Methodologies for Evaluating the Vulnerability of National Systems. Volume 1. Methodologies and Examples
The study documents methodologies that can be used to evaluate some vulnerabilities of the U. S. to strategic nuclear attack. The collection of component methodologies is called MEVUNS, Methodologies for Evaluating the Vulnerability of National Systems. The study comprises three volumes. The first c...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Report |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | McGill, James T Bracken, Jerome Davis, Carolyn D Dolins, Lynn P Pitcher, Hugh M Pratt, Sheryll A Schmidt, Leo A Thompson, Jacqueline E |
description | The study documents methodologies that can be used to evaluate some vulnerabilities of the U. S. to strategic nuclear attack. The collection of component methodologies is called MEVUNS, Methodologies for Evaluating the Vulnerability of National Systems. The study comprises three volumes. The first contains methodologies and examples of their use. The second contains results of a sensitivity analysis performed with the methodologies. The third is a user's guide for MEVUNS computer programs. |
format | Report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_AD0753015</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>AD0753015</sourcerecordid><originalsourceid>FETCH-dtic_stinet_AD07530153</originalsourceid><addsrcrecordid>eNqFjTEKwkAQANNYiPoDi_2AISEEa9ETG22UtGE1m-Rg71Zye2J-bwobK6spBmbmSX8m7aURls5SgFYGMC_kiGp9B9oTVJE9DXi3bHUEaeEyOfHIcB2DkgspVMLREeQp_NbQN2De6J5MYZnMWuRAqy8XyfpobvvTplH7qMO0I613h2xbFlleFn_0B2dOPPU</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>Methodologies for Evaluating the Vulnerability of National Systems. Volume 1. Methodologies and Examples</title><source>DTIC Technical Reports</source><creator>McGill, James T ; Bracken, Jerome ; Davis, Carolyn D ; Dolins, Lynn P ; Pitcher, Hugh M ; Pratt, Sheryll A ; Schmidt, Leo A ; Thompson, Jacqueline E</creator><creatorcontrib>McGill, James T ; Bracken, Jerome ; Davis, Carolyn D ; Dolins, Lynn P ; Pitcher, Hugh M ; Pratt, Sheryll A ; Schmidt, Leo A ; Thompson, Jacqueline E ; INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA PROGRAM ANALYSIS DIV</creatorcontrib><description>The study documents methodologies that can be used to evaluate some vulnerabilities of the U. S. to strategic nuclear attack. The collection of component methodologies is called MEVUNS, Methodologies for Evaluating the Vulnerability of National Systems. The study comprises three volumes. The first contains methodologies and examples of their use. The second contains results of a sensitivity analysis performed with the methodologies. The third is a user's guide for MEVUNS computer programs.</description><language>eng</language><subject>AREA COVERAGE ; Civil Defense ; COMPUTERIZED SIMULATION ; DAMAGE ASSESSMENT ; INDUSTRIES ; MATHEMATICAL MODELS ; NUCLEAR WARFARE ; NUCLEAR WARFARE CASUALTIES ; POST ATTACK RECOVERY ; PROTECTION ; SHELTERS ; SURVIVAL(PERSONNEL) ; VULNERABILITY</subject><creationdate>1972</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,776,881,27544,27545</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/AD0753015$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>McGill, James T</creatorcontrib><creatorcontrib>Bracken, Jerome</creatorcontrib><creatorcontrib>Davis, Carolyn D</creatorcontrib><creatorcontrib>Dolins, Lynn P</creatorcontrib><creatorcontrib>Pitcher, Hugh M</creatorcontrib><creatorcontrib>Pratt, Sheryll A</creatorcontrib><creatorcontrib>Schmidt, Leo A</creatorcontrib><creatorcontrib>Thompson, Jacqueline E</creatorcontrib><creatorcontrib>INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA PROGRAM ANALYSIS DIV</creatorcontrib><title>Methodologies for Evaluating the Vulnerability of National Systems. Volume 1. Methodologies and Examples</title><description>The study documents methodologies that can be used to evaluate some vulnerabilities of the U. S. to strategic nuclear attack. The collection of component methodologies is called MEVUNS, Methodologies for Evaluating the Vulnerability of National Systems. The study comprises three volumes. The first contains methodologies and examples of their use. The second contains results of a sensitivity analysis performed with the methodologies. The third is a user's guide for MEVUNS computer programs.