Abstract
Assessing the vulnerability of critical infrastructure objects is of major concern when dealing with the process of dependability and risk management. Special attention is paid to the objects of higher interest, such as nuclear power plants. In spite of the protection of these objects, there is still a certain level of a potential threat. The aim of the paper is to describe a possible way of assessments of the consequences when attacking on an object of critical infrastructure. Several characteristics of the impacts outcomes were obtained. For this reason, as well as for modelling of adversary ́s behaviour impact, fuzzy logic tools have been used.
Publisher
Trans Tech Publications, Ltd.
Reference18 articles.
1. R. A. Blais, M. D. Henry, S. R. Lilley, J. A. Pan, M. Grimes, Y. Y. Haimes, Risk-based methodology for assessing and managing the severity of a terrorist attack 2009 IEEE Systems and Information Engineering Design Symposium, SIEDS '09, art. no. 5166175: 171-176.
2. M. Bohner, A. Peterson, Dynamic Equations on Time Scales: An Introduction with Applications. Birkhäuser, Boston, (2001).
3. M. Bohner, S. Sanyal, The Stochastic Dynamic Exponential and Geometric Brownian Motion on Isolated Time Scale. Community Mathematical Anals 2010; 8: 120-135.
4. M. Csörgö, Random Walk and Brownian Local Times in Wiener Sheets. Periodica Mathematica Hungarica 61 (2010) 1-21.
5. A. F. Desmond, G. R. Chapman, Modelling Task Completion Data with Inverse Gaussian Mixtures. Applied Statistics 4(42) (1993) 603-613.