S. Tolba, L. Fiondella, R. Ammar, N. Lownes, S. Rajasekaran, J. Ivan, Qixing Wang
{"title":"交通网络中攻击者-技术系统交互建模:p2i3模型","authors":"S. Tolba, L. Fiondella, R. Ammar, N. Lownes, S. Rajasekaran, J. Ivan, Qixing Wang","doi":"10.1109/THS.2011.6107888","DOIUrl":null,"url":null,"abstract":"An important challenge for homeland security agencies is to properly understand the interaction between terrorists and the methods to protect and deter attacks on the transportation network. Examining the nature of these interactions can greatly assist the enhancement of existing technologies and guide the development of new ones. This interaction is complex, possessing numerous variables that affect potential outcomes. This paper presents the Perception Square Interaction Cube Model (P2I3-Model) to describe these interactions using the system dynamics approach. This model incorporates three participants: the homeland security agency, the attacker, and the real world. The HS-Agency-perception, Attacker-perception, and Real-world submodels respectively characterize these participants. These three interacting sub-models combine to form the system governing the participants' perceptions, behaviors, and actions. The model accepts a set of measurable inputs from the HS agency and produces quantitative outputs to guide the HS agency's protection planning, deployment, and strategic policy revision activities. Simulation results suggest that the probability of attack success from the perspectives of the HS agency and attacker can differ significantly. System uncertainties and intelligence efforts are the central factors influencing these probabilities.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Modeling attacker-technology system interaction in transportation networks: P2I3-model\",\"authors\":\"S. Tolba, L. Fiondella, R. Ammar, N. Lownes, S. Rajasekaran, J. Ivan, Qixing Wang\",\"doi\":\"10.1109/THS.2011.6107888\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An important challenge for homeland security agencies is to properly understand the interaction between terrorists and the methods to protect and deter attacks on the transportation network. Examining the nature of these interactions can greatly assist the enhancement of existing technologies and guide the development of new ones. This interaction is complex, possessing numerous variables that affect potential outcomes. This paper presents the Perception Square Interaction Cube Model (P2I3-Model) to describe these interactions using the system dynamics approach. This model incorporates three participants: the homeland security agency, the attacker, and the real world. The HS-Agency-perception, Attacker-perception, and Real-world submodels respectively characterize these participants. These three interacting sub-models combine to form the system governing the participants' perceptions, behaviors, and actions. The model accepts a set of measurable inputs from the HS agency and produces quantitative outputs to guide the HS agency's protection planning, deployment, and strategic policy revision activities. Simulation results suggest that the probability of attack success from the perspectives of the HS agency and attacker can differ significantly. System uncertainties and intelligence efforts are the central factors influencing these probabilities.\",\"PeriodicalId\":228322,\"journal\":{\"name\":\"2011 IEEE International Conference on Technologies for Homeland Security (HST)\",\"volume\":\"63 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE International Conference on Technologies for Homeland Security (HST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/THS.2011.6107888\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/THS.2011.6107888","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modeling attacker-technology system interaction in transportation networks: P2I3-model
An important challenge for homeland security agencies is to properly understand the interaction between terrorists and the methods to protect and deter attacks on the transportation network. Examining the nature of these interactions can greatly assist the enhancement of existing technologies and guide the development of new ones. This interaction is complex, possessing numerous variables that affect potential outcomes. This paper presents the Perception Square Interaction Cube Model (P2I3-Model) to describe these interactions using the system dynamics approach. This model incorporates three participants: the homeland security agency, the attacker, and the real world. The HS-Agency-perception, Attacker-perception, and Real-world submodels respectively characterize these participants. These three interacting sub-models combine to form the system governing the participants' perceptions, behaviors, and actions. The model accepts a set of measurable inputs from the HS agency and produces quantitative outputs to guide the HS agency's protection planning, deployment, and strategic policy revision activities. Simulation results suggest that the probability of attack success from the perspectives of the HS agency and attacker can differ significantly. System uncertainties and intelligence efforts are the central factors influencing these probabilities.