Abstract

Water distribution systems are vulnerable to hazards that threaten water delivery, water quality, and physical and cybernetic infrastructure. Water utilities and managers are responsible for assessing and preparing for these hazards, and researchers have developed a range of computational frameworks to explore and identify strategies for what-if scenarios. This manuscript conducts a review of the literature to report on the state of the art in modeling methodologies that have been developed to support the security of water distribution systems. First, the major activities outlined in the emergency management framework are reviewed; the activities include risk assessment, mitigation, emergency preparedness, response, and recovery. Simulation approaches and prototype software tools are reviewed that have been developed by government agencies and researchers for assessing and mitigating four threat modes, including contamination events, physical destruction, interconnected infrastructure cascading failures, and cybernetic attacks. Modeling tools are mapped to emergency management activities, and an analysis of the research is conducted to group studies based on methodologies that are used and developed to support emergency management activities. Recommendations are made for research needs that will contribute to the enhancement of the security of water distribution systems.

Get full access to this article

View all available purchase options and get full access to this article.

Data Availability Statement

All data, models, and code generated or used during the study appear in the published article.

Acknowledgments

This publication was developed under Cooperative Agreement No. 83595001 awarded by the US Environmental Protection Agency to The University of Texas at Austin. It has been subjected to the Agency’s review and has been approved for publication. The views expressed in this document are solely those of the authors and do not necessarily reflect those of the Agency. EPA does not endorse any products or commercial services mentioned in this publication.