</description><subject>AREA COVERAGE</subject><subject>Civil Defense</subject><subject>COMPUTERIZED SIMULATION</subject><subject>DAMAGE ASSESSMENT</subject><subject>INDUSTRIES</subject><subject>MATHEMATICAL MODELS</subject><subject>NUCLEAR WARFARE</subject><subject>NUCLEAR WARFARE CASUALTIES</subject><subject>POST ATTACK RECOVERY</subject><subject>PROTECTION</subject><subject>SHELTERS</subject><subject>SURVIVAL(PERSONNEL)</subject><subject>VULNERABILITY</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>1972</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNqFjTEKwkAQANNYiPoDi_2AISEEa9ETG22UtGE1m-Rg71Zye2J-bwobK6spBmbmSX8m7aURls5SgFYGMC_kiGp9B9oTVJE9DXi3bHUEaeEyOfHIcB2DkgspVMLREeQp_NbQN2De6J5MYZnMWuRAqy8XyfpobvvTplH7qMO0I613h2xbFlleFn_0B2dOPPU</recordid><startdate>197206</startdate><enddate>197206</enddate><creator>McGill, James T</creator><creator>Bracken, Jerome</creator><creator>Davis, Carolyn D</creator><creator>Dolins, Lynn P</creator><creator>Pitcher, Hugh M</creator><creator>Pratt, Sheryll A</creator><creator>Schmidt, Leo A</creator><creator>Thompson, Jacqueline E</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>197206</creationdate><title>Methodologies for Evaluating the Vulnerability of National Systems. Volume 1. Methodologies and Examples</title><author>McGill, James T ; Bracken, Jerome ; Davis, Carolyn D ; Dolins, Lynn P ; Pitcher, Hugh M ; Pratt, Sheryll A ; Schmidt, Leo A ; Thompson, Jacqueline E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_AD07530153</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>1972</creationdate><topic>AREA COVERAGE</topic><topic>Civil Defense</topic><topic>COMPUTERIZED SIMULATION</topic><topic>DAMAGE ASSESSMENT</topic><topic>INDUSTRIES</topic><topic>MATHEMATICAL MODELS</topic><topic>NUCLEAR WARFARE</topic><topic>NUCLEAR WARFARE CASUALTIES</topic><topic>POST ATTACK RECOVERY</topic><topic>PROTECTION</topic><topic>SHELTERS</topic><topic>SURVIVAL(PERSONNEL)</topic><topic>VULNERABILITY</topic><toplevel>online_resources</toplevel><creatorcontrib>McGill, James T</creatorcontrib><creatorcontrib>Bracken, Jerome</creatorcontrib><creatorcontrib>Davis, Carolyn D</creatorcontrib><creatorcontrib>Dolins, Lynn P</creatorcontrib><creatorcontrib>Pitcher, Hugh M</creatorcontrib><creatorcontrib>Pratt, Sheryll A</creatorcontrib><creatorcontrib>Schmidt, Leo A</creatorcontrib><creatorcontrib>Thompson, Jacqueline E</creatorcontrib><creatorcontrib>INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA PROGRAM ANALYSIS DIV</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>McGill, James T</au><au>Bracken, Jerome</au><au>Davis, Carolyn D</au><au>Dolins, Lynn P</au><au>Pitcher, Hugh M</au><au>Pratt, Sheryll A</au><au>Schmidt, Leo A</au><au>Thompson, Jacqueline E</au><aucorp>INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA PROGRAM ANALYSIS DIV</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>Methodologies for Evaluating the Vulnerability of National Systems. Volume 1. Methodologies and Examples</btitle><date>1972-06</date><risdate>1972</risdate><abstract>The study documents methodologies that can be used to evaluate some vulnerabilities of the U. S. to strategic nuclear attack. The collection of component methodologies is called MEVUNS, Methodologies for Evaluating the Vulnerability of National Systems. The study comprises three volumes. The first contains methodologies and examples of their use. The second contains results of a sensitivity analysis performed with the methodologies. The third is a user's guide for MEVUNS computer programs.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_AD0753015 |
source | DTIC Technical Reports |
subjects | AREA COVERAGE Civil Defense COMPUTERIZED SIMULATION DAMAGE ASSESSMENT INDUSTRIES MATHEMATICAL MODELS NUCLEAR WARFARE NUCLEAR WARFARE CASUALTIES POST ATTACK RECOVERY PROTECTION SHELTERS SURVIVAL(PERSONNEL) VULNERABILITY |
title | Methodologies for Evaluating the Vulnerability of National Systems. Volume 1. Methodologies and Examples |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T12%3A43%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=Methodologies%20for%20Evaluating%20the%20Vulnerability%20of%20National%20Systems.%20Volume%201.%20Methodologies%20and%20Examples&rft.au=McGill,%20James%20T&rft.aucorp=INSTITUTE%20FOR%20DEFENSE%20ANALYSES%20ALEXANDRIA%20VA%20PROGRAM%20ANALYSIS%20DIV&rft.date=1972-06&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EAD0753015%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |