Methodologies for Evaluating the Vulnerability of National Systems. Volume 1. Methodologies and Examples

The study documents methodologies that can be used to evaluate some vulnerabilities of the U. S. to strategic nuclear attack. The collection of component methodologies is called MEVUNS, Methodologies for Evaluating the Vulnerability of National Systems. The study comprises three volumes. The first c...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: McGill, James T, Bracken, Jerome, Davis, Carolyn D, Dolins, Lynn P, Pitcher, Hugh M, Pratt, Sheryll A, Schmidt, Leo A, Thompson, Jacqueline E
Format: Report
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator McGill, James T
Bracken, Jerome
Davis, Carolyn D
Dolins, Lynn P
Pitcher, Hugh M
Pratt, Sheryll A
Schmidt, Leo A
Thompson, Jacqueline E
description The study documents methodologies that can be used to evaluate some vulnerabilities of the U. S. to strategic nuclear attack. The collection of component methodologies is called MEVUNS, Methodologies for Evaluating the Vulnerability of National Systems. The study comprises three volumes. The first contains methodologies and examples of their use. The second contains results of a sensitivity analysis performed with the methodologies. The third is a user's guide for MEVUNS computer programs.
format Report
fullrecord <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_AD0753015</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>AD0753015</sourcerecordid><originalsourceid>FETCH-dtic_stinet_AD07530153</originalsourceid><addsrcrecordid>eNqFjTEKwkAQANNYiPoDi_2AISEEa9ETG22UtGE1m-Rg71Zye2J-bwobK6spBmbmSX8m7aURls5SgFYGMC_kiGp9B9oTVJE9DXi3bHUEaeEyOfHIcB2DkgspVMLREeQp_NbQN2De6J5MYZnMWuRAqy8XyfpobvvTplH7qMO0I613h2xbFlleFn_0B2dOPPU</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>Methodologies for Evaluating the Vulnerability of National Systems. Volume 1. Methodologies and Examples</title><source>DTIC Technical Reports</source><creator>McGill, James T ; Bracken, Jerome ; Davis, Carolyn D ; Dolins, Lynn P ; Pitcher, Hugh M ; Pratt, Sheryll A ; Schmidt, Leo A ; Thompson, Jacqueline E</creator><creatorcontrib>McGill, James T ; Bracken, Jerome ; Davis, Carolyn D ; Dolins, Lynn P ; Pitcher, Hugh M ; Pratt, Sheryll A ; Schmidt, Leo A ; Thompson, Jacqueline E ; INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA PROGRAM ANALYSIS DIV</creatorcontrib><description>The study documents methodologies that can be used to evaluate some vulnerabilities of the U. S. to strategic nuclear attack. The collection of component methodologies is called MEVUNS, Methodologies for Evaluating the Vulnerability of National Systems. The study comprises three volumes. The first contains methodologies and examples of their use. The second contains results of a sensitivity analysis performed with the methodologies. The third is a user's guide for MEVUNS computer programs.</description><language>eng</language><subject>AREA COVERAGE ; Civil Defense ; COMPUTERIZED SIMULATION ; DAMAGE ASSESSMENT ; INDUSTRIES ; MATHEMATICAL MODELS ; NUCLEAR WARFARE ; NUCLEAR WARFARE CASUALTIES ; POST ATTACK RECOVERY ; PROTECTION ; SHELTERS ; SURVIVAL(PERSONNEL) ; VULNERABILITY</subject><creationdate>1972</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,776,881,27544,27545</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/AD0753015$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>McGill, James T</creatorcontrib><creatorcontrib>Bracken, Jerome</creatorcontrib><creatorcontrib>Davis, Carolyn D</creatorcontrib><creatorcontrib>Dolins, Lynn P</creatorcontrib><creatorcontrib>Pitcher, Hugh M</creatorcontrib><creatorcontrib>Pratt, Sheryll A</creatorcontrib><creatorcontrib>Schmidt, Leo A</creatorcontrib><creatorcontrib>Thompson, Jacqueline E</creatorcontrib><creatorcontrib>INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA PROGRAM ANALYSIS DIV</creatorcontrib><title>Methodologies for Evaluating the Vulnerability of National Systems. Volume 1. Methodologies and Examples</title><description>The study documents methodologies that can be used to evaluate some vulnerabilities of the U. S. to strategic nuclear attack. The collection of component methodologies is called MEVUNS, Methodologies for Evaluating the Vulnerability of National Systems. The study comprises three volumes. The first contains methodologies and examples of their use. The second contains results of a sensitivity analysis performed with the methodologies. The third is a user's guide for MEVUNS computer programs.