China Safety Science Journal ›› 2026, Vol. 36 ›› Issue (2): 218-226.doi: 10.16265/j.cnki.issn1003-3033.2026.02.0519
• Public Safety and Emergency Management • Previous Articles Next Articles
HUANG Jicheng(
), CHEN Wenjing**(
), JIA Nan
Received:2025-09-15
Revised:2025-12-08
Online:2026-02-28
Published:2026-08-28
Contact:
CHEN Wenjing
CLC Number:
HUANG Jicheng, CHEN Wenjing, JIA Nan. Research on security resource allocation optimization of critical infrastructure[J]. China Safety Science Journal, 2026, 36(2): 218-226.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.cssjj.com.cn/EN/10.16265/j.cnki.issn1003-3033.2026.02.0519
Table 1
Path length, path weight and path cost between nodes
| 路径 | C01 | C02 | C03 | C14 | C15 | C24 | C25 | C34 | C35 | C46 | C47 | C56 | C57 | C68 | C78 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 距离/m | 200 | 200 | 200 | 180 | 80 | 150 | 50 | 80 | 100 | 80 | 60 | 60 | 60 | 40 | 30 |
| 标准化 | 1.00 | 1.00 | 1.00 | 0.90 | 0.40 | 0.75 | 0.25 | 0.40 | 0.50 | 0.40 | 0.30 | 0.30 | 0.30 | 0.20 | 0.15 |
| Cij×Dj | 100 | 100 | 100 | 90 | 40 | 75 | 25 | 40 | 50 | 40 | 30 | 30 | 30 | 20 | 15 |
Table 2
Path and cost from starting point x0 to point T of security network
| 策略 | 路径 | 路径代价 |
|---|---|---|
| Sa1 | x0→x2→x5→x7→x8/T | 170 |
| Sa2 | x0→x2→x5→x6→x8/T | 175 |
| Sa3 | x0→x1→x5→x7→x8/T | 185 |
| Sa4 | x0→x3→x4→x7→x8/T | 185 |
| Sa5 | x0→x1→x5→x6→x8/T | 190 |
| Sa6 | x0→x3→x5→x7→x8/T | 195 |
| Sa7 | x0→x3→x4→x6→x8/T | 200 |
| Sa8 | x0→x3→x5→x6→x8/T | 200 |
| Sa9 | x0→x2→x4→x7→x8/T | 220 |
| Sa10 | x0→x1→x4→x7→x8/T | 235 |
| Sa11 | x0→x2→x4→x6→x8/T | 235 |
| Sa12 | x0→x1→x4→x6→x8/T | 250 |
Table 4
Optimal security resource allocation and shortest path cost with different security resource inputs
| 策略 | Z+z | x1 | x2 | x3 | x4 | x5 | x6 | x7 | x8 | 路径代价 | |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 800 | 157.0 | 165.0 | 169.0 | 25.0 | 56.0 | 25.0 | 32.0 | 169.0 | 214.0 | ||
| 880 | 183.9 | 188.0 | 188.0 | 27.5 | 27.5 | 27.5 | 49.6 | 188.0 | 238.0 | ||
| 960 | 200.3 | 205.0 | 205.0 | 30.0 | 33.2 | 30.0 | 50.8 | 205.2 | 259.6 | ||
| 1 040 | 214.3 | 222.1 | 222.1 | 32.5 | 52.0 | 32.5 | 42.4 | 222.1 | 281.1 | ||
| 1 120 | 219.8 | 231.6 | 237.3 | 35.0 | 78.7 | 35.0 | 45.3 | 237.3 | 300.5 | ||
| 1 200 | 247.4 | 256.3 | 256.3 | 37.5 | 59.0 | 37.5 | 49.8 | 256.3 | 322.5 | ||
| 1 280 | 251.2 | 264.7 | 271.2 | 40.0 | 90.0 | 40.0 | 51.9 | 271.2 | 343.4 | ||
| 1 360 | 282.0 | 291.0 | 291.0 | 42.5 | 66.2 | 42.5 | 51.0 | 291.9 | 367.6 | ||
| 1 440 | 296.9 | 307.6 | 307.6 | 45.0 | 71.0 | 45.0 | 59.3 | 307.6 | 389.3 | ||
| 1 520 | 313.2 | 324.6 | 324.6 | 47.5 | 76.0 | 47.5 | 62.0 | 324.6 | 410.9 | ||
| 1 600 | 329.9 | 341.7 | 341.7 | 50.0 | 78.7 | 50.0 | 66.4 | 341.7 | 432.5 | ||
| [1] |
冯治中, 王强. 刍议加强我国关键基础设施安全保护工作[J]. 浙江警察学院学报, 2022(1):43-50.
