科技报告详细信息
Capturing the uncertainty in adversary attack simulations.
Darby, John L. ; Brooks, Traci N. ; Berry, Robert Bruce
关键词: DETECTION;    EQUATIONS;    EQUIPMENT;    EVALUATION;    PROBABILITY;    RESOURCES;    SAMPLING;    SECURITY;    TIME DELAY;    TRAINING;    WORK Terrorism-Vulnerability-Analysis.;    Human intrusion-Analysis-Simulation.;   
DOI  :  10.2172/983673
RP-ID  :  SAND2008-5730
PID  :  OSTI ID: 983673
Others  :  TRN: US201014%%1749
学科分类:社会科学、人文和艺术(综合)
美国|英语
来源: SciTech Connect
PDF
【 摘 要 】
This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.
【 预 览 】
附件列表
Files Size Format View
RO201705180001181LZ 250KB PDF download
  文献评价指标  
  下载次数:7次 浏览次数:34次