Affiliation:
1. University of Defence
2. Rzeszow University of Technology
Abstract
Assessing the vulnerability of critical infrastructure objects is of major concern when dealing with the process of dependability and risk management. Special attention is paid to the objects of higher interest, such as nuclear power plants. In spite of the protection of these objects, there is still a certain level of a potential threat. The aim of the paper is to describe a possible way of attacking on the object in order to get into a particular part of it. Several characteristics of an adversary ́s attempt were obtained. For this reason as well as for modelling adversary ́s behaviour diffusion processes have been used.
Publisher
Trans Tech Publications, Ltd.
Reference19 articles.
1. R. A. Blais, M. D. Henry, S. R. Lilley, J. A. Pan, M. Grimes, Y. Y. Haimes: Risk-based methodology for assessing and managing the severity of a terrorist attack 2009 IEEE Systems and Information Engineering Design Symposium, SIEDS '09, art. no. 5166175: 171-176.
2. M. Bohner, A. Peterson: Dynamic Equations on Time Scales: An Introduction with Applications. Birkhäuser, Boston, (2001).
3. M. Bohner, S. Sanyal: The Stochastic Dynamic Exponential and Geometric Brownian Motion on Isolated Time Scale. Community Mathematical Anals 2010; 8: 120-135.
4. M. Csörgö: Random Walk and Brownian Local Times in Wiener Sheets. Periodica Mathematica Hungarica 61 (2010) 1-21.
5. A. F. Desmond, G. R. Chapman: Modelling Task Completion Data with Inverse Gaussian Mixtures. Applied Statistics 4(42) (1993) 603-613.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献