Analyzing vulnerabilities of the German highspeed train network using quantitative graph theory Article Swipe
YOU?
·
· 2018
· Open Access
·
· DOI: https://doi.org/10.2495/safe-v8-n1-59-64
The German high-speed train system (ICE) as one of the critical infrastructures is mapped into a distance-weighted undirected network.The aim of the analysis is to make full use of quantitative graph theory in order to analyze the vulnerabilities of the network and to detect the centers and hubs of the system.When conducting network analysis of railways, there is a tradition of such an analysis that the betweenness centrality measure and the efficiency measure would be applied; however, based on these two measures, we offer a new promising one that we call betweenness-efficiency vulnerability measure, which can be used to detect the most vulnerable nodes on an aggregated level.By analyzing and comparing the results of these three measures, highly vulnerable stations are identified, which therefore have more potential to harm the overall system in case of disruption.This can help decision-makers to understand the structure, behavior and vulnerabilities of the network more directly from the point of view of quantitative graph theory.Finally, the problem of adapting a new vulnerability measure to this kind of system is discussed.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.2495/safe-v8-n1-59-64
- http://www.witpress.com/Secure/ejournals/papers/SSE080107f.pdf
- OA Status
- bronze
- Cited By
- 2
- References
- 9
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2771289990
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2771289990Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.2495/safe-v8-n1-59-64Digital Object Identifier
- Title
-
Analyzing vulnerabilities of the German highspeed train network using quantitative graph theoryWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2018Year of publication
- Publication date
-
2018-01-01Full publication date if available
- Authors
-
Zhong Lin Wang, Martin Zsifkovits, Stefan PicklList of authors in order
- Landing page
-
https://doi.org/10.2495/safe-v8-n1-59-64Publisher landing page
- PDF URL
-
https://www.witpress.com/Secure/ejournals/papers/SSE080107f.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://www.witpress.com/Secure/ejournals/papers/SSE080107f.pdfDirect OA link when available
- Concepts
-
Computer science, German, Graph theory, Graph, Computer security, Computer network, Theoretical computer science, Mathematics, Geography, Combinatorics, ArchaeologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2023: 1, 2021: 1Per-year citation counts (last 5 years)
- References (count)
-
9Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2771289990 |
|---|---|
| doi | https://doi.org/10.2495/safe-v8-n1-59-64 |
| ids.doi | https://doi.org/10.2495/safe-v8-n1-59-64 |
| ids.mag | 2771289990 |
| ids.openalex | https://openalex.org/W2771289990 |
| fwci | 0.16849433 |
| type | article |
| title | Analyzing vulnerabilities of the German highspeed train network using quantitative graph theory |
| biblio.issue | 1 |
| biblio.volume | 8 |
| biblio.last_page | 64 |
| biblio.first_page | 59 |
| topics[0].id | https://openalex.org/T10064 |
| topics[0].field.id | https://openalex.org/fields/31 |
| topics[0].field.display_name | Physics and Astronomy |
| topics[0].score | 0.991599977016449 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/3109 |
| topics[0].subfield.display_name | Statistical and Nonlinear Physics |
| topics[0].display_name | Complex Network Analysis Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.6112727522850037 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C154775046 |
| concepts[1].level | 2 |
| concepts[1].score | 0.5864027738571167 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q188 |
| concepts[1].display_name | German |
| concepts[2].id | https://openalex.org/C88230418 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5249707102775574 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q131476 |
| concepts[2].display_name | Graph theory |
| concepts[3].id | https://openalex.org/C132525143 |
| concepts[3].level | 2 |
| concepts[3].score | 0.428602397441864 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q141488 |
| concepts[3].display_name | Graph |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.3951638340950012 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C31258907 |
| concepts[5].level | 1 |
| concepts[5].score | 0.37509623169898987 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[5].display_name | Computer network |
| concepts[6].id | https://openalex.org/C80444323 |
| concepts[6].level | 1 |
| concepts[6].score | 0.2421647012233734 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[6].display_name | Theoretical computer science |
| concepts[7].id | https://openalex.org/C33923547 |
| concepts[7].level | 0 |