References

Abokifa, A. A., K. Haddad, C. Lo, and P. Biswas. 2019. “Real-time identification of cyber-physical attacks on water distribution systems via machine learning-based anomaly detection techniques.” J. Water Resour. Plann. Manage. 145 (1): 04018089. https://doi.org/10.1061/(ASCE)WR.1943-5452.0001023.
Adachi, T., and B. R. Ellingwood. 2008. “Serviceability of earthquake-damaged water systems: Effects of electrical power availability and power backup systems on system vulnerability.” Reliab. Eng. Syst. Saf. 93 (1): 78–88. https://doi.org/10.1016/j.ress.2006.10.014.
Adachi, T., and B. R. Ellingwood. 2009. “Serviceability assessment of a municipal water system under spatially correlated seismic intensities.” Comput.-Aided Civ. Infrastruct. Eng. 24 (4): 237–248. https://doi.org/10.1111/j.1467-8667.2008.00583.x.
Afshar, A., and E. Najafi. 2014. “Consequence management of chemical intrusion in water distribution networks under inexact scenarios.” J. Hydroinf. 16 (1): 178–188. https://doi.org/10.2166/hydro.2013.125.
Ahmed, C. M., C. Murguia, and J. Ruths. 2017a. “Model-based attack detection scheme for smart water distribution networks.” In Proc., 2017 ACM on Asia Conf. on Computer and Communications Security—ASIA CCS ’17, 101–113. New York: ACM Press.
Ahmed, C. M., V. R. Palleti, and A. P. Mathur. 2017b. “Wadi: A water distribution testbed for research in the design of secure cyber physical systems.” In Proc., 3rd Int. Workshop on Cyber-Physical Systems for Smart Water Networks, 25–28. New York: ACM.
Aisopou, A., I. Stoianov, and N. J. D. Graham. 2012. “In-pipe water quality monitoring in water supply systems under steady and unsteady state flow conditions: A quantitative assessment.” Water Res. 46 (1): 235–246. https://doi.org/10.1016/j.watres.2011.10.058.
Alfonso, L., A. Jonoski, and D. Solomatine. 2010. “Multiobjective optimization of operational responses for contaminant flushing in water distribution networks.” J. Water Resour. Plann. Manage. 136 (Feb): 48–58. https://doi.org/10.1061/(ASCE)0733-9496(2010)136:1(48).
Almalawi, A., X. Yu, Z. Tari, A. Fahad, and I. Khalil. 2014. “An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems.” Comput. Secur. 46 (Oct): 94–110. https://doi.org/10.1016/j.cose.2014.07.005.
Alvisi, S., M. Franchini, M. Gavanelli, and M. Nonato. 2012. “Near-optimal scheduling of device activation in water distribution systems to reduce the impact of a contamination event.” J. Hydroinf. 14 (2): 345–365. https://doi.org/10.2166/hydro.2011.147.
American Lifelines Alliance. 2001. Seismic fragility formulations for water systems: Part 1—Guideline. Reston, VA: ASCE.
Apostolakis, G., and D. Lemon. 2005. “A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism.” Risk Anal. 25 (2): 361–376. https://doi.org/10.1111/j.1539-6924.2005.00595.x.
Arad, J., M. Housh, L. Perelman, and A. Ostfeld. 2013. “A dynamic thresholds scheme for contaminant event detection in water distribution systems.” Water Res. 47 (5): 1899–1908. https://doi.org/10.1016/j.watres.2013.01.017.
Ashford, W. 2018. “2018 could be year of critical infrastructure attacks, says report.” Accessed May 27, 2020. https://www.computerweekly.com/news/450432690/2018-could-be-year-of-critical-infrastructure-attacks-says-report.
Balut, A., R. Brodziak, J. Byla, and P. Zakrzewski. 2018. “Battle of Post-Disaster Response and Restauration (BPDRR).” In Proc., WDSA/CCWI Joint Conf. 2018. Beijing: Water Distribution Systems Analysis and Computing and Control for the Water Industry.
Bałut, A., R. Brodziak, J. Bylka, and P. Zakrzewski. 2019. “Ranking approach to scheduling repairs of a water distribution system for the post-disaster response and restoration service.” Water 11 (8): 1591. https://doi.org/10.3390/w11081591.
Banks, M., S. Pekarek, and M. Porterfield. 2014. “Final report: Development of mobile self-powered sensors for potable water distribution.” Accessed May 27, 2020. https://cfpub.epa.gov/ncer_abstracts/index.cfm/fuseaction/display.abstractDetail/abstract/9458/report/F.
Baranowski, T. M., and E. J. LeBoeuf. 2006. “Consequence management optimization for contaminant detection and isolation.” J. Water Resour. Plann. Manage. 132 (4): 274–282. https://doi.org/10.1061/(ASCE)0733-9496(2006)132:4(274).
Baranowski, T. M., and E. J. LeBoeuf. 2008. “Consequence management utilizing optimization.” J. Water Resour. Plann. Manage. 134 (4): 386–394. https://doi.org/10.1061/(ASCE)0733-9496(2008)134:4(386).
Bashi-Azghadi, S. N., M. H. Afshar, and A. Afshar. 2017. “Multi-objective optimization response modeling to contaminated water distribution networks: Pressure driven versus demand driven analysis.” KSCE J. Civ. Eng. 21 (6): 2085–2096. https://doi.org/10.1007/s12205-017-0447-7.
Berry, J., R. D. Carr, W. E. Hart, V. J. Leung, C. A. Phillips, and J.-P. Watson. 2009. “Designing contamination warning systems for municipal water networks using imperfect sensors.” J. Water Resour. Plann. Manage. 135 (Aug): 253–263. https://doi.org/10.1061/(ASCE)0733-9496(2009)135:4(253).
Berry, J., W. E. Hart, C. A. Phillips, J. G. Uber, and J.-P. Watson. 2006. “Sensor placement in municipal water networks with temporal integer programming models.” J. Water Resour. Plann. Manage. 132 (Aug): 218–224. https://doi.org/10.1061/(ASCE)0733-9496(2006)132:4(218).
Besner, M. C., M. Prévost, and S. Regli. 2011. “Assessing the public health risk of microbial intrusion events in distribution systems: Conceptual model, available data, and challenges.” Water Res. 45 (3): 961–979. https://doi.org/10.1016/j.watres.2010.10.035.
Brenner, J. F. 2013. “Eyes wide shut: The growing threat of cyber attacks on industrial control systems.” Bull. At. Sci. 69 (5): 15–20. https://doi.org/10.1177/0096340213501372.
Brink, S. A., R. A. Davidson, and T. H. Tabucchi. 2012. “Strategies to reduce durations of post-earthquake water service interruptions in Los Angeles.” Struct. Infrastruct. Eng. 8 (2): 199–210. https://doi.org/10.1080/15732470903517975.
Bristow, E. C., and K. Brumbelow. 2012. “Simulation to aid disaster planning and mitigation: Tools and techniques for water distribution managers and emergency planners.” J. Water Resour. Plann. Manage. 139 (4): 376–386. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000283.
Burns, N., C. Cooper, D. Dobbins, J. Edwards, and L. Lampe. 2002. “Security analysis and response for water utilities.” Chap. 20 in Urban water supply handbook, edited by L. Mays. New York: McGraw-Hill.
Byer, D., and K. H. Carlson. 2005. “Real-time detection of intentional chemical contamination in the distribution system.” J. Am. Water Works Assn. 97 (7): 1–12.
Carr, R. D., H. J. Greenberg, W. E. Hart, G. Konjevod, E. Lauer, H. Lin, T. Morrison, and C. A. Phillips. 2006. “Robust optimization of contaminant sensor placement for community water systems.” Math. Program. 107 (1–2): 337–356. https://doi.org/10.1007/s10107-005-0689-x.
Cascos, G., J. Ciaccia, J. Tripp, J. Bella, S. Qusssar, and M. Lacey. 2004. “Emergency backup power supply.” J. Am. Water Works Assn. 96 (1): 41–43. https://doi.org/10.1002/j.1551-8833.2004.tb10516.x.
Castro-Gama, M., C. Quintiliani, and S. Santopietro. 2018. “After earthquake post-disaster response using a many-objective approach, a greedy and engineering interventions.” In Proc., WDSA/CCWI Joint Conf. 2018. Beijing: Water Distribution Systems Analysis and Computing and Control for the Water Industry.
Chandy, S. E., A. Rasekh, Z. A. Barker, and M. E. Shafiee. 2019. “Cyberattack detection using deep generative models with variational inference.” J. Water Resour. Plann. Manage. 145 (2): 04018093. https://doi.org/10.1061/(ASCE)WR.1943-5452.0001007.
Chang, N. B., N. P. Pongsanone, and A. Ernest. 2011. “Comparisons between a rule-based expert system and optimization models for sensor deployment in a small drinking water network.” Expert Syst. Appl. 38 (8): 10685–10695. https://doi.org/10.1016/j.eswa.2011.02.113.
Choi, J., D. Yoo, and D. Kang. 2018. “Post-earthquake restoration simulation model for water supply networks.” Sustainability 10 (10): 3618. https://doi.org/10.3390/su10103618.
Citilogics. 2020. CitiLogics: Innovative water analytics. Accessed May 27, 2020. https://www.citilogics.com/.
Clark, R., E. Geldreich, K. Fox, E. Rice, C. Ohnson, J. Goodrich, J. A. Bsarnick, and F. Abdesaken. 1996. “Tracking a Salmonella serovar Typhimurium outbreak in Gideon, Missouri: Role of contaminant propagation modeling.” J. Water Supply Res. Technol. 45 (4): 171–183.
Coar, M., M. Garlock, and N. Elhami Khorasani. 2019. “Effects of water network dependency on the electric network for post-earthquake fire suppression.” Sustainable Resilient Infrastruct. 1–20. https://doi.org/10.1080/23789689.2018.1563408.
Costa, D. M., L. F. Melo, and F. G. Martins. 2013. “Localization of contamination sources in drinking water distribution systems: A method based on successive positive readings of sensors.” Water Resour. Manage. 27 (13): 4623–4635. https://doi.org/10.1007/s11269-013-0431-z.
Curnin, S., and E. Heumüller. 2016. “Evaluating emergency management capability of a water utility: A pilot study using exercise metrics.” Util. Policy 39 (Apr): 36–40. https://doi.org/10.1016/j.jup.2016.01.003.
Daley, B., and G. Gil. 2010. “Tests confirm it—Water was ok to drink all weekend.” Accessed May 27, 2020. http://archive.boston.com/news/local/massachusetts/articles/2010/05/05/turns_out_water_was_ok_to_drink_after_all/.
Davis, C., T. O’Rourke, M. Adams, and M. Rho. 2012. “Case study: Los Angeles water services restoration following the 1994 Northridge Earthquake.” In Proc., World Conf. on Earthquake Engineering. Beijing: Water Distribution Systems Analysis and Computing and Control for the Water Industry.
Davis, M. J., and R. Janke. 2008. “Importance of exposure model in estimating impacts when a water distribution system is contaminated.” J. Water Resour. Plann. Manage. 134 (5): 449–456. https://doi.org/10.1061/(ASCE)0733-9496(2008)134:5(449).
Davis, M. J., and R. Janke. 2011. “Patterns in potential impacts associated with contamination events in water distribution systems.” J. Water Resour. Plann. Manage. 137 (1): 1–9. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000084.
Davis, M. J., R. Janke, and M. Magnuson. 2014. “A framework for estimating the adverse health effects of contamination events in water distribution systems and its application.” Risk Anal. 34 (3): 498–513. https://doi.org/10.1111/risa.12107.
Davis, M. J., R. Janke, and T. Taxon. 2010. Assessing potential impacts associated with contamination events in water distribution systems: A sensitivity analysis. Washington, DC: USEPA.
Davis, M. J., R. Janke, and T. Taxon. 2016. “Assessing inhalation exposures associated with contamination events in water distribution systems.” PLOS One 11 (12): e0168051. https://doi.org/10.1371/journal.pone.0168051.
Dawsey, W. J., B. S. Minsker, and V. L. VanBlaricum. 2006. “Bayesian belief networks to integrate monitoring evidence of water distribution system contamination.” J. Water Resour. Plann. Manage. 132 (4): 234–241. https://doi.org/10.1061/(ASCE)0733-9496(2006)132:4(234).
De Sanctis, A. E., F. Shang, and J. G. Uber. 2010. “Real-time identification of possible contamination sources using network backtracking methods.” J. Water Resour. Plann. Manage. 136 (4): 444–453. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000050.
Deuerlein, J., D. Gilbert, E. Abraham, and O. Piller. 2018. “A greedy scheduling of post-disaster response and restoration using pressure-driven models and graph segment analysis.” In Proc., WDSA/CCWI Joint Conf. 2018. Beijing: Water Distribution Systems Analysis and Computing and Control for the Water Industry.
Diao, K., and W. Rauch. 2013. “Controllability analysis as a pre-selection method for sensor placement in water distribution systems.” Water Res. 47 (16): 6097–6108. https://doi.org/10.1016/j.watres.2013.07.026.
Di Cristo, C., and A. Leopardi. 2008. “Pollution source identification of accidental contamination in water distribution networks.” J. Water Resour. Plann. Manage. 134 (2): 197–202. https://doi.org/10.1061/(ASCE)0733-9496(2008)134:2(197).
Di Nardo, A., M. Di Natale, M. Guida, and D. Musmarra. 2013. “Water network protection from intentional contamination by sectorization.” Water Resour. Manage. 27 (6): 1837–1850. https://doi.org/10.1007/s11269-012-0133-y.
Do, V., L. Fillatre, and I. Nikiforov. 2014. “A statistical method for detecting cyber/physical attacks on SCADA systems.” In Proc., 2014 IEEE Conf. on Control Applications (CCA), 364–369. New York: IEEE.
Dorini, G., P. Jonkergouw, Z. Kapelan, F. di Pierro, S. T. Khu, and D. Savic. 2006. “An efficient algorithm for sensor placement in water distribution systems.” In Proc., Water Distribution Systems Analysis Symp. Beijing: Water Distribution Systems Analysis and Computing and Control for the Water Industry.
Douglas, H. C., R. Taormina, and S. Galelli. 2019. “Pressure-driven modeling of cyber-physical attacks on water distribution systems.” J. Water Resour. Plann. Manage. 145 (3): 06019001. https://doi.org/10.1061/(ASCE)WR.1943-5452.0001038.
Dueñas-Osorio, L., J. I. Craig, and B. J. Goodno. 2007. “Seismic response of critical interdependent networks.” Earthquake Eng. Struct. Dyn. 36 (2): 285–306. https://doi.org/10.1002/eqe.626.
Eliades, D. G., T. P. Lambrou, C. G. Panayiotou, and M. M. Polycarpou. 2014. “Contamination event detection in water distribution systems using a model-based approach.” Procedia Eng. 89: 1089–1096. https://doi.org/10.1016/j.proeng.2014.11.229.
Eliades, D. G., and M. M. Polycarpou. 2010. “A fault diagnosis and security framework for water systems.” IEEE Trans. Control Syst. Technol. 18 (6): 1254–1265. https://doi.org/10.1109/TCST.2009.2035515.
Eliades, D. G., and M. M. Polycarpou. 2012. “Water contamination impact evaluation and source-area isolation using decision trees.” J. Water Resour. Plann. Manage. 138 (5): 562–570. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000203.
Eliades, D. G., D. Stavrou, S. G. Vrachimis, C. G. Panayiotou, and M. M. Polycarpou. 2015. “Contamination event detection using multi-level thresholds.” Procedia Eng. 119 (1): 1429–1438. https://doi.org/10.1016/j.proeng.2015.08.1003.
Ellingwood, B., H. Cutler, P. Gardoni, W. Peacock, J. van de Lindt, and N. Wang. 2016. “The Centerville Virtual Community: A fully integrated decision model of interacting physical and social infrastructure systems.” Sustainable Resilient Infrastruct. 1 (3–4): 95. https://doi.org/10.1080/23789689.2016.1255000.
Ezell, B. C., J. V. Farr, and I. Wiese. 2000. “Infrastructure risk analysis model.” J. Infrastruct. Syst. 6 (3): 114–117. https://doi.org/10.1061/(ASCE)1076-0342(2000)6:3(114).
Farwell, J. P., and R. Rohozinski. 2011. “Stuxnet and the future of cyber war.” Survival 53 (1): 23–40. https://doi.org/10.1080/00396338.2011.555586.
FEMA. 1999. Hazard mitigation grant program desk reference. Washington, DC: FEMA.
FEMA. 2003. Multi-hazard loss estimation methodology, earthquake model, HAZUS-MH 2.1 technical manual. Washington, DC: FEMA.
Gao, J., D. Li, and S. Havlin. 2014. “From a single network to a network of networks.” Natl. Sci. Rev. 1 (3): 346–356. https://doi.org/10.1093/nsr/nwu020.
Gavanelli, M., M. Nonato, A. Peano, S. Alvisi, and M. Franchini. 2015. “Scheduling countermeasures to contamination events by genetic algorithms.” AI Commun. 28 (2): 259–282. https://doi.org/10.3233/AIC-140638.
Gibson, J., B. Karney, and Y. Guo. 2019. “Predicting health risks from intrusion into drinking water pipes over time.” J. Water Resour. Plann. Manage. 145 (3): 04019001. https://doi.org/10.1061/(ASCE)WR.1943-5452.0001039.
Gong, W., M. A. Suresh, L. Smith, A. Ostfeld, R. Stoleru, A. Rasekh, and M. K. Banks. 2016. “Mobile sensor networks for optimal leak and backflow detection and localization in municipal water networks.” Environ. Modell. Software 80 (Jun): 306–321. https://doi.org/10.1016/j.envsoft.2016.02.001.
Grigg, N. S. 2003. “Water utility security: Multiple hazards and multiple barriers.” J. Infrastruct. Syst. 9 (2): 81–88. https://doi.org/10.1061/(ASCE)1076-0342(2003)9:2(81).
Grolinger, K., M. Capretz, A. Shypanski, and G. Gill. 2011. Federated critical infrastructure simulators: Towards ontologies for support of collaboration. New York: IEEE.
Guan, J., M. M. Aral, M. L. Maslia, and W. M. Grayman. 2006. “Identification of contaminant sources in water distribution systems using simulation-optimization method: Case study.” J. Water Resour. Plann. Manage. 132 (4): 252–262. https://doi.org/10.1061/(ASCE)0733-9496(2006)132:4(252).
Guidorzi, M., M. Franchini, and S. Alvisi. 2009. “A multi-objective approach for detecting and responding to accidental and intentional contamination events in water distribution systems.” Urban Water J. 6 (2): 115–135. https://doi.org/10.1080/15730620802566836.
Guidotti, R., H. Chmielewski, V. Unnikrishnan, P. Gardoni, T. McAllister, and J. van de Lindt. 2016. “Modeling the resilience of critical infrastructure: The role of network dependencies.” Sustainable Resilient Infrastruct. 1 (3–4): 153–168. https://doi.org/10.1080/23789689.2016.1254999.
Hall, J., A. D. Zaffiro, R. B. Marx, P. C. Kefauver, E. Radha Krishnan, R. C. Haught, and J. G. Herrmann. 2007. “On-line water quality parameters as indicators of distribution system contamination.” J. Am. Water Works Assn. 99 (1): 66–77. https://doi.org/10.1002/j.1551-8833.2007.tb07847.x.
Hart, D., J. S. Rodriguez, J. Burkhardt, B. Borchers, C. Laird, R. Murray, K. Klise, and T. Haxton. 2019. “Quantifying hydraulic and water quality uncertainty to inform sampling of drinking water distribution systems.” J. Water Resour. Plann. Manage. 145 (1): 04018084. https://doi.org/10.1061/(ASCE)WR.1943-5452.0001005.
Hart, W. E., and R. Murray. 2010. “Review of sensor placement strategies for contamination warning systems in drinking water distribution systems.” J. Water Resour. Plann. Manage. 136 (6): 611–619. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000081.
Hassanzadeh, A., A. Rasekh, S. Galelli, M. Aghashahi, R. Taormina, A. Ostfeld, and M. K. Banks. 2020. “A review of cybersecurity incidents in the water sector.” J. Environ. Eng. 146 (5): 03120003. https://doi.org/10.1061/(ASCE)EE.1943-7870.0001686.
Helbling, D. E., and J. M. VanBriesen. 2009. “Modeling residual chlorine response to a microbial contamination event in drinking water distribution systems.” J. Environ. Eng. 135 (10): 918–927. https://doi.org/10.1061/(ASCE)EE.1943-7870.0000080.
Ho, C.-I., M.-D. Lin, and S.-L. Lo. 2009. “Prioritizing pipe replacement in a water distribution system using a seismic-based artificial neural network model.” Environ. Eng. Sci. 26 (4): 745–752. https://doi.org/10.1089/ees.2008.0057.
Hou, D., H. He, P. Huang, G. Zhang, and H. Loaiciga. 2013. “Detection of water-quality contamination events based on multi-sensor fusion using an extented Dempster-Shafer method.” Meas. Sci. Technol. 24 (5): 055801. https://doi.org/10.1088/0957-0233/24/5/055801.
Housh, M., and Z. Ohar. 2017. “Integrating physically based simulators with event detection systems: Multi-site detection approach.” Water Res. 110 (Mar): 180–191. https://doi.org/10.1016/j.watres.2016.12.003.
Housh, M., and Z. Ohar. 2018. “Model-based approach for cyber-physical attack detection in water distribution systems.” Water Res. 139 (Aug): 132–143. https://doi.org/10.1016/j.watres.2018.03.039.
Housh, M., and A. Ostfeld. 2015. “An integrated logit model for contamination event detection in water distribution systems.” Water Res. 75 (May): 210–223. https://doi.org/10.1016/j.watres.2015.02.016.
Hrudey, S. E., and E. J. Hrudey. 2004. Safe drinking water: Lessons from recent outbreaks in affluent nations. London: IWA Publishing.
Hu, C., M. Li, D. Zeng, and S. Guo. 2018. “A survey on sensor placement for contamination detection in water distribution systems.” Wireless Networks 24 (2): 647–661. https://doi.org/10.1007/s11276-016-1358-0.
Huang, J. J., and E. A. McBean. 2009. “Data mining to identify contaminant event locations in water distribution systems.” J. Water Resour. Plann. Manage. 135 (6): 466–474. https://doi.org/10.1061/(ASCE)0733-9496(2009)135:6(466).
Janke, J., K. Morley, J. Uber, and T. Haxton. 2011. “Real-time modeling for water distribution system operation: Integrating security developed technologies with normal operations.” In Proc., AWWA Water Security Conf. and Distribution Systems Symp. Nashville, TN: American Water Works Association.
