMERGENCY MANAGEMENT, 8(16 ), 77-95. SID. https://sid.ir/paper/403632/en

    Vancouver: Copy

    ESKANDARI MOHAMMAD, OMIDVAR BABAK, MODIRI MAHDI, NEKOOIE MOHAMMAD ALI. Providing the Pattern for the Prioritization of Critical Infrastructures in Targeted Attacks. EMERGENCY MANAGEMENT[Internet]. 2020;8(16 ):77-95. Available from: https://sid.ir/paper/403632/en

    IEEE: Copy

    MOHAMMAD ESKANDARI, BABAK OMIDVAR, MAHDI MODIRI, and MOHAMMAD ALI NEKOOIE, “Providing the Pattern for the Prioritization of Critical Infrastructures in Targeted Attacks,” EMERGENCY MANAGEMENT, vol. 8, no. 16 , pp. 77–95, 2020, [Online]. Available: https://sid.ir/paper/403632/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top