| concepts[7].score | 0.1522396206855774 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[7].display_name | Mathematics |
| concepts[8].id | https://openalex.org/C205649164 |
| concepts[8].level | 0 |
| concepts[8].score | 0.05960303544998169 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q1071 |
| concepts[8].display_name | Geography |
| concepts[9].id | https://openalex.org/C114614502 |
| concepts[9].level | 1 |
| concepts[9].score | 0.052218735218048096 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q76592 |
| concepts[9].display_name | Combinatorics |
| concepts[10].id | https://openalex.org/C166957645 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q23498 |
| concepts[10].display_name | Archaeology |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.6112727522850037 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/german |
| keywords[1].score | 0.5864027738571167 |
| keywords[1].display_name | German |
| keywords[2].id | https://openalex.org/keywords/graph-theory |
| keywords[2].score | 0.5249707102775574 |
| keywords[2].display_name | Graph theory |
| keywords[3].id | https://openalex.org/keywords/graph |
| keywords[3].score | 0.428602397441864 |
| keywords[3].display_name | Graph |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.3951638340950012 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/computer-network |
| keywords[5].score | 0.37509623169898987 |
| keywords[5].display_name | Computer network |
| keywords[6].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[6].score | 0.2421647012233734 |
| keywords[6].display_name | Theoretical computer science |
| keywords[7].id | https://openalex.org/keywords/mathematics |
| keywords[7].score | 0.1522396206855774 |
| keywords[7].display_name | Mathematics |
| keywords[8].id | https://openalex.org/keywords/geography |
| keywords[8].score | 0.05960303544998169 |
| keywords[8].display_name | Geography |
| keywords[9].id | https://openalex.org/keywords/combinatorics |
| keywords[9].score | 0.052218735218048096 |
| keywords[9].display_name | Combinatorics |
| language | en |
| locations[0].id | doi:10.2495/safe-v8-n1-59-64 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2764921799 |
| locations[0].source.issn | 2041-9031, 2041-904X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2041-9031 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Safety and Security Engineering |
| locations[0].source.host_organization | https://openalex.org/P4310312982 |
| locations[0].source.host_organization_name | International Information and Engineering Technology Association |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310312982 |
| locations[0].source.host_organization_lineage_names | International Information and Engineering Technology Association |
| locations[0].license | |
| locations[0].pdf_url | http://www.witpress.com/Secure/ejournals/papers/SSE080107f.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Safety and Security Engineering |
| locations[0].landing_page_url | https://doi.org/10.2495/safe-v8-n1-59-64 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5100376569 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-5530-0380 |
| authorships[0].author.display_name | Zhong Lin Wang |
| authorships[0].countries | DE |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I40527276 |
| authorships[0].affiliations[0].raw_affiliation_string | Institute for Theoretical Computer Science, Mathematics and Operations Research, Universität der Bundeswehr München, Germany. |
| authorships[0].institutions[0].id | https://openalex.org/I40527276 |
| authorships[0].institutions[0].ror | https://ror.org/05kkv3f82 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I1315109972, https://openalex.org/I40527276, https://openalex.org/I4387152969 |
| authorships[0].institutions[0].country_code | DE |
| authorships[0].institutions[0].display_name | Universität der Bundeswehr München |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Zhonglin Wang |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Institute for Theoretical Computer Science, Mathematics and Operations Research, Universität der Bundeswehr München, Germany. |
| authorships[1].author.id | https://openalex.org/A5068802227 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Martin Zsifkovits |
| authorships[1].countries | DE |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I40527276 |
| authorships[1].affiliations[0].raw_affiliation_string | Institute for Theoretical Computer Science, Mathematics and Operations Research, Universität der Bundeswehr München, Germany. |
| authorships[1].institutions[0].id | https://openalex.org/I40527276 |
| authorships[1].institutions[0].ror | https://ror.org/05kkv3f82 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I1315109972, https://openalex.org/I40527276, https://openalex.org/I4387152969 |
| authorships[1].institutions[0].country_code | DE |