Janke, R. 2018. Deployment of real-time analytics and modeling at the City of Flint, Michigan water system. Washington, DC: USEPA.
Janke, R., R. Murray, T. Haxton, and J. Goodrich. 2016. “Heighten utility security with infrastructure software tools.” Opflow 42 (5): 10–15. https://doi.org/10.5991/OPF.2016.42.0025.
Janke, R., M. Tryby, and R. Clark. 2014. “Protecting water supply critical infrastructure: An overview.” Chap. 2 in Securing water and wastewater systems, edited by R. Clark and S. Hakim, 29–85. New York: Springer International Publishing.
Javanbarg, M., and S. Takada. 2010. “Seismic reliability assessment of water supply systems.” In Safety, reliability and risk of structures, infrastructures, and engineering systems, edited by H. Furuta, D. Frangopol, and M. Shinozuka. London: Taylor & Francis Group.
Jeong, H. S., and D. M. Abraham. 2006. “Operational response model for physically attacked water networks using NSGA-II.” J. Comput. Civ. Eng. 20 (5): 328–338. https://doi.org/10.1061/(ASCE)0887-3801(2006)20:5(328).
Jeong, H. S., and D. M. Abraham. 2009. “Water rationing model for consequence minimization of water infrastructure destruction.” J. Water Resour. Plann. Manage. 135 (2): 80–89. https://doi.org/10.1061/(ASCE)0733-9496(2009)135:2(80).
Jeong, H. S., J. Qiao, D. M. Abraham, M. Lawley, J.-P. Richard, and Y. Yih. 2006. “Minimizing the consequences of intentional attack on water infrastructure.” Comput.-Aided Civ. Infrastruct. Eng. 21 (2): 79–92. https://doi.org/10.1111/j.1467-8667.2005.00419.x.
Kameda, H. 2000. “Engineering management of lifeline systems under earthquake risk.” Bull. N. Z. Soc. Earthquake Eng. 33 (3): 248–264. https://doi.org/10.5459/bnzsee.33.3.248-264.
Kanakoudis, V., and S. Tsitsifli. 2017. “Potable water security assessment-a review on monitoring, modelling and optimization techniques, applied to water distribution networks.” Desalin. Water Treat. 99: 18–26. https://doi.org/10.5004/dwt.2017.21784.
Kanta, L., and K. Brumbelow. 2013. “Vulnerability, risk, and mitigation assessment of water distribution systems for insufficient fire flows.” J. Water Resour. Plann. Manage. 139 (6): 593–603. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000281.
Kaplan, S. 1997. “The words of risk analysis.” Risk Anal. 17 (4): 407–417. https://doi.org/10.1111/j.1539-6924.1997.tb00881.x.
Kaplan, S., and B. J. Garrick. 1981. “On the quantitative definition of risk.” Risk Anal. 1 (1): 11–27. https://doi.org/10.1111/j.1539-6924.1981.tb01350.x.
Kessler, A., A. Ostfeld, and G. Sinai. 1998. “Detecting accidental contaminations in municipal water networks.” J. Water Resour. Plann. Manage. 124 (Aug): 192–198. https://doi.org/10.1061/(ASCE)0733-9496(1998)124:4(192).
Khatavkar, P., and L. Mays. 2018. “Model for real-time operations of water distribution systems under limited electrical power availability with consideration of water quality.” J. Water Resour. Plann. Manage. 144 (11): 04018071. https://doi.org/10.1061/(ASCE)WR.1943-5452.0001000.
Khatavkar, P., and L. Mays. 2019. “Optimization-simulation model for real-time pump and valve operation of water distribution systems under critical conditions.” Urban Water J. 16 (1): 45–55. https://doi.org/10.1080/1573062X.2019.1634108.
Kim, Y., B. Spencer, J. Song, A. Elnashai, and T. Stokes. 2007. Seismic performance assessment of interdependent lifeline systems. Champaign, IL: Univ. of Illinois at Urbana-Champaign, Mid-America Earthquake Center.
Klein, K., M. Rosenthal, and H. Klausner. 2005. “Blackout 2003: Preparedness and lessons learned from the perspectives of four hospitals.” Prehospital Disaster Med. 20 (5): 343–349. https://doi.org/10.1017/S1049023X00002818.
Klise, K., D. Moriarty, M. Bynum, R. Murray, J. Burkhardt, and T. Haxton. 2017a. Water network tool for resilience (WNTR) user manual. Washington, DC: USEPA.
Klise, K. A., M. Bynum, D. Moriarty, and R. Murray. 2017b. “A software framework for assessing the resilience of drinking water systems to disasters with an example earthquake case study.” Environ. Modell. Software 95 (Sep): 420–431. https://doi.org/10.1016/j.envsoft.2017.06.022.
Koc, A. C., U. S. Demir, and S. Toprak. 2019. “Water distribution system postearthquake service ratio prediction with repair rate and graph index.” J. Pipeline Syst. Eng. Pract. 10 (4): 04019032. https://doi.org/10.1061/(ASCE)PS.1949-1204.0000404.
Koch, M. W., and S. A. McKenna. 2010. “Distributed sensor fusion in water quality event detection.” J. Water Resour. Plann. Manage. 137 (1): 10–19. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000094.
Krause, A., and C. Guestrin. 2009. “Robust sensor placement for detecting adversarial contaminations in water distribution systems.” In Proc., World Environmental and Water Resources Congress 2009, 460–469. Reston, VA: ASCE.
Kroll, D., and J. Throckmorton. 2005. “The role of technology in enhancing water security: Protecting a valuable asset.” In Vol. 5781 of Optics and photonics in global homeland security, 39–47. Bellingham, WA: International Society for Optics and Photonics.
Kumar, J., E. D. Brill, G. Mahinthakumar, and S. R. Ranjithan. 2012. “Contaminant source characterization in water distribution systems using binary signals.” J. Hydroinf. 14 (3): 585. https://doi.org/10.2166/hydro.2012.073.
Kuraoka, S., and J. H. Rainer. 2010. “Damage to water distribution system caused by the 1995 Hyogo-ken Nanbu earthquake.” Can. J. Civ. Eng. 23 (3): 665–677. https://doi.org/10.1139/l96-882.
Laird, C. D., L. T. Biegler, and B. G. van Bloemen Waanders. 2006. “Mixed-integer approach for obtaining unique solutions in source inversion of water networks.” J. Water Resour. Plann. Manage. 132 (4): 242–251. https://doi.org/10.1061/(ASCE)0733-9496(2006)132:4(242).
Laird, C. D., L. T. Biegler, B. G. van Bloemen Waanders, and R. A. Bartlett. 2005. “Contamination source determination for water networks.” J. Water Resour. Plann. Manage. 131 (2): 125–134. https://doi.org/10.1061/(ASCE)0733-9496(2005)131:2(125).
Langner, R. 2011. “Stuxnet: Dissecting a cyberwarfare weapon.” IEEE Secur. Privacy Mag. 9 (3): 49–51. https://doi.org/10.1109/MSP.2011.67.
Laszka, A., W. Abbas, S. S. Sastry, Y. Vorobeychik, and X. Koutsoukos. 2016. “Optimal thresholds for intrusion detection systems.” In Proc., Symp. and Bootcamp on the Science of Security—HotSos ’16, 72–81. New York: ACM Press. http://dl.acm.org/citation.cfm?doid=2898375.2898399.
Laszka, A., W. Abbas, Y. Vorobeychik, and X. Koutsoukos. 2017. “Synergic security for smart water networks.” In Proc., 3rd Int. Workshop on Cyber-Physical Systems for Smart Water Networks—CySWATER ’17, 21–24. New York, NY: Association for Computing Machinery.
Laucelli, D., and O. Giustolisi. 2015. “Vulnerability assessment of water distribution networks under seismic actions.” J. Water Resour. Plann. Manage. 141 (6): 04014082. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000478.
LCRA Water Quality Advisory Committee. 2019. “Texas floods and Austin’s boil water crisis.” Accessed May 27, 2020. https://www.lcra.org/water/quality/texas-clean-rivers-program/Documents/Critendon_2019_WQAC_BoilWaterNotice.pdf.
Lee, B. H., and R. A. Deininger. 1992. “Optimal locations of monitoring stations in water distribution system.” J. Environ. Eng. 118 (1): 4–16. https://doi.org/10.1061/(ASCE)0733-9372(1992)118:1(4).
Li, Y., J. Gao, C. Jian, C. Ou, and S. Hu. 2018. “A two-stage post-disaster response and restoration method for the water distribution system.” In Proc., WDSA/CCWI Joint Conf. 2018. Beijing: Water Distribution Systems Analysis and Computing and Control for the Water Industry.
Lindell, M. K., R. W. Perry, and C. Prater. 2007. Introduction to emergency management. Hoboken, NJ: Wiley.
Liu, L., S. R. Ranjithan, and G. Mahinthakumar. 2011a. “Contamination source identification in water distribution systems using an adaptive dynamic optimization procedure.” Water Resour. Plann. Manage. 137 (Apr): 183–192. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000104.
Liu, L., A. Sankarasubramanian, and S. R. Ranjithan. 2011b. “Logistic regression analysis to estimate contaminant sources in water distribution systems.” J. Hydroinf. 13 (3): 545–557. https://doi.org/10.2166/hydro.2010.106.
Liu, L., E. M. Zechman, G. Mahinthakumar, and S. Ranji Ranjithan. 2012a. “Coupling of logistic regression analysis and local search methods for characterization of water distribution system contaminant source.” Eng. Appl. Artif. Intell. 25 (2): 309–316. https://doi.org/10.1016/j.engappai.2011.10.009.
Liu, L., E. M. Zechman, G. Mahinthakumar, and S. Ranji Ranjithan. 2012b. “Identifying contaminant sources for water distribution systems using a hybrid method.” Civ. Eng. Environ. Syst. 29 (2): 123–136. https://doi.org/10.1080/10286608.2012.663360.
Liu, S., H. Che, K. Smith, and C. Chen. 2015a. “A method of detecting contamination events using multiple conventional water quality sensors.” Environ. Monit. Assess. 187 (1): 1–11. https://doi.org/10.1007/BF00394284.
Liu, S., H. Che, K. Smith, and L. Chen. 2014. “Contamination event detection using multiple types of conventional water quality sensors in source water.” Environ. Sci. Processes Impacts 16 (8): 2028–2038. https://doi.org/10.1039/C4EM00188E.
Liu, S., K. Smith, and H. Che. 2015b. “A multivariate based event detection method and performance comparison with two baseline methods.” Water Res. 80 (Sep): 109–118. https://doi.org/10.1016/j.watres.2015.05.013.
Luna, R., N. Balakrishnan, and C. H. Dagli. 2011. “Postearthquake recovery of a water distribution system: Discrete event simulation using colored petri nets.” J. Infrastruct. Syst. 17 (1): 25–34. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000039.
Mahmoud, H. A., Z. Kapelan, and D. Savić. 2018. “Real-time operational response methodology for reducing failure impacts in water distribution systems.” J. Water Resour. Plann. Manage. 144 (7): 04018029. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000956.
Mala-Jetmarova, H., N. Sultanova, and D. Savic. 2018. “Lost in optimisation of water distribution systems? A literature review of system design.” Water 10 (3): 307. https://doi.org/10.3390/w10030307.