</description><subject>AREA COVERAGE</subject><subject>Civil Defense</subject><subject>COMPUTERIZED SIMULATION</subject><subject>DAMAGE ASSESSMENT</subject><subject>INDUSTRIES</subject><subject>MATHEMATICAL MODELS</subject><subject>NUCLEAR WARFARE</subject><subject>NUCLEAR WARFARE CASUALTIES</subject><subject>POST ATTACK RECOVERY</subject><subject>PROTECTION</subject><subject>SHELTERS</subject><subject>SURVIVAL(PERSONNEL)</subject><subject>VULNERABILITY</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>1972</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNqFjTEKwkAQANNYiPoDi_2AISEEa9ETG22UtGE1m-Rg71Zye2J-bwobK6spBmbmSX8m7aURls5SgFYGMC_kiGp9B9oTVJE9DXi3bHUEaeEyOfHIcB2DkgspVMLREeQp_NbQN2De6J5MYZnMWuRAqy8XyfpobvvTplH7qMO0I613h2xbFlleFn_0B2dOPPU</recordid><startdate>197206</startdate><enddate>197206</enddate><creator>McGill, James T</creator><creator>Bracken, Jerome</creator><creator>Davis, Carolyn D</creator><creator>Dolins, Lynn P</creator><creator>Pitcher, Hugh M</creator><creator>Pratt, Sheryll A</creator><creator>Schmidt, Leo A</creator><creator>Thompson, Jacqueline E</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>197206</creationdate><title>Methodologies for Evaluating the Vulnerability of National Systems. Volume 1. Methodologies and Examples</title><author>McGill, James T ; Bracken, Jerome ; Davis, Carolyn D ; Dolins, Lynn P ; Pitcher, Hugh M ; Pratt, Sheryll A ; Schmidt, Leo A ; Thompson, Jacqueline E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_AD07530153</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>1972</creationdate><topic>AREA COVERAGE</topic><topic>Civil Defense</topic><topic>COMPUTERIZED SIMULATION</topic><topic>DAMAGE ASSESSMENT</topic><topic>INDUSTRIES</topic><topic>MATHEMATICAL MODELS</topic><topic>NUCLEAR WARFARE</topic><topic>NUCLEAR WARFARE CASUALTIES</topic><topic>POST ATTACK RECOVERY</topic><topic>PROTECTION</topic><topic>SHELTERS</topic><topic>SURVIVAL(PERSONNEL)</topic><topic>VULNERABILITY</topic><toplevel>online_resources</toplevel><creatorcontrib>McGill, James T</creatorcontrib><creatorcontrib>Bracken, Jerome</creatorcontrib><creatorcontrib>Davis, Carolyn D</creatorcontrib><creatorcontrib>Dolins, Lynn P</creatorcontrib><creatorcontrib>Pitcher, Hugh M</creatorcontrib><creatorcontrib>Pratt, Sheryll A</creatorcontrib><creatorcontrib>Schmidt, Leo A</creatorcontrib><creatorcontrib>Thompson, Jacqueline E</creatorcontrib><creatorcontrib>INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA PROGRAM ANALYSIS DIV</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>McGill, James T</au><au>Bracken, Jerome</au><au>Davis, Carolyn D</au><au>Dolins, Lynn P</au><au>Pitcher, Hugh M</au><au>Pratt, Sheryll A</au><au>Schmidt, Leo A</au><au>Thompson, Jacqueline E</au><aucorp>INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA PROGRAM ANALYSIS DIV</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>Methodologies for Evaluating the Vulnerability of National Systems. Volume 1. Methodologies and Examples</btitle><date>1972-06</date><risdate>1972</risdate><abstract>The study documents methodologies that can be used to evaluate some vulnerabilities of the U. S. to strategic nuclear attack. The collection of component methodologies is called MEVUNS, Methodologies for Evaluating the Vulnerability of National Systems. The study comprises three volumes. The first contains methodologies and examples of their use. The second contains results of a sensitivity analysis performed with the methodologies. The third is a user's guide for MEVUNS computer programs.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_dtic_stinet_AD0753015
source DTIC Technical Reports
subjects AREA COVERAGE
Civil Defense
COMPUTERIZED SIMULATION
DAMAGE ASSESSMENT
INDUSTRIES
MATHEMATICAL MODELS
NUCLEAR WARFARE
NUCLEAR WARFARE CASUALTIES
POST ATTACK RECOVERY
PROTECTION
SHELTERS
SURVIVAL(PERSONNEL)
VULNERABILITY
title Methodologies for Evaluating the Vulnerability of National Systems. Volume 1. Methodologies and Examples
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T12%3A43%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=Methodologies%20for%20Evaluating%20the%20Vulnerability%20of%20National%20Systems.%20Volume%201.%20Methodologies%20and%20Examples&rft.au=McGill,%20James%20T&rft.aucorp=INSTITUTE%20FOR%20DEFENSE%20ANALYSES%20ALEXANDRIA%20VA%20PROGRAM%20ANALYSIS%20DIV&rft.date=1972-06&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EAD0753015%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true