| authorships[1].institutions[0].display_name | Universität der Bundeswehr München |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Martin Zsifkovits |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Institute for Theoretical Computer Science, Mathematics and Operations Research, Universität der Bundeswehr München, Germany. |
| authorships[2].author.id | https://openalex.org/A5069985968 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-5549-6259 |
| authorships[2].author.display_name | Stefan Pickl |
| authorships[2].countries | DE |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I40527276 |
| authorships[2].affiliations[0].raw_affiliation_string | Institute for Theoretical Computer Science, Mathematics and Operations Research, Universität der Bundeswehr München, Germany. |
| authorships[2].institutions[0].id | https://openalex.org/I40527276 |
| authorships[2].institutions[0].ror | https://ror.org/05kkv3f82 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I1315109972, https://openalex.org/I40527276, https://openalex.org/I4387152969 |
| authorships[2].institutions[0].country_code | DE |
| authorships[2].institutions[0].display_name | Universität der Bundeswehr München |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Stefan W. Pickl |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Institute for Theoretical Computer Science, Mathematics and Operations Research, Universität der Bundeswehr München, Germany. |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | http://www.witpress.com/Secure/ejournals/papers/SSE080107f.pdf |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Analyzing vulnerabilities of the German highspeed train network using quantitative graph theory |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10064 |
| primary_topic.field.id | https://openalex.org/fields/31 |
| primary_topic.field.display_name | Physics and Astronomy |
| primary_topic.score | 0.991599977016449 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/3109 |
| primary_topic.subfield.display_name | Statistical and Nonlinear Physics |
| primary_topic.display_name | Complex Network Analysis Techniques |
| related_works | https://openalex.org/W2315527029, https://openalex.org/W2065387230, https://openalex.org/W2323937687, https://openalex.org/W648995381, https://openalex.org/W3033791384, https://openalex.org/W2141885522, https://openalex.org/W2776312268, https://openalex.org/W4246315097, https://openalex.org/W346029495, https://openalex.org/W2516447249 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2023 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2021 |
| counts_by_year[1].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.2495/safe-v8-n1-59-64 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2764921799 |
| best_oa_location.source.issn | 2041-9031, 2041-904X |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2041-9031 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Safety and Security Engineering |
| best_oa_location.source.host_organization | https://openalex.org/P4310312982 |
| best_oa_location.source.host_organization_name | International Information and Engineering Technology Association |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310312982 |
| best_oa_location.source.host_organization_lineage_names | International Information and Engineering Technology Association |
| best_oa_location.license | |
| best_oa_location.pdf_url | http://www.witpress.com/Secure/ejournals/papers/SSE080107f.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Safety and Security Engineering |
| best_oa_location.landing_page_url | https://doi.org/10.2495/safe-v8-n1-59-64 |
| primary_location.id | doi:10.2495/safe-v8-n1-59-64 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2764921799 |
| primary_location.source.issn | 2041-9031, 2041-904X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2041-9031 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Safety and Security Engineering |
| primary_location.source.host_organization | https://openalex.org/P4310312982 |
| primary_location.source.host_organization_name | International Information and Engineering Technology Association |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310312982 |
| primary_location.source.host_organization_lineage_names | International Information and Engineering Technology Association |
| primary_location.license | |
| primary_location.pdf_url | http://www.witpress.com/Secure/ejournals/papers/SSE080107f.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Safety and Security Engineering |
| primary_location.landing_page_url | https://doi.org/10.2495/safe-v8-n1-59-64 |
| publication_date | 2018-01-01 |
| publication_year | 2018 |
| referenced_works | https://openalex.org/W2148074923, https://openalex.org/W2056944867, https://openalex.org/W2006052322, https://openalex.org/W2586874737, https://openalex.org/W2048095866, https://openalex.org/W1968164782, https://openalex.org/W1618470073, https://openalex.org/W2415266531, https://openalex.org/W3215085426 |
