2011 IEEE International Conference on Technologies for Homeland Security (HST) 2011
DOI: 10.1109/ths.2011.6107853
|View full text |Cite
|
Sign up to set email alerts
|

Constrained classification for infrastructure threat assessment

Abstract: Abstract-Validated computer simulation is an important aspect of critical infrastructure vulnerability assessment. The high computational cost of such models limits the number of threat scenarios that may be directly evaluated, which leads to a need for statistical emulation to predict