Security Simulation for Vulnerability Assessment
This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking,...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 50 |
---|---|
container_issue | |
container_start_page | 46 |
container_title | |
container_volume | |
creator | Hennessey, B. Norman, B. Wesson, R.B. |
description | This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, concept of operations (CONOPS) development and operator training. The paper discusses the specific techniques used for creating a 3D virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modelling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development and pre-acquisition planning and testing |
doi_str_mv | 10.1109/CCST.2006.313428 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4105315</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4105315</ieee_id><sourcerecordid>4105315</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-1314bf50263aaf215b91e8e542091ea8a3d46f2a063b1d2faf0f0b49c43c9d763</originalsourceid><addsrcrecordid>eNotj81rhDAUxEM_oHa790Iv_gPa915eEj0u0i9Y6MFtr0vUBFLULUYP-9_X0s5lBn4wzAhxj5AjQvlYVfUhJwCdS5RMxYVICJXMwDBdiltkYgY0bK5EgmAw08rQjdjG-AWrWLEkSgTUrl2mMJ_TOgxLb-dwGlN_mtLPpR_dZJvQ_8JdjC7GwY3znbj2to9u--8b8fH8dKhes_37y1u122cBjZozlMiNV0BaWuvXZU2JrnCKCdZgCys71p4saNlgR9568NBw2bJsy85ouREPf73BOXf8nsJgp_OREZRcb_4AhTNFiw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security Simulation for Vulnerability Assessment</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Hennessey, B. ; Norman, B. ; Wesson, R.B.</creator><creatorcontrib>Hennessey, B. ; Norman, B. ; Wesson, R.B.</creatorcontrib><description>This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, concept of operations (CONOPS) development and operator training. The paper discusses the specific techniques used for creating a 3D virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modelling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development and pre-acquisition planning and testing</description><identifier>ISSN: 1071-6572</identifier><identifier>ISBN: 1424401747</identifier><identifier>ISBN: 9781424401741</identifier><identifier>EISSN: 2153-0742</identifier><identifier>DOI: 10.1109/CCST.2006.313428</identifier><language>eng</language><publisher>IEEE</publisher><subject>Air traffic control ; Aircraft ; Cameras ; Command and control systems ; Motion detection ; Personnel ; Security ; Surveillance ; Vehicles ; Virtual environment</subject><ispartof>Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology, 2006, p.46-50</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4105315$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4105315$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Hennessey, B.</creatorcontrib><creatorcontrib>Norman, B.</creatorcontrib><creatorcontrib>Wesson, R.B.</creatorcontrib><title>Security Simulation for Vulnerability Assessment</title><title>Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology</title><addtitle>CCST</addtitle><description>This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, concept of operations (CONOPS) development and operator training. The paper discusses the specific techniques used for creating a 3D virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modelling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development and pre-acquisition planning and testing</description><subject>Air traffic control</subject><subject>Aircraft</subject><subject>Cameras</subject><subject>Command and control systems</subject><subject>Motion detection</subject><subject>Personnel</subject><subject>Security</subject><subject>Surveillance</subject><subject>Vehicles</subject><subject>Virtual environment</subject><issn>1071-6572</issn><issn>2153-0742</issn><isbn>1424401747</isbn><isbn>9781424401741</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81rhDAUxEM_oHa790Iv_gPa915eEj0u0i9Y6MFtr0vUBFLULUYP-9_X0s5lBn4wzAhxj5AjQvlYVfUhJwCdS5RMxYVICJXMwDBdiltkYgY0bK5EgmAw08rQjdjG-AWrWLEkSgTUrl2mMJ_TOgxLb-dwGlN_mtLPpR_dZJvQ_8JdjC7GwY3znbj2to9u--8b8fH8dKhes_37y1u122cBjZozlMiNV0BaWuvXZU2JrnCKCdZgCys71p4saNlgR9568NBw2bJsy85ouREPf73BOXf8nsJgp_OREZRcb_4AhTNFiw</recordid><startdate>200610</startdate><enddate>200610</enddate><creator>Hennessey, B.</creator><creator>Norman, B.</creator><creator>Wesson, R.B.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200610</creationdate><title>Security Simulation for Vulnerability Assessment</title><author>Hennessey, B. ; Norman, B. ; Wesson, R.B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-1314bf50263aaf215b91e8e542091ea8a3d46f2a063b1d2faf0f0b49c43c9d763</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Air traffic control</topic><topic>Aircraft</topic><topic>Cameras</topic><topic>Command and control systems</topic><topic>Motion detection</topic><topic>Personnel</topic><topic>Security</topic><topic>Surveillance</topic><topic>Vehicles</topic><topic>Virtual environment</topic><toplevel>online_resources</toplevel><creatorcontrib>Hennessey, B.</creatorcontrib><creatorcontrib>Norman, B.</creatorcontrib><creatorcontrib>Wesson, R.B.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Hennessey, B.</au><au>Norman, B.</au><au>Wesson, R.B.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security Simulation for Vulnerability Assessment</atitle><btitle>Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology</btitle><stitle>CCST</stitle><date>2006-10</date><risdate>2006</risdate><spage>46</spage><epage>50</epage><pages>46-50</pages><issn>1071-6572</issn><eissn>2153-0742</eissn><isbn>1424401747</isbn><isbn>9781424401741</isbn><abstract>This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, concept of operations (CONOPS) development and operator training. The paper discusses the specific techniques used for creating a 3D virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modelling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development and pre-acquisition planning and testing</abstract><pub>IEEE</pub><doi>10.1109/CCST.2006.313428</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1071-6572 |
ispartof | Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology, 2006, p.46-50 |
issn | 1071-6572 2153-0742 |
language | eng |
recordid | cdi_ieee_primary_4105315 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Air traffic control Aircraft Cameras Command and control systems Motion detection Personnel Security Surveillance Vehicles Virtual environment |
title | Security Simulation for Vulnerability Assessment |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T03%3A08%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20Simulation%20for%20Vulnerability%20Assessment&rft.btitle=Proceedings%2040th%20Annual%202006%20International%20Carnahan%20Conference%20on%20Security%20Technology&rft.au=Hennessey,%20B.&rft.date=2006-10&rft.spage=46&rft.epage=50&rft.pages=46-50&rft.issn=1071-6572&rft.eissn=2153-0742&rft.isbn=1424401747&rft.isbn_list=9781424401741&rft_id=info:doi/10.1109/CCST.2006.313428&rft_dat=%3Cieee_6IE%3E4105315%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4105315&rfr_iscdi=true |