Abstract
This paper examines how the use of spatial analysis techniques and geographic information systems may assist in developing a more complete understanding of underlying solutions trends and properties in complex optimization problems. In the model, an attacker with multiple attractive targets and multiple entry points into the region attempts to find a complete network path offering the highest probability of non-detection by a defender who has allocated detection resources to reduce arc non-detection and who wishes to minimize this maximum attacker path (this problem is a direct variant of the shortest path network interdiction problem). This paper introduces spatial analysis techniques to analyze defender resource allocation and attacker path selection in two sample networks (Lancaster-Palmdale, California and Northridge, California). The resulting discussion begins to examine how network diversity and other problem parameters can impact observed defender/attacker solutions and illustrates the importance of this knowledge in the making and evaluating of governmental and public policy decisions.
Similar content being viewed by others
References
Anselin, L. (1995). Local indicators of spatial association—LISA. Geographical Analysis, 27, 93–115.
Bard, J. (1998). Practical bilevel optimization; algorithms and applications. Boston: Kluwer Academic.
Bayrak, H., & Baily, M. (2008). Shortest path network interdiction with asymmetric information. Networks, 52(3), 133–140.
Bier, V., Haphuriwat, N., Zimmerman, J., Menoyo, R., & Culpen, A. (2008). Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis, 28(3), 763–770.
Brown, G., Carlyle, M., Salmeron, J., & Wood, K. (2006). Defending critical infrastructure. Interfaces, 36(6), 530–544.
Department of Homeland Security. (2007). Transportation systems: Critical infrastructure and key resources sector-specific plan as input to th eNational Infrastructure Protection Plan.
Department of Homeland Security. (2008). Homeland security advisory system. http://www.dhs.gov/xinfoshare/programs/Copy_of_press_release_0046.shtm (accessed April 18, 2008).
Getis, A., & Ord, J. K. (1996). The analysis of spatial association by use of distance statistics. Geographical Analysis, 24(3), 189–206.
Grubesic, T. (2010). Sex offender clusters. Applied Geography, 30, 2–18.
Israeli, E., & Wood, K. (2002). Shortest-path network interdiction. Networks, 40(2), 97–111.
Kies, U., Mrosek, T., & Schulte, A. (2009). Spatial analysis of regional industrial clusters in the German forest sector. International Forestry Review, 11(1), 38–51.
Lim, C., & Smith, J. C. (2007). Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Transactions, 39, 15–26.
List, G., Mirchandani, P., Turnquist, M., & Zografos, K. (1991). Modeling and analysis for hazardous materials transportation: Risk analysis, routing/scheduling and facility location. Transportation Science 25, no. 2.
Montgomery, D. (2001). Design and analysis of experiments. New York City: Wiley.
Nemhauser, G., & Wolsey, L. (1999). Integer and combinatorial optimization. New York: Wiley-Interscience.
U.S. Census Bureau. (2008). TIGER/Line and TIGER-related products. http://www.census.gov/geo/www/tiger/ (accessed August 1, 2008).
Willis, H. (2007). Guiding resource allocations based on terrorism risk. Risk Analysis, 27(3), 597–606.
Zhang, T., Madhani, S., Berg, E. V. D., & Mohanty, S. (2005). Sensor on patrol (SOP): Using mobile sensors to detect potential airborn nuclear, biological, and chemical attacks. Military Communications Conference 2005, MILCOM 2005. IEEE. 2924–2929.
Zhuang, J., & Bier, V. (2007). Balancing terrorism and natural disasters—defensive strategy with endogenous attacker effect. Operations Research, 55(5), 976–991.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yates, J., Casas, I. Role of Spatial Data in the Protection of Critical Infrastructure and Homeland Defense. Appl. Spatial Analysis 5, 1–23 (2012). https://doi.org/10.1007/s12061-010-9057-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12061-010-9057-1