Mansour-Rezaei, S., G. Naser, A. Malekpour, and B. W. Karney. 2013. “Contaminant intrusion in water distribution systems.” J. Am. Water Works Assn. 105 (6): 31–32. https://doi.org/10.5942/jawwa.2013.105.0061.
Mansour-Rezaei, S., G. Naser, and R. Sadiq. 2014. “Predicting the potential of contaminant intrusion in water distribution systems.” J. Am. Water Works Assn. 106 (2): 47–48. https://doi.org/10.5942/jawwa.2014.106.0019.
Massachusetts Water Resources Authority. 2010. “MRWA emergency water notice.” Accessed May 27, 2020. http://www.mwra.state.ma.us/updates/leak.html.
McInnis, D. 2007. “A relative-risk framework for evaluating transient pathogen intrusion in distribution systems.” Urban Water J. 1 (2): 113–127. https://doi.org/10.1080/15730620412331290010.
Michaud, D., and G. E. Apostolakis. 2006. “Methodology for ranking the elements of water-supply networks.” J. Infrastruct. Syst. 12 (4): 230–242. https://doi.org/10.1061/(ASCE)1076-0342(2006)12:4(230).
Monroe, J., E. Ramsey, and E. Berglund. 2018. “Allocating countermeasures to defend water distribution systems against terrorist attack.” Reliab. Eng. Syst. Saf. 179 (Nov): 37–51. https://doi.org/10.1016/j.ress.2018.02.014.
Mounce, S. R., R. B. Mounce, T. Jackson, J. Austin, and J. B. Boxall. 2014. “Pattern matching and associative artificial neural networks for water distribution system time series data analysis.” J. Hydroinf. 16 (3): 617. https://doi.org/10.2166/hydro.2013.057.
Moyer, J. 2005. “Tabletop exercises: How can you use them to prepare for water system incidents.” J. Am. Water Works Assn. 97 (8): 52–57. https://doi.org/10.1002/j.1551-8833.2005.tb07449.x.
Mukherjee, R., U. M. Diwekar, and A. Vaseasht. 2017. “Optimal sensor placement with mitigation strategy for water network systems under uncertainty.” Comput. Chem. Eng. 103 (Aug): 91–102. https://doi.org/10.1016/j.compchemeng.2017.03.014.
Murray, S., M. Ghazali, and E. Mcbean. 2012. “Real-time water quality monitoring: Assessment of multisensor data using Bayesian belief networks.” J. Water Resour. Plann. Manage. 138 (1): 63–70. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000163.
National Research Council. 2006. Drinking water distribution systems: Assessing and reducing risks. Washington, DC: National Academies Press.
Nayak, M. A., and M. A. Turnquist. 2016. “Optimal recovery from disruptions in water distribution networks.” Comput.-Aided Civ. Infrastruct. Eng. 31 (8): 566–579. https://doi.org/10.1111/mice.12200.
Neupauer, R. M., M. K. Records, and W. H. Ashwood. 2010. “Backward probabilistic modeling to identify contaminant sources in water distribution systems.” J. Water Resour. Plann. Manage. 136 (5): 587–591. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000057.
Newman, L. 2018. Now cryptojacking threatens critical infrastructure, too. Accessed May 27, 2020. https://www.wired.com/story/cryptojacking-critical-infrastructure/.
Ohar, Z., O. Lahav, and A. Ostfeld. 2015. “Optimal sensor placement for detecting organophosphate intrusions into water distribution systems.” Water Res. 73 (Apr): 193–203. https://doi.org/10.1016/j.watres.2015.01.024.
Oliker, N., Z. Ohar, and A. Ostfeld. 2016. “Spatial event classification using simulated water quality data.” Environ. Modell. Software 77 (Mar): 71–80. https://doi.org/10.1016/j.envsoft.2015.11.013.
Oliker, N., and A. Ostfeld. 2014a. “A coupled classification—Evolutionary optimization model for contamination event detection in water distribution systems.” Water Res. 51 (Mar): 234–245. https://doi.org/10.1016/j.watres.2013.10.060.
Oliker, N., and A. Ostfeld. 2014b. “Minimum volume ellipsoid classification model for contamination event detection in water distribution systems.” Environ. Modell. Software 57 (Jul): 1–12. https://doi.org/10.1016/j.envsoft.2014.03.011.
Oliker, N., and A. Ostfeld. 2015. “Network hydraulics inclusion in water quality event detection using multiple sensor stations data.” Water Res. 80 (Sep): 47–58. https://doi.org/10.1016/j.watres.2015.04.036.
Oliker, N., and A. Ostfeld. 2016. “Inclusion of mobile sensors in water distribution system monitoring operations.” J. Water Resour. Plann. Manage. 142 (1): 04015044. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000569.
Ostfeld, A., et al. 2009. “The battle of the water sensor networks (BWSN): A design challenge for engineers and algorithms.” J. Water Resour. Plann. Manage. 134 (6): 556–568. https://doi.org/10.1061/(ASCE)0733-9496(2008)134:6(556).
Ostfeld, A., and E. Salomons. 2004. “Optimal layout of early warning detection stations for water distribution systems security.” J. Water Resour. Plann. Manage. 130 (Oct): 377–385. https://doi.org/10.1061/(ASCE)0733-9496(2004)130:5(377).
Ostfeld, A., and E. Salomons. 2005. “Securing water distribution systems using online contamination monitoring.” J. Water Resour. Plann. Manage. 131 (Oct): 402–405. https://doi.org/10.1061/(ASCE)0733-9496(2005)131:5(402).
Ouyang, M. 2014. “Review on modeling and simulation of interdependent critical infrastructure systems.” Reliab. Eng. Syst. Saf. 121 (Jan): 43–60. https://doi.org/10.1016/j.ress.2013.06.040.
Paez, D., Y. Filion, and M. Hulley. 2018. “Battle of post-disaster response and restoration (BPDRR).” Accessed May 27, 2020. https://www.queensu.ca/wdsa-ccwi2018/sites/webpublish.queensu.ca.wcjicwww/files/files/Problem%20V04.pdf.
Palleti, V. R., V. Kurian, S. Narasimhan, and R. Rengaswamy. 2018. “Actuator network design to mitigate contamination effects in water distribution networks.” Comput. Chem. Eng. 108 (Jan): 194–205. https://doi.org/10.1016/j.compchemeng.2017.09.003.
Parks, S. L. I., and J. M. VanBriesen. 2009. “Booster disinfection for response to contamination in a drinking water distribution system.” J. Water Resour. Plann. Manage. 135 (6): 502–511. https://doi.org/10.1061/(ASCE)0733-9496(2009)135:6(502).
Pasqualetti, F., F. Dorfler, and F. Bullo. 2015. “Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems.” IEEE Control Syst. 35 (1): 110–127. https://doi.org/10.1109/MCS.2014.2364725.
Patterson, S. A., and G. E. Apostolakis. 2007. “Identification of critical locations across multiple infrastructures for terrorist actions.” Reliab. Eng. Syst. Saf. 92 (9): 1183–1203. https://doi.org/10.1016/j.ress.2006.08.004.
Perelman, L., J. Arad, M. Housh, and A. Ostfeld. 2012. “Event detection in water distribution systems from multivariate water quality time series.” Environ. Sci. Technol. 46 (15): 8212–8219. https://doi.org/10.1021/es3014024.
Perelman, L., and A. Ostfeld. 2010a. “Distribution systems security.” J. Water Resour. Plann. Manage. 136 (Feb): 80–87. https://doi.org/10.1061/(ASCE)0733-9496(2010)136:1(80).
Perelman, L., and A. Ostfeld. 2010b. “Extreme impact contamination events sampling for water distribution systems security.” J. Water Resour. Plann. Manage. 136 (1): 80–87. https://doi.org/10.1061/(ASCE)0733-9496(2010)136:1(80).
Perelman, L., and A. Ostfeld. 2012. “Extreme impact contamination events sampling for real-sized water distribution systems.” J. Water Resour. Plann. Manage. 138 (5): 581–585. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000206.
Perelman, L., and A. Ostfeld. 2013a. “Bayesian networks for source intrusion detection.” J. Water Resour. Plann. Manage. 139 (4): 426–432. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000288.
Perelman, L., and A. Ostfeld. 2013b. “Operation of remote mobile sensors for security of drinking water distribution systems.” Water Res. 47 (13): 4217–4226. https://doi.org/10.1016/j.watres.2013.04.048.
Petterson, S. R., and N. J. Ashbolt. 2016. “QMRA and water safety management: Review of application in drinking water systems.” J. Water Health 14 (4): 571–589. https://doi.org/10.2166/wh.2016.262.
Poulin, A., A. Mailhot, P. Grondin, L. Delorme, and N. Periche. 2008. “Heuristic approach for operational response to drinking water contamination.” J. Water Resour. Plann. Manage. 134 (Oct): 457–465. https://doi.org/10.1061/(ASCE)0733-9496(2008)134:5(457).
Poulin, A., N. Periche, L. Delorme, A. Mailhot, and J.-P. Villeneuve. 2010. “Planning unidirectional flushing operations as a response to drinking water distribution system contamination.” J. Water Resour. Plann. Manage. 136 (6): 647–657. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000085.
Pournaras, E., R. Taormina, M. Thapa, S. Galelli, V. R. Palleti, and R. Kooij. 2019. “Cascading failures in interconnected power-to-water networks.” In Proc., 3rd ACM Int. Workshop on Critical Infrastructure Network Security (CINS 2019). New York, NY: Association for Computing Machinery.
Preis, A., and A. Ostfeld. 2006. “Contamination source identification in water systems: A hybrid model trees-linear programming scheme.” J. Water Resour. Plann. Manage. 132 (4): 263–273. https://doi.org/10.1061/(ASCE)0733-9496(2006)132:4(263).
Preis, A., and A. Ostfeld. 2007. “A contamination source identification model for water distribution system security.” Eng. Optim. 39 (8): 941–947. https://doi.org/10.1080/03052150701540670.
Preis, A., and A. Ostfeld. 2008. “Multiobjective contaminant response modeling for water distribution systems security.” J. Hydroinf. 10 (4): 267–274. https://doi.org/10.2166/hydro.2008.061.
Preis, A., and A. Ostfeld. 2011. “Hydraulic uncertainty inclusion in water distribution systems contamination source identification.” Urban Water J. 8 (5): 267–277. https://doi.org/10.1080/1573062X.2011.596549.
Propato, M. 2006. “Contamination warning in water networks: General mixed-integer linear models for sensor location design.” J. Water Resour. Plann. Manage. 132 (Aug): 225–233. https://doi.org/10.1061/(ASCE)0733-9496(2006)132:4(225).
Propato, M., F. Sarrazy, and M. Tryby. 2010. “Linear algebra and minimum relative entropy to investigate contamination events in drinking water systems.” J. Water Resour. Plann. Manage. 136 (4): 483–492. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000059.
Propato, M., and J. G. Uber. 2004. “Vulnerability of water distribution systems to pathogen intrusion: How effective is a disinfectant residual?” Environ. Sci. Technol. 38 (13): 3713–3722. https://doi.org/10.1021/es035271z.