|
|
|
|
| [2] |
李景山, 郭佳荟. 爆炸恐怖袭击情景下地铁车站应急疏散模拟研究[J]. 山西建筑, 2024, 50(19):127-132.
|
|
|
|
| [3] |
高寒, 杨允锴, 赵洪伟, 等. 基于数据挖掘的危化品设施遭袭事件特征分析[J]. 中国安全生产科学技术, 2025, 21(8):214-220.
|
|
|
|
| [4] |
doi: 10.1016/j.jlp.2017.11.010 |
| [5] |
|
| [6] |
doi: 10.1108/eb022950 |
| [7] |
doi: 10.1108/eb022949 |
| [8] |
doi: 10.1016/j.jlp.2016.07.010 |
| [9] |
doi: 10.1016/j.psep.2019.11.038 |
| [10] |
巩绪福, 蔚承建, 钱震, 等. 基于Stackelberg博弈的海事安全问题研究[J]. 计算机科学, 2017, 44(5): 153-159.
doi: 10.11896/j.issn.1002-137X.2017.05.027 |
|
|
|
| [11] |
王东营, 陈小平, 刘权, 等. 基于改进的云模型-FMEA的油气管道风险排序[J]. 中国安全科学学报, 2024, 34(5):61-68.
doi: 10.16265/j.cnki.issn1003-3033.2024.05.1069 |
|
doi: 10.16265/j.cnki.issn1003-3033.2024.05.1069 |
|
| [12] |
柴瑞瑞, 刘德海, 陈静锋, 等. 考虑防御拓扑特征的暴恐事件演化博弈模型和仿真分析[J]. 运筹与管理, 2017, 26(5): 28-36.
doi: 10.12005/orms.2017.0105 |
|
|
|
| [13] |
林晨. 基于可靠性的系统攻防博弈建模与优化研究[D]. 成都: 西南财经大学, 2021.
|
|
|
|
| [14] |
doi: 10.1038/s41598-022-25548-w |
| [15] |
陈鹤, 刘永, 赵国海, 等. 核安保相关理论研究与实践探索[J]. 中国安全科学学报, 2023, 33 (7): 75-81.
doi: 10.16265/j.cnki.issn1003-3033.2023.07.1450 |
|
doi: 10.16265/j.cnki.issn1003-3033.2023.07.1450 |
|
| [16] |
郭熹. 基于风险熵模型的安防系统风险与效能评估技术研究[D]. 武汉: 武汉大学, 2011.
|
|
|
|
| [17] |
|
| [18] |
辛春林, 张建文, 张艳东. 基于最小最大准则的危险品运输网络优化研究[J]. 中国安全科学学报, 2016, 26(8):84-89.
|
|
|
|
| [19] |
陈宝林. 最优化理论与算法(第2版)[M]. 北京: 清华大学出版社, 2005: 80-92.
|
|
|
|
| [20] |
STEWART, M G, MUELLER J. Cost-benefit analysis of airport security: are airports too safe?[J]. Journal of Air Transport Management, 2014, 35(1): 19-28.
doi: 10.1016/j.jairtraman.2013.11.003 |
| [21] |
doi: 10.1007/BF00122574 |
| [22] |
周慧娟, 瓮冬阳, 李蓓, 等. 城市轨道交通运营中断下客流分配方法[J]. 中国安全科学学报, 2023, 33(6): 144-151.
doi: 10.16265/j.cnki.issn1003-3033.2023.06.1434 |
|
doi: 10.16265/j.cnki.issn1003-3033.2023.06.1434 |
|
| [23] |
任建宇. 面向恐怖袭击的安全防范系统效能评估方法研究[D]. 北京: 中国人民公安大学, 2022.
|
|
|
| [1] | YANG Qin, CHEN Jinming, LIU Ju, ZHANG Wei. Task allocation of emergency rescue workers based on bilateral matching decision [J]. China Safety Science Journal, 2019, 29(1): 180-186. |
| [2] | REN Bin, ZHU Changfeng, ZHONG Xiao. A PT based model for dynamic adjusting emergency material demand [J]. China Safety Science Journal, 2018, 28(3): 179-184. |
| [3] | ZHU Jianghong , LI Guofang , WANG Rui , LI Yanlai. FMEA based assessment of risk that metro train stops abnormally [J]. China Safety Science Journal, 2017, 27(2): 145-150. |
| [4] | . Research Progress on Critical Infrastructure Protection against External Threats [J]. China Safety Science Journal, 2013, 23(7): 171-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||