Between detection and neutralization
Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 229 |
---|---|
container_issue | |
container_start_page | 226 |
container_title | |
container_volume | |
creator | Adams, D.G. Snell, M.K. Green, M.W. Pritchard, D.A. |
description | Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage the adversary. Neutralization occurs if the adversary attack is defeated after the security forces have actively engaged the adversary. Both depend upon communications of data. This paper explores details of embedded communications functions that are often assumed to be inconsequential. It is the intent of the authors to bring focus to an issue in security system modeling that, if not well understood, has the potential to be a deciding factor in the overall system failure or effectiveness |
doi_str_mv | 10.1109/CCST.2005.1594846 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1594846</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1594846</ieee_id><sourcerecordid>1594846</sourcerecordid><originalsourceid>FETCH-ieee_primary_15948463</originalsourceid><addsrcrecordid>eNp9jrsKwkAQRQcfYNR8gNiksE2cfWWzrUGxN31YzAgrcZVkRfTrVbAWLhw4p7kAC4YZY2jWZXmoMo6oMqaMLGQ-gIgzJVLUkg8hNrrAz4ThUhUjiBhqluZK8wlM-_6MyIVmRQSrDYUHkU8aCnQM7uoT65vE0z10tnUv-1VzGJ9s21P84wyWu21V7lNHRPWtcxfbPevfEfG_vgE_FjKV</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Between detection and neutralization</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Adams, D.G. ; Snell, M.K. ; Green, M.W. ; Pritchard, D.A.</creator><creatorcontrib>Adams, D.G. ; Snell, M.K. ; Green, M.W. ; Pritchard, D.A.</creatorcontrib><description>Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage the adversary. Neutralization occurs if the adversary attack is defeated after the security forces have actively engaged the adversary. Both depend upon communications of data. This paper explores details of embedded communications functions that are often assumed to be inconsequential. It is the intent of the authors to bring focus to an issue in security system modeling that, if not well understood, has the potential to be a deciding factor in the overall system failure or effectiveness</description><identifier>ISSN: 1071-6572</identifier><identifier>ISBN: 9780780392458</identifier><identifier>ISBN: 0780392450</identifier><identifier>EISSN: 2153-0742</identifier><identifier>DOI: 10.1109/CCST.2005.1594846</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system security ; Data security ; Detectors ; Laboratories ; Modeling ; National security ; Performance analysis ; Probability ; Sensor systems ; Weapons</subject><ispartof>Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, 2005, p.226-229</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1594846$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1594846$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Adams, D.G.</creatorcontrib><creatorcontrib>Snell, M.K.</creatorcontrib><creatorcontrib>Green, M.W.</creatorcontrib><creatorcontrib>Pritchard, D.A.</creatorcontrib><title>Between detection and neutralization</title><title>Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology</title><addtitle>CCST</addtitle><description>Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage the adversary. Neutralization occurs if the adversary attack is defeated after the security forces have actively engaged the adversary. Both depend upon communications of data. This paper explores details of embedded communications functions that are often assumed to be inconsequential. It is the intent of the authors to bring focus to an issue in security system modeling that, if not well understood, has the potential to be a deciding factor in the overall system failure or effectiveness</description><subject>Communication system security</subject><subject>Data security</subject><subject>Detectors</subject><subject>Laboratories</subject><subject>Modeling</subject><subject>National security</subject><subject>Performance analysis</subject><subject>Probability</subject><subject>Sensor systems</subject><subject>Weapons</subject><issn>1071-6572</issn><issn>2153-0742</issn><isbn>9780780392458</isbn><isbn>0780392450</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNp9jrsKwkAQRQcfYNR8gNiksE2cfWWzrUGxN31YzAgrcZVkRfTrVbAWLhw4p7kAC4YZY2jWZXmoMo6oMqaMLGQ-gIgzJVLUkg8hNrrAz4ThUhUjiBhqluZK8wlM-_6MyIVmRQSrDYUHkU8aCnQM7uoT65vE0z10tnUv-1VzGJ9s21P84wyWu21V7lNHRPWtcxfbPevfEfG_vgE_FjKV</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Adams, D.G.</creator><creator>Snell, M.K.</creator><creator>Green, M.W.</creator><creator>Pritchard, D.A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>2005</creationdate><title>Between detection and neutralization</title><author>Adams, D.G. ; Snell, M.K. ; Green, M.W. ; Pritchard, D.A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_15948463</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Communication system security</topic><topic>Data security</topic><topic>Detectors</topic><topic>Laboratories</topic><topic>Modeling</topic><topic>National security</topic><topic>Performance analysis</topic><topic>Probability</topic><topic>Sensor systems</topic><topic>Weapons</topic><toplevel>online_resources</toplevel><creatorcontrib>Adams, D.G.</creatorcontrib><creatorcontrib>Snell, M.K.</creatorcontrib><creatorcontrib>Green, M.W.</creatorcontrib><creatorcontrib>Pritchard, D.A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Adams, D.G.</au><au>Snell, M.K.</au><au>Green, M.W.</au><au>Pritchard, D.A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Between detection and neutralization</atitle><btitle>Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology</btitle><stitle>CCST</stitle><date>2005</date><risdate>2005</risdate><spage>226</spage><epage>229</epage><pages>226-229</pages><issn>1071-6572</issn><eissn>2153-0742</eissn><isbn>9780780392458</isbn><isbn>0780392450</isbn><abstract>Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage the adversary. Neutralization occurs if the adversary attack is defeated after the security forces have actively engaged the adversary. Both depend upon communications of data. This paper explores details of embedded communications functions that are often assumed to be inconsequential. It is the intent of the authors to bring focus to an issue in security system modeling that, if not well understood, has the potential to be a deciding factor in the overall system failure or effectiveness</abstract><pub>IEEE</pub><doi>10.1109/CCST.2005.1594846</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1071-6572 |
ispartof | Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, 2005, p.226-229 |
issn | 1071-6572 2153-0742 |
language | eng |
recordid | cdi_ieee_primary_1594846 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Communication system security Data security Detectors Laboratories Modeling National security Performance analysis Probability Sensor systems Weapons |
title | Between detection and neutralization |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T06%3A58%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Between%20detection%20and%20neutralization&rft.btitle=Proceedings%2039th%20Annual%202005%20International%20Carnahan%20Conference%20on%20Security%20Technology&rft.au=Adams,%20D.G.&rft.date=2005&rft.spage=226&rft.epage=229&rft.pages=226-229&rft.issn=1071-6572&rft.eissn=2153-0742&rft.isbn=9780780392458&rft.isbn_list=0780392450&rft_id=info:doi/10.1109/CCST.2005.1594846&rft_dat=%3Cieee_6IE%3E1594846%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1594846&rfr_iscdi=true |