Between detection and neutralization

Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Adams, D.G., Snell, M.K., Green, M.W., Pritchard, D.A.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 229
container_issue
container_start_page 226
container_title
container_volume
creator Adams, D.G.
Snell, M.K.
Green, M.W.
Pritchard, D.A.
description Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage the adversary. Neutralization occurs if the adversary attack is defeated after the security forces have actively engaged the adversary. Both depend upon communications of data. This paper explores details of embedded communications functions that are often assumed to be inconsequential. It is the intent of the authors to bring focus to an issue in security system modeling that, if not well understood, has the potential to be a deciding factor in the overall system failure or effectiveness
doi_str_mv 10.1109/CCST.2005.1594846
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1594846</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1594846</ieee_id><sourcerecordid>1594846</sourcerecordid><originalsourceid>FETCH-ieee_primary_15948463</originalsourceid><addsrcrecordid>eNp9jrsKwkAQRQcfYNR8gNiksE2cfWWzrUGxN31YzAgrcZVkRfTrVbAWLhw4p7kAC4YZY2jWZXmoMo6oMqaMLGQ-gIgzJVLUkg8hNrrAz4ThUhUjiBhqluZK8wlM-_6MyIVmRQSrDYUHkU8aCnQM7uoT65vE0z10tnUv-1VzGJ9s21P84wyWu21V7lNHRPWtcxfbPevfEfG_vgE_FjKV</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Between detection and neutralization</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Adams, D.G. ; Snell, M.K. ; Green, M.W. ; Pritchard, D.A.</creator><creatorcontrib>Adams, D.G. ; Snell, M.K. ; Green, M.W. ; Pritchard, D.A.</creatorcontrib><description>Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage the adversary. Neutralization occurs if the adversary attack is defeated after the security forces have actively engaged the adversary. Both depend upon communications of data. This paper explores details of embedded communications functions that are often assumed to be inconsequential. It is the intent of the authors to bring focus to an issue in security system modeling that, if not well understood, has the potential to be a deciding factor in the overall system failure or effectiveness</description><identifier>ISSN: 1071-6572</identifier><identifier>ISBN: 9780780392458</identifier><identifier>ISBN: 0780392450</identifier><identifier>EISSN: 2153-0742</identifier><identifier>DOI: 10.1109/CCST.2005.1594846</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system security ; Data security ; Detectors ; Laboratories ; Modeling ; National security ; Performance analysis ; Probability ; Sensor systems ; Weapons</subject><ispartof>Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, 2005, p.226-229</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1594846$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1594846$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Adams, D.G.</creatorcontrib><creatorcontrib>Snell, M.K.</creatorcontrib><creatorcontrib>Green, M.W.</creatorcontrib><creatorcontrib>Pritchard, D.A.</creatorcontrib><title>Between detection and neutralization</title><title>Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology</title><addtitle>CCST</addtitle><description>Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage the adversary. Neutralization occurs if the adversary attack is defeated after the security forces have actively engaged the adversary. Both depend upon communications of data. This paper explores details of embedded communications functions that are often assumed to be inconsequential. It is the intent of the authors to bring focus to an issue in security system modeling that, if not well understood, has the potential to be a deciding factor in the overall system failure or effectiveness</description><subject>Communication system security</subject><subject>Data security</subject><subject>Detectors</subject><subject>Laboratories</subject><subject>Modeling</subject><subject>National security</subject><subject>Performance analysis</subject><subject>Probability</subject><subject>Sensor systems</subject><subject>Weapons</subject><issn>1071-6572</issn><issn>2153-0742</issn><isbn>9780780392458</isbn><isbn>0780392450</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNp9jrsKwkAQRQcfYNR8gNiksE2cfWWzrUGxN31YzAgrcZVkRfTrVbAWLhw4p7kAC4YZY2jWZXmoMo6oMqaMLGQ-gIgzJVLUkg8hNrrAz4ThUhUjiBhqluZK8wlM-_6MyIVmRQSrDYUHkU8aCnQM7uoT65vE0z10tnUv-1VzGJ9s21P84wyWu21V7lNHRPWtcxfbPevfEfG_vgE_FjKV</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Adams, D.G.</creator><creator>Snell, M.K.</creator><creator>Green, M.W.</creator><creator>Pritchard, D.A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>2005</creationdate><title>Between detection and neutralization</title><author>Adams, D.G. ; Snell, M.K. ; Green, M.W. ; Pritchard, D.A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_15948463</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Communication system security</topic><topic>Data security</topic><topic>Detectors</topic><topic>Laboratories</topic><topic>Modeling</topic><topic>National security</topic><topic>Performance analysis</topic><topic>Probability</topic><topic>Sensor systems</topic><topic>Weapons</topic><toplevel>online_resources</toplevel><creatorcontrib>Adams, D.G.</creatorcontrib><creatorcontrib>Snell, M.K.</creatorcontrib><creatorcontrib>Green, M.W.</creatorcontrib><creatorcontrib>Pritchard, D.A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Adams, D.G.</au><au>Snell, M.K.</au><au>Green, M.W.</au><au>Pritchard, D.A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Between detection and neutralization</atitle><btitle>Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology</btitle><stitle>CCST</stitle><date>2005</date><risdate>2005</risdate><spage>226</spage><epage>229</epage><pages>226-229</pages><issn>1071-6572</issn><eissn>2153-0742</eissn><isbn>9780780392458</isbn><isbn>0780392450</isbn><abstract>Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage the adversary. Neutralization occurs if the adversary attack is defeated after the security forces have actively engaged the adversary. Both depend upon communications of data. This paper explores details of embedded communications functions that are often assumed to be inconsequential. It is the intent of the authors to bring focus to an issue in security system modeling that, if not well understood, has the potential to be a deciding factor in the overall system failure or effectiveness</abstract><pub>IEEE</pub><doi>10.1109/CCST.2005.1594846</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1071-6572
ispartof Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, 2005, p.226-229
issn 1071-6572
2153-0742
language eng
recordid cdi_ieee_primary_1594846
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Communication system security
Data security
Detectors
Laboratories
Modeling
National security
Performance analysis
Probability
Sensor systems
Weapons
title Between detection and neutralization
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T06%3A58%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Between%20detection%20and%20neutralization&rft.btitle=Proceedings%2039th%20Annual%202005%20International%20Carnahan%20Conference%20on%20Security%20Technology&rft.au=Adams,%20D.G.&rft.date=2005&rft.spage=226&rft.epage=229&rft.pages=226-229&rft.issn=1071-6572&rft.eissn=2153-0742&rft.isbn=9780780392458&rft.isbn_list=0780392450&rft_id=info:doi/10.1109/CCST.2005.1594846&rft_dat=%3Cieee_6IE%3E1594846%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1594846&rfr_iscdi=true