Qiao, J., D. Jeong, M. Lawley, J. P. P. Richard, D. M. Abraham, and Y. Yih. 2007. “Allocating security resources to a water supply network.” IIE Trans. 39 (1): 95–109. https://doi.org/10.1080/07408170600865400.
Raciti, M., J. Cucurull, and S. Nadjm-Tehrani. 2012. “Anomaly detection in water management systems.” Crit. Infrastruct. Prot. 7130 (2012): 98–119. https://doi.org/10.1007/978-3-642-28920-0_6.
Rasekh, A., and K. Brumbelow. 2013. “Probabilistic analysis and optimization to characterize critical water distribution system contamination scenarios.” J. Water Resour. Plann. Manage. 139 (2): 191–199. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000242.
Rasekh, A., and K. Brumbelow. 2014. “Drinking water distribution systems contamination management to reduce public health impacts and system service interruptions.” Environ. Modell. Software 51 (Jan): 12–25. https://doi.org/10.1016/j.envsoft.2013.09.019.
Rasekh, A., and K. Brumbelow. 2015. “A dynamic simulation-optimization model for adaptive management of urban water distribution system contamination threats.” Appl. Soft Comput. J. 32 (Jul): 59–71. https://doi.org/10.1016/j.asoc.2015.03.021.
Rasekh, A., A. Hassanzadeh, S. Mulchandani, S. Modi, and M. K. Banks. 2016. “Smart water networks and cyber security.” J. Water Resour. Plann. Manage. 142 (7): 01816004. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000646.
Rasekh, A., M. E. Shafiee, E. Zechman, and K. Brumbelow. 2013. “Sociotechnical risk assessment for water distribution system contamination threats.” J. Hydroinf. 16 (3): 531–549. https://doi.org/10.2166/hydro.2013.023.
Rathi, S., and R. Gupta. 2014. “Sensor placement methods for contamination detection in water distribution networks: A review.” Procedia Eng. 89: 181–188. https://doi.org/10.1016/j.proeng.2014.11.175.
Rathi, S., R. Gupta, S. Kamble, and A. Sargaonkar. 2016. “Risk based analysis for contamination event selection and optimal sensor placement for intermittent water distribution network security.” Water Resour. Manage. 30 (8): 2671–2685. https://doi.org/10.1007/s11269-016-1309-7.
Romero, N., T. D. O’Rourke, L. K. Nozick, and C. A. Davis. 2010. “Seismic hazards and water supply performance.” J. Earthquake Eng. 14 (7): 1022–1043. https://doi.org/10.1080/13632460903527989.
Rossman, L. 2000. Epanet 2 users manual. Washington, DC: USEPA.
Salomons, E., and A. Ostfeld. 2010. Identification of possible contamination sources using reverse hydraulic simulation, 447–453. Reston, VA: ASCE.
Sankary, N., N. Oliker, A. Ostfeld, A. Rasekh, R. Wu, M. K. Banks, and M. Porterfield. 2015. “Mobile sensors for water quality management in water distribution systems.” In Proc., World Environmental and Water Resources Congress 2015, 792–801. Reston, VA: ASCE. http://ascelibrary.org/doi/10.1061/9780784479162.073.
Santonastaso, G. F., E. Creaco, A. D. Nardo, and M. D. Natale. 2018. “Post-disaster response and restauration of b-town network based on primary network.” In Proc., WDSA/CCWI Joint Conf. 2018. Beijing: Water Distribution Systems Analysis and Computing and Control for the Water Industry.
Schade, C., N. Wright, R. Gupta, D. Latif, A. Jha, and J. Robinson. 2015. “Self-reported household impacts of large-scale chemical contamination of the public water supply, Charleston, West Virginia, USA.” PLOS One 10 (5): e0126744. https://doi.org/10.1371/journal.pone.0126744.
Schwartz, R., O. Lahav, and A. Ostfeld. 2014. “Integrated hydraulic and organophosphate pesticide injection simulations for enhancing event detection in water distribution systems.” Water Res. 63 (Oct): 271–284. https://doi.org/10.1016/j.watres.2014.06.030.
Sela, L., and S. Amin. 2018. “Robust sensor placement for pipeline monitoring: Mixed integer and greedy optimization.” Adv. Eng. Inf. 36 (Aug): 55–63. https://doi.org/10.1016/j.aei.2018.02.004.
Sela, L., and M. Housh. 2019. “Increasing usability of water distribution analysis tools through plug-in development in EPANET.” J. Hydraul. Eng. 145 (5): 02519001. https://doi.org/10.1061/(ASCE)HY.1943-7900.0001596.
Selcuki, A., and M. Yucemen. 2000. “Reliability of lifeline networks with multiple sources under seismic hazard.” Nat. Hazards 21 (1): 1–18.
Seth, A., K. A. Klise, J. D. Siirola, T. Haxton, and C. D. Laird. 2016. “Testing contamination source identification methods for water distribution networks.” J. Water Resour. Plann. Manage. 142 (4): 04016001. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000619.
Shafiee, M. E., Z. Barker, and A. Rasekh. 2018a. “Enhancing water system models by integrating big data.” Sustainable Cities Soc. 37 (Feb): 485–491. https://doi.org/10.1016/j.scs.2017.11.042.
Shafiee, M. E., and E. Z. Berglund. 2015. “Real-time guidance for hydrant flushing using sensor-hydrant decision trees.” J. Water Resour. Plann. Manage. 141 (6): 04014079. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000475.
Shafiee, M. E., and E. Z. Berglund. 2016. “Agent-based modeling and evolutionary computation for disseminating public advisories about hazardous material emergencies.” Comput. Environ. Urban Syst. 57 (May): 12–25. https://doi.org/10.1016/j.compenvurbsys.2016.01.001.
Shafiee, M. E., and E. Z. Berglund. 2017. “Complex adaptive systems framework to simulate the performance of hydrant flushing rules and broadcasts during a water distribution system contamination event.” J. Water Resour. Plann. Manage. 143 (4): 04017001. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000744.
Shafiee, M. E., E. Z. Berglund, and M. K. Lindell. 2018b. “An agent-based modeling framework for assessing the public health protection of water advisories.” Water Resour. Manage. 32 (6): 2033–2059. https://doi.org/10.1007/s11269-018-1916-6.
Shafiee, M. E., and E. M. Zechman. 2013. “An agent-based modeling framework for sociotechnical simulation of water distribution contamination events.” J. Hydroinf. 15 (3): 862. https://doi.org/10.2166/hydro.2013.158.
Shahandashti, S., and B. Pudasaini. 2019. “Proactive seismic rehabilitation decision-making for water pipe networks using simulated annealing.” Nat. Hazard. Rev. 20 (2): 04019003. https://doi.org/10.1061/(ASCE)NH.1527-6996.0000328.
Shang, F., J. G. Uber, and L. A. Rossman. 2008a. EPANET multi-species extension software and user’s manual. Washington, DC: USEPA.
Shang, F., J. G. Uber, and L. A. Rossman. 2008b. “Modeling reaction and transport of multiple species in water distribution systems.” Environ. Sci. Technol. 42 (3): 808–814. https://doi.org/10.1021/es072011z.
Shen, H., and E. McBean. 2011. “False negative/positive issues in contaminant source identification for water-distribution systems.” J. Water Resour. Plann. Manage. 138 (3): 230–236. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000162.
Shi, P., and T. D. O’Rourke. 2006. Seismic response modeling of water supply systems. Buffalo, NY: MCEER: Earthquake Engineering to Extreme Events. https://www.eng.buffalo.edu/mceer-reports/08/08-0016.pdf.
Shuang, Q., Y. Liu, Y. Tang, J. Liu, and K. Shuang. 2017. “System reliability evaluation in water distribution networks with the impact of valves experiencing cascading failures.” Water 9 (6): 413. https://doi.org/10.3390/w9060413.
Shuang, Q., M. Zhang, and Y. Yuan. 2014. “Node vulnerability of water distribution networks under cascading failures.” Reliab. Eng. Syst. Saf. 124 (Apr): 132–141. https://doi.org/10.1016/j.ress.2013.12.002.
Shypanski, A., V.-H. Pham, A. Cunha, and E. Yanful. 2011. Interdependent infrastructure modelling: Integration of domestic water models. New York: IEEE.
Skolicki, Z., T. Arciszewski, M. Houck, and K. De Jong. 2008. “Co-evolution of terrorist and security scenarios for water distribution systems.” Adv. Eng. Software 39 (10): 801–811. https://doi.org/10.1016/j.advengsoft.2008.04.001.
Skolicki, Z., M. M. Wadda, M. H. Houck, and T. Arciszewski. 2006. “Reduction of physical threats to water distribution systems.” J. Water Resour. Plann. Manage. 132 (4): 211–217. https://doi.org/10.1061/(ASCE)0733-9496(2006)132:4(211).
Spence, S., J. S. Rosen, and T. Bartrand. 2013. “Using online water quality data to detect events in a distribution system.” J. Am. Water Works Assn. 105 (7): 22–26. https://doi.org/10.5942/jawwa.2013.105.0112.
Sun, L., H. Yan, K. Xin, and T. Tao. 2019. “Contamination source identification in water distribution networks using convolutional neural network.” Environ. Sci. Pollut. Res. 26 (36): 36786–36797. https://doi.org/10.1007/s11356-019-06755-x.
Suresh, M. A., R. Stoleru, E. M. Zechman, and B. Shihada. 2013. “On event detection and localization in acyclic flow networks.” IEEE Trans. Syst. Man Cybern. Part A Syst. Humans 43 (3): 708–723. https://doi.org/10.1109/TSMCA.2012.2210411.
Suresh, M. A., W. Zhang, W. Gong, R. Stoleru, A. Rasekh, and M. K. Banks. 2015. “Toward optimal monitoring of flow-based systems using mobile wireless sensor networks.” ACM Trans. Sens. Netw. 11 (3): 1–37. https://doi.org/10.1145/2700256.
Sweetapple, C., F. Meng, R. Farmani, G. Fu, and D. Butler. 2018. “A heuristic approach to water network post-disaster response and restoration.” In Proc., WDSA/CCWI Joint Conf. 2018. Beijing: Water Distribution Systems Analysis and Computing and Control for the Water Industry.
Tabucchi, T., R. Davidson, and S. Brink. 2010. “Simulation of post-earthquake water supply system restoration.” Civ. Eng. Environ. Syst. 27 (4): 263–279. https://doi.org/10.1080/10286600902862615.
Taormina, R., et al. 2018. “Battle of the attack detection algorithms: Disclosing cyber attacks on water distribution networks.” J. Water Resour. Plann. Manage. 144 (8): 04018048. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000969.
Taormina, R., and S. Galelli. 2018. “Deep-learning approach to the detection and localization of cyber-physical attacks on water distribution systems.” J. Water Resour. Plann. Manage. 144 (10): 04018065. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000983.
Taormina, R., S. Galelli, H. Douglas, N. O. Tippenhauer, E. Salomons, and A. Ostfeld. 2019. “A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems.” Environ. Modell. Software 112 (Feb): 46–51. https://doi.org/10.1016/j.envsoft.2018.11.008.
