Risk and vulnerability analysis of critical infrastructure

Kaiyu Wan, Vangalur Alagar*

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review


A nation’s Critical Infrastructures (CI) is vital to the trustworthy functioning of the economic, health care, and social sectors of the nation. Any disruption to CI will adversely affect the economy, and peaceful functioning of the government. Above all, it will adversely affect the morale and confidence of the citizens. Hence, protecting CI of a nation must be given top priority. Fundamental to protection mechanisms are risk and vulnerability analysis. Based on their outcomes protection mechanisms can be planned, designed, and implemented. In this paper we offer a concise template representation for critical assets, and explain a methodology for vulnerability assessment and risk analysis. We point out the potential role of agents, and deep learning methods in the development and commissioning of future cyber defense solutions.

Original languageEnglish
Title of host publicationIntelligent Computing Methodologies - 12th International Conference, ICIC 2016, Proceedings
EditorsAbir Hussain, Kyungsook Han, De-Shuang Huang
PublisherSpringer Verlag
Number of pages13
ISBN (Print)9783319422961
Publication statusPublished - 2016
Event12th International Conference on Intelligent Computing Methodologies, ICIC 2016 - Lanzhou, China
Duration: 2 Aug 20165 Aug 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference12th International Conference on Intelligent Computing Methodologies, ICIC 2016


  • Agent system
  • Critical infrastructure
  • Deep learning
  • Risk analysis
  • Vulnerability analysis


Dive into the research topics of 'Risk and vulnerability analysis of critical infrastructure'. Together they form a unique fingerprint.

Cite this