Protecting your critical network infrastructure through robust system design

Ivan Hernandez, Jose Emmanuel Ramirez-Marquez, Edward A. Pohl

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    Recent natural disasters around the country and the world have forced local, state and federal governments to reexamine their critical infrastructure and assess its resilience to man-made and natural disasters. In this paper, we explore strategies for creating robust supply chain networks that are resilient to disruptions. The paper explores the robustness of the supply chain network by making tradeoffs between performance before disruptions occur and after disruptions occur. Specifically, total distance before and after failures are weighed against the costs associated with opening more facilities. In this paper, with the use of Monte-Carlo simulation and visualization techniques we present an approach that allows decision makers to understand how the failure of facilities impacts their distance.

    Original languageEnglish
    Title of host publicationInternational Annual Conference of the American Society for Engineering Management 2013, ASEM 2013
    Pages111-117
    Number of pages7
    StatePublished - 2013
    EventInternational Annual Conference of the American Society for Engineering Management 2013, ASEM 2013 - Minneapolis, MN, United States
    Duration: 3 Oct 20135 Oct 2013

    Publication series

    NameInternational Annual Conference of the American Society for Engineering Management 2013, ASEM 2013

    Conference

    ConferenceInternational Annual Conference of the American Society for Engineering Management 2013, ASEM 2013
    Country/TerritoryUnited States
    CityMinneapolis, MN
    Period3/10/135/10/13

    Keywords

    • Critical infrastructure
    • Facility location
    • Multi-objective optimization
    • Supply chain resilience

    Fingerprint

    Dive into the research topics of 'Protecting your critical network infrastructure through robust system design'. Together they form a unique fingerprint.

    Cite this