| referenced_works_count | 9 |
| abstract_inverted_index.a | 15, 58, 84, 164 |
| abstract_inverted_index.an | 62, 105 |
| abstract_inverted_index.as | 6 |
| abstract_inverted_index.be | 74, 96 |
| abstract_inverted_index.in | 32, 132 |
| abstract_inverted_index.is | 12, 23, 57, 173 |
| abstract_inverted_index.of | 8, 20, 28, 38, 48, 54, 60, 113, 134, 146, 154, 156, 162, 171 |
| abstract_inverted_index.on | 78, 104 |
| abstract_inverted_index.to | 24, 34, 42, 98, 127, 139, 168 |
| abstract_inverted_index.we | 82, 89 |
| abstract_inverted_index.The | 0 |
| abstract_inverted_index.aim | 19 |
| abstract_inverted_index.and | 41, 46, 69, 109, 144 |
| abstract_inverted_index.are | 120 |
| abstract_inverted_index.can | 95, 136 |
| abstract_inverted_index.new | 85, 165 |
| abstract_inverted_index.one | 7, 87 |
| abstract_inverted_index.the | 9, 21, 36, 39, 44, 49, 65, 70, 100, 111, 129, 141, 147, 152, 160 |
| abstract_inverted_index.two | 80 |
| abstract_inverted_index.use | 27 |
| abstract_inverted_index.call | 90 |
| abstract_inverted_index.case | 133 |
| abstract_inverted_index.from | 151 |
| abstract_inverted_index.full | 26 |
| abstract_inverted_index.harm | 128 |
| abstract_inverted_index.have | 124 |
| abstract_inverted_index.help | 137 |
| abstract_inverted_index.hubs | 47 |
| abstract_inverted_index.into | 14 |
| abstract_inverted_index.kind | 170 |
| abstract_inverted_index.make | 25 |
| abstract_inverted_index.more | 125, 149 |
| abstract_inverted_index.most | 101 |
| abstract_inverted_index.such | 61 |
| abstract_inverted_index.that | 64, 88 |
| abstract_inverted_index.this | 169 |
| abstract_inverted_index.used | 97 |
| abstract_inverted_index.view | 155 |
| abstract_inverted_index.(ICE) | 5 |
| abstract_inverted_index.based | 77 |
| abstract_inverted_index.graph | 30, 158 |
| abstract_inverted_index.nodes | 103 |
| abstract_inverted_index.offer | 83 |
| abstract_inverted_index.order | 33 |
| abstract_inverted_index.point | 153 |
| abstract_inverted_index.there | 56 |
| abstract_inverted_index.these | 79, 114 |
| abstract_inverted_index.three | 115 |
| abstract_inverted_index.train | 3 |
| abstract_inverted_index.which | 94, 122 |
| abstract_inverted_index.would | 73 |
| abstract_inverted_index.German | 1 |
| abstract_inverted_index.detect | 43, 99 |
| abstract_inverted_index.highly | 117 |
| abstract_inverted_index.mapped | 13 |
| abstract_inverted_index.system | 4, 131, 172 |
| abstract_inverted_index.theory | 31 |
| abstract_inverted_index.analyze | 35 |
| abstract_inverted_index.centers | 45 |
| abstract_inverted_index.measure | 68, 72, 167 |
| abstract_inverted_index.network | 40, 52, 148 |
| abstract_inverted_index.overall | 130 |
| abstract_inverted_index.problem | 161 |
| abstract_inverted_index.results | 112 |
| abstract_inverted_index.adapting | 163 |
| abstract_inverted_index.analysis | 22, 53, 63 |
| abstract_inverted_index.applied; | 75 |
| abstract_inverted_index.behavior | 143 |
| abstract_inverted_index.critical | 10 |
| abstract_inverted_index.directly | 150 |
| abstract_inverted_index.however, | 76 |
| abstract_inverted_index.level.By | 107 |
| abstract_inverted_index.measure, | 93 |
| abstract_inverted_index.stations | 119 |
| abstract_inverted_index.analyzing | 108 |
| abstract_inverted_index.comparing | 110 |
| abstract_inverted_index.measures, | 81, 116 |
| abstract_inverted_index.potential | 126 |
| abstract_inverted_index.promising | 86 |
| abstract_inverted_index.railways, | 55 |
| abstract_inverted_index.therefore | 123 |
| abstract_inverted_index.tradition | 59 |
| abstract_inverted_index.aggregated | 106 |
| abstract_inverted_index.centrality | 67 |
| abstract_inverted_index.conducting | 51 |
| abstract_inverted_index.discussed. | 174 |
| abstract_inverted_index.efficiency | 71 |
| abstract_inverted_index.high-speed | 2 |
| abstract_inverted_index.structure, | 142 |
| abstract_inverted_index.understand | 140 |
| abstract_inverted_index.undirected | 17 |
| abstract_inverted_index.vulnerable | 102, 118 |
| abstract_inverted_index.betweenness | 66 |
| abstract_inverted_index.identified, | 121 |
| abstract_inverted_index.network.The | 18 |
| abstract_inverted_index.system.When | 50 |
| abstract_inverted_index.quantitative | 29, 157 |
| abstract_inverted_index.vulnerability | 92, 166 |
| abstract_inverted_index.decision-makers | 138 |
| abstract_inverted_index.disruption.This | 135 |
| abstract_inverted_index.infrastructures | 11 |
| abstract_inverted_index.theory.Finally, | 159 |
| abstract_inverted_index.vulnerabilities | 37, 145 |
| abstract_inverted_index.distance-weighted | 16 |
| abstract_inverted_index.betweenness-efficiency | 91 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.48446044 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |