Inicio  /  Water  /  Vol: 8 Núm: 1 Par: 2 (2016)  /  Artículo
ARTÍCULO
TITULO

Identifying the Vulnerabilities of Working Coasts Supporting Critical Energy Infrastructure

David E. Dismukes    
Siddhartha Narra    

Resumen

The U.S. Gulf of Mexico (GOM) is an excellent example of a working coast that supports a considerable degree of critical energy infrastructure across several sectors (crude oil, natural gas, electric power, petrochemicals) and functionalities (production, processing/refining, transmission, distribution). The coastal communities of the GOM form a highly productive and complicated human, physical, and natural environment that interacts in ways that are unlike anywhere else around the globe. This paper formulates a Coastal Infrastructure Vulnerability Index (CIVI) that characterizes interactions between energy assets and the physical and human aspects of GOM communities to identify and prioritize, using a multi-dimensional index, coastal vulnerability. The CIVI leads to results that are significantly different than traditional methods and serves as an alternative, and potentially more useful tool for coastal planning and policy, particularly in those areas characterized by very high infrastructure concentrations.

 Artículos similares

       
 
Liang Chen, Xingrong Lu, Daping Deng, Mehdi Kouhdarag and Yimin Mao    
Our study focuses on the dynamic transient analysis of arched beam bridges over rivers, which face unique geohazards and challenges, including vibrations and dynamic loads that can affect structural integrity. The finite element software ANSYS v. 19.3 wa... ver más
Revista: Water

 
Ammar Alazab, Ansam Khraisat, Moutaz Alazab and Sarabjot Singh    
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal thei... ver más
Revista: Future Internet

 
Zehan Chen, Yuliang Lu, Kailong Zhu, Lu Yu and Jiazhen Zhao    
Fuzzing is one of the most successful software testing techniques used to discover vulnerabilities in programs. Without seeds that fit the input format, existing runtime dependency recognition strategies are limited by incompleteness and high overhead. I... ver más
Revista: Applied Sciences

 
Rohit Akhilesh, Oliver Bills, Naveen Chilamkurti and Mohammad Jabed Morshed Chowdhury    
Security testing is fundamental to identifying security vulnerabilities on smart home-based IoT devices. For this, penetration testing is the most prominent and effective solution. However, testing the IoT manually is cumbersome and time-consuming. In ad... ver más
Revista: Future Internet

 
Milad Memarzadeh, Ata Akbari Asanjan and Bryan Matthews    
Identifying safety anomalies and vulnerabilities in the aviation domain is a very expensive and time-consuming task. Currently, it is accomplished via manual forensic reviews by subject matter experts (SMEs). However, with the increase in the amount of d... ver más
Revista: Aerospace