Taormina, R., S. Galelli, N. O. Tippenhauer, E. Salomons, and A. Ostfeld. 2017. “Characterizing cyber-physical attacks on water distribution systems.” J. Water Resour. Plann. Manage. 143 (5): 04017009. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000749.
Teunis, P. F. M., M. Xu, K. K. Fleming, J. Yang, C. L. Moe, and M. W. Lechevallier. 2010. “Enteric virus infection risk from intrusion of sewage into a drinking water distribution network.” Environ. Sci. Technol. 44 (22): 8561–8566. https://doi.org/10.1021/es101266k.
Tidwell, V. C., J. A. Cooper, and C. J. Silva. 2005. “Threat assessment of water supply systems using Markov latent effects modeling.” J. Water Resour. Plann. Manage. 131 (3): 218–227. https://doi.org/10.1061/(ASCE)0733-9496(2005)131:3(218).
Turner, J. P., J. Qiao, M. Lawley, J.-P. Richard, and D. M. Abraham. 2012. “Mitigating shortage and distribution costs in damaged water networks.” Socio-Econ. Plann. Sci. 46 (4): 315–326. https://doi.org/10.1016/j.seps.2012.02.001.
Uber, J., S. Hatchett, S. Hooper, D. Boccelli, H. Woo, and R. Janke. 2014. Water utility case study of real-time network hydraulic and water quality modeling using EPANET-RTX libraries. Washington, DC: USEPA.
Uber, J. G., D. L. Boccelli, S. Hatchett, Z. Kapelan, J. Saldarriaga, A. R. Simpson, M. E. Tryby, and J. E. van Zyl. 2018. “Let’s get moving and write software: An open source project for EPANET.” J. Water Resour. Plann. Manage. 144 (4): 01818001. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000918.
US Congress. 2018. “Public law 115-270: America’s water infrastructure act of 2018.” Accessed May 27, 2020. https://www.congress.gov/115/bills/s3021/BILLS-115s3021enr.pdf.
US Dept. of Homeland Security. 2013. “Homeland security exercise and evaluation program (HSEEP).” Accessed May 27, 2020. https://www.fema.gov/media-library/assets/documents/32326.
US Dept. of Homeland Security and USEPA. 2015. “Water and wastewater systems sector-specific plan.” Accessed May 27, 2020. https://www.cisa.gov/publication/nipp-ssp-water-2015.
USEPA. 2012. CANARY user’s manual version 4.3.2. Washington, DC: USEPA.
USEPA. 2014. Water security toolkit user manual: Version 1.3. Washington, DC: USEPA.
USEPA. 2015. Enhancements to the EPANET-RTX (real-time analytics) software libraries-2015. Washington, DC: USEPA.
Van Abel, N., E. J. M. Blokker, P. W. M. H. Smeets, J. S. Meschke, and G. J. Medema. 2014. “Sensitivity of quantitative microbial risk assessments to assumptions about exposure to multiple consumption events per day.” J. Water Health 12 (4): 727–735. https://doi.org/10.2166/wh.2014.037.
Van Bloemen Waanders, B. G., B. T. Lorenz, and C. D. Laird. 2003. “Nonlinear programming strategies for source detection of municipal water networks.” In Proc., World Water Congress 2003, 2–11. Reston, VA: ASCE.
Vankayala, P., A. Sankarasubramanian, S. R. Ranjithan, and G. Mahinthakumar. 2009. “Contaminant source identification in water distribution networks under conditions of demand uncertainty.” Environ. Forensics 10 (3): 253–263. https://doi.org/10.1080/15275920903140486.
Viñas, V., A. Malm, and T. J. R. Pettersson. 2019. “Overview of microbial risks in water distribution networks and their health consequences: Quantification, modelling, trends, and future implications.” Can. J. Civ. Eng. 159 (46): 149–159. https://doi.org/10.1139/cjce-2018-0216.
Wagner, D. E., R. M. Neupauer, and C. Cichowitz. 2015. “Adjoint-based probabilistic source characterization in water-distribution systems with transient flows and imperfect sensors.” J. Water Resour. Plann. Manage. 141 (9): 04015003. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000508.
Wang, C., and S. Zhou. 2017. “Contamination source identification based on sequential Bayesian approach for water distribution network with stochastic demands.” IISE Trans. 49 (9): 899–910. https://doi.org/10.1080/24725854.2017.1315782.
Wang, H., and K. W. Harrison. 2013a. “Bayesian approach to contaminant source characterization in water distribution systems: Adaptive sampling framework.” Stochastic Environ. Res. Risk Assess. 27 (8): 1921–1928. https://doi.org/10.1007/s00477-013-0727-9.
Wang, H., and K. W. Harrison. 2013b. “Bayesian update method for contaminant source characterization in water distribution systems.” J. Water Resour. Plann. Manage. 139 (1): 13–22. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000221.
Wang, H., and K. W. Harrison. 2014. “Improving efficiency of the Bayesian approach to water distribution contaminant source characterization with support vector regression.” J. Water Resour. Plann. Manage. 140 (1): 3–11. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000323.
Wang, S., L. Hong, and X. Chen. 2012. “Vulnerability analysis of interdependent infrastructure systems: A methodological framework.” Physica A 391 (11): 3323–3335. https://doi.org/10.1016/j.physa.2011.12.043.
Watson, J.-P., R. Murray, and W. E. Hart. 2009. “Formulation and optimization of robust sensor placement problems for drinking water contamination warning systems.” J. Infrastruct. Syst. 15 (Dec): 330–339. https://doi.org/10.1061/(ASCE)1076-0342(2009)15:4(330).
Weber, A., and A. McGilinchy. 2018. “Austin’s boil-water order is on track to end later today.” Accessed May 27, 2020. https://www.kut.org/post/austins-boil-water-order-track-end-later-today.
Welter, G., M. Lechevallier, J. Cotruvo, R. Moser, and S. Spangler. 2009. Guidance for decontamination of water system infrastructure. Denver: Water Research Foundation.
Williamson, F., J. Van Den Broeke, T. Koster, M. Klein Koerkamp, J. W. Verhoef, J. Hoogterp, E. Trietsch, and B. R. De Graaf. 2014. “Online water quality monitoring in the distribution network.” Water Pract. Technol. 9 (4): 575–585. https://doi.org/10.2166/wpt.2014.064.
Winter, J. 2015. “Law enforcement bulletin warned of ISIS urging Jihad attacks on US soil.” Accessed May 27, 2020. https://www.foxnews.com/world/law-enforcement-bulletin-warned-of-isis-urging-jihad-attacks-on-us-soil.
World Health Organization. 2017. Guidelines for drinking-water quality. Geneva: World Health Organization.
Wu, R. 2014. “Development of a mobile sensor for potable water quality monitoring.” Ph.D. thesis, Lyles School of Civil Engineering, Purdue Univ.
Xin, K., T. Tao, Y. Wang, and S. Liu. 2012. “Hazard and vulnerability evaluation of water distribution system in cases of contamination intrusion accidents.” Front. Environ. Sci. Eng. China 6 (6): 839–848. https://doi.org/10.1007/s11783-012-0409-8.
Yang, J., M. W. LeChevallier, P. F. M. Teunis, and M. Xu. 2011. “Managing risks from virus intrusion into water distribution systems due to pressure transients.” J. Water Health 9 (2): 291–305. https://doi.org/10.2166/wh.2011.102.
Yang, J. Y., J. A. Goodrich, R. M. Clark, and S. Y. Li. 2008. “Modeling and testing of reactive contaminant transport in drinking water pipes: Chlorine response and implications for online contaminant detection.” Water Res. 42 (6–7): 1397–1412. https://doi.org/10.1016/j.watres.2007.10.009.
Yang, X., and D. L. Boccelli. 2013. “Bayesian approach for real-time probabilistic contamination source identification.” J. Water Resour. Plann. Manage. 140 (8): 04014019. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000381.
Yeung, E., D. R. Judi, and W. B. Daniel. 2017. “Contingency analysis of water distribution networks using quadratic sensitivity functions.” In Proc., 2017 American Control Conf. (ACC), 228–233. New York: IEEE.
Yoo, D. G., D. Jung, D. Kang, and J. H. Kim. 2017. “Seismic reliability-based multiobjective design of water distribution system: Sensitivity analysis.” J. Water Resour. Plann. Manage. 143 (2): 06016005. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000727.
Yoo, D. G., D. Jung, D. Kang, J. H. Kim, and K. Lansey. 2016. “Seismic hazard assessment model for urban water supply networks.” J. Water Resour. Plann. Manage. 142 (2): 04015055. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000584.
Yoo, D. G., J. H. Lee, and B. Y. Lee. 2019. “Comparative study of hydraulic simulation techniques for water supply networks under earthquake hazard.” Water 11 (2): 333. https://doi.org/10.3390/w11020333.
Zafari, M., M. Tabesh, and S. Nazif. 2017. “Minimizing the adverse effects of contaminant propagation in water distribution networks considering the pressure-driven analysis method.” J. Water Resour. Plann. Manage. 143 (12): 04017072. https://doi.org/10.1061/(ASCE)WR.1943-5452.0000848.
Zechman, E. M. 2011. “Agent-based modeling to simulate contamination events and evaluate threat management strategies in water distribution systems.” Risk Anal. 31 (5): 758–772. https://doi.org/10.1111/j.1539-6924.2010.01564.x.
Zechman, E. M. 2013. “Integrating evolution strategies and genetic algorithms with agent-based modeling for flushing a contaminated water distribution system.” J. Hydroinf. 15 (3): 798. https://doi.org/10.2166/hydro.2013.102.
Zechman, E. M., and S. R. Ranjithan. 2009. “Evolutionary computation-based methods for characterizing contaminant sources in a water distribution system.” J. Water Resour. Plann. Manage. 135 (5): 334–343. https://doi.org/10.1061/(ASCE)0733-9496(2009)135:5(334).
Zhang, Q., F. Zheng, K. Diao, B. Ulanicki, and Y. Huang. 2018. “Solving the battle of post-disaster response and restoration (BPDRR) problem with the aid of multi-phase optimization framework.” In Proc., WDSA/CCWI Joint Conf. 2018. Beijing: Water Distribution Systems Analysis and Computing and Control for the Water Industry.
Zhang, Y., N. Yang, and U. Lall. 2016. “Modeling and simulation of the vulnerability of interdependent power-water infrastructure networks to cascading failures.” J. Syst. Sci. Syst. Eng. 25 (1): 102–118. https://doi.org/10.1007/s11518-016-5295-3.
Zhao, H., D. Hou, P. Huang, and G. Zhang. 2014. “Water quality event detection in drinking water network.” Water Air Soil Pollut. 225 (11): 2183. https://doi.org/10.1007/s11270-014-2183-7.
Zhao, Y., R. Schwartz, E. Salomons, A. Ostfeld, and H. V. Poor. 2016. “New formulation and optimization methods for water sensor placement.” Environ. Modell. Software 76 (Feb): 128–136. https://doi.org/10.1016/j.envsoft.2015.10.030.

