scispace - formally typeset
M

M. Naceur Azaiez

Researcher at Tunis University

Publications -  5
Citations -  33

M. Naceur Azaiez is an academic researcher from Tunis University. The author has contributed to research in topics: Survivability & Shortest path problem. The author has an hindex of 2, co-authored 5 publications receiving 24 citations.

Papers
More filters
Journal ArticleDOI

Systems under attack-survivability rather than reliability: Concept, results, and applications

TL;DR: This paper introduces the concept of system survivability under attack in analogy with system reliability, and provides the expected number of attacks for each system configuration based on the particular attack strategy both for single and multiple attacks.
Journal ArticleDOI

System survivability in the context of interdiction networks

TL;DR: This work separates two types of network survivability related to the follower and to the leader of the network, respectively, and derives a number of results both under the cases of full and absence of knowledge.
Journal ArticleDOI

Attack Strategies on Networks With a Budget Constraint

TL;DR: In this article, the problem of identifying the k most vital cut-sets of a network under limited attacking resources in a network interdiction context is studied, and three different versions of the problem, each having a different objective: namely, the highest probability of a successful attack, the least cost attack, and the least expected cost attack combining both success probability and attacking cost are treated.
Book ChapterDOI

An Exact Method for Solving a Least-Cost Attack on Networks

TL;DR: This chapter proposes an exact solution under a budget constraint accounting for a threshold of success probability of the attack on targeted cut sets of a network-interdiction framework with a single source and a single destination.
Journal ArticleDOI

Optimal k Cut-Sets in Attack/Defense Strategies on Networks

TL;DR: The paper investigates the most critical k cut-sets to target in the context of attacks on networks and develops an algorithm for each case with illustrations, which explores the large scale of networks and offers guidelines on the corresponding defensive strategies.