Contribution to Diffusion Processes Application in the Area of Critical Infrastructure Security Assessment

Abstract:

Article Preview

Assessing the vulnerability of critical infrastructure objects is of major concern when dealing with the process of dependability and risk management. Special attention is paid to the objects of higher interest, such as nuclear power plants. In spite of the protection of these objects, there is still a certain level of a potential threat. The aim of the paper is to describe a possible way of attacking on the object in order to get into a particular part of it. Several characteristics of an adversary ́s attempt were obtained. For this reason as well as for modelling adversary ́s behaviour diffusion processes have been used.

Info:

Periodical:

Edited by:

Adrian Olaru

Pages:

539-548

Citation:

D. Valis and K. Pietrucha-Urbanik, "Contribution to Diffusion Processes Application in the Area of Critical Infrastructure Security Assessment", Applied Mechanics and Materials, Vol. 436, pp. 539-548, 2013

Online since:

October 2013

Export:

Price:

$38.00

* - Corresponding Author

[1] R. A. Blais, M. D. Henry, S. R. Lilley, J. A. Pan, M. Grimes, Y. Y. Haimes: Risk-based methodology for assessing and managing the severity of a terrorist attack 2009 IEEE Systems and Information Engineering Design Symposium, SIEDS '09, art. no. 5166175: 171-176.

DOI: https://doi.org/10.1109/sieds.2009.5166175

[2] M. Bohner, A. Peterson: Dynamic Equations on Time Scales: An Introduction with Applications. Birkhäuser, Boston, (2001).

[3] M. Bohner, S. Sanyal: The Stochastic Dynamic Exponential and Geometric Brownian Motion on Isolated Time Scale. Community Mathematical Anals 2010; 8: 120-135.

[4] M. Csörgö: Random Walk and Brownian Local Times in Wiener Sheets. Periodica Mathematica Hungarica 61 (2010) 1-21.

[5] A. F. Desmond, G. R. Chapman: Modelling Task Completion Data with Inverse Gaussian Mixtures. Applied Statistics 4(42) (1993) 603-613.

DOI: https://doi.org/10.2307/2986178

[6] K. A. Doksum, A. Hóyland: Models for Variable-Stress Accelerated Life Testing Experiments Based on Wiener Processes and the Inverse Gaussian Distribution. Technometrics 1(34)(1992) 74-82.

DOI: https://doi.org/10.2307/1269554

[7] A. Studzinski, K. Pietrucha-Urbanik, Risk Indicators of Water Network Operation. International Conference On Safety & Environment In Process & Power Industry, PT 1 Book Series: Chemical Engineering Transactions 26 (2012).

[8] T. J. Kelly, K. C. Hofacre, T. L. Derringer, K. B. Riggs, E. N. Koglin: Testing of safe buildings detection technologies and other homeland security technologies in EPA's Environmental Technology Verification (ETV) program, Proceedings of the Air and Waste Management Association's Annual Meeting and Exhibition 2004; 3449-3457.

[9] R. L. Kemp: Assessing the vulnerability of buildings, Journal of Applied Fire Science 14 (1) (2007) 53-61.

[10] J. Mueller: Assessing Measures Designed to Protect the Homeland, Policy Studies Journal 1(38) (2010) 1-21.

[11] K. Pietrucha-Urbanik, A. Studziński: Analysis of water pipe breakage in Krosno, Poland. Environmental Engineering IV, Pawłowski A., Dudzińska M. R. Pawłowski L. (eds), Taylor & Francis Group, London, 2013, 59-62.

DOI: https://doi.org/10.1201/b14894-10

[12] M. G. Stewart: Cost effectiveness of risk mitigation strategies for protection of buildings against terrorist attack. Journal of Performance of Constructed Facilities 2(22) (2008) 115-120.

DOI: https://doi.org/10.1061/(asce)0887-3828(2008)22:2(115)

[13] D. Valis, Z. Vintr, J. Malach: Selected aspects of physical structures vulnerability - state-of-the-art. Eksploatacja i Niezawodnosc - Maintenance and Reliability 14(3) (2012) 189-194.

[14] G. S. French, D. Gootzit: Defining and assessing vulnerability of infrastructure to terrorist attack, Vulnerability, Uncertainty, and Risk: Analysis, Modelling, and Management. Proceedings of the ICVRAM 2011 and ISUMA 2011 Conferences 2011; 782-789.

DOI: https://doi.org/10.1061/41170(400)95

[15] W. H. Zehrt Jr, P. F. Acosta: Analysis and design of structures to withstand terrorist attack, Proceedings of the Structures Congress and Exposition 2003; 585-592.

[16] Š. Čorňák: The assessment of brake fluids based on glycols and the toxicity. Transport Means - Proceedings of the International Conference, 1(1) (2012) 135-140.

[17] Š. Čorňák: Selected problems of drivers microclimate. In: Transport Means – Proceedings of the 13th International Conference. Kaunas: Kaunas University of Technology, (2009).

[18] M. Revie, T. Bedford, L. Walls: Supporting Reliability Decisions During Defence Procurement Using a Bayes Linear Methodology. IEEE Transactions on Engineering Management. 4(58) (2011), 662-673.

DOI: https://doi.org/10.1109/tem.2011.2131655

[19] F. Shafti, T. Bedford, L. A. Deleris, J. R. M. Hosnins, H. Shen, L. Walls, Service operation classification for risk management. IBM Journal of Research and Development, 3(54) (2010), 662-673.

Fetching data from Crossref.
This may take some time to load.