Information & Authors

Information

Published In

Go to Journal of Water Resources Planning and Management
Journal of Water Resources Planning and Management
Volume 146Issue 8August 2020

History

Published online: Jun 13, 2020
Published in print: Aug 1, 2020
Discussion open until: Nov 13, 2020

Permissions

Request permissions for this article.

Authors

Affiliations

Emily Zechman Berglund, Ph.D., M.ASCE [email protected]
Professor, Dept. of Civil, Construction, and Environmental Engineering, North Carolina State Univ., C.B. 7908, Raleigh, NC 27695 (corresponding author). Email: [email protected]
Jorge E. Pesantez, S.M.ASCE https://orcid.org/0000-0002-1537-6006
Research Assistant, Dept. of Civil, Construction, and Environmental Engineering, North Carolina State Univ., C.B. 7908, Raleigh, NC 27695. ORCID: https://orcid.org/0000-0002-1537-6006
Amin Rasekh, Ph.D.
Lead R&D Engineer, Xylem Inc., 8601 Six Forks Rd., Raleigh, NC 27615.
M. Ehsan Shafiee, Ph.D.
Lead R&D Engineer, Xylem Inc., 8601 Six Forks Rd., Raleigh, NC 27615.
Lina Sela, Ph.D., M.ASCE https://orcid.org/0000-0002-5834-8451
Assistant Professor, Dept. of Civil, Architectural, and Environmental Engineering, Univ. of Texas at Austin, 301 E Dean Keeton St. Stop C1786, Austin, TX 78712. ORCID: https://orcid.org/0000-0002-5834-8451
Terranna Haxton, Ph.D., M.ASCE
Environmental Engineer, Office of Research and Development, US Environmental Protection Agency, 26 W. Martin Luther King Dr., Cincinnati, OH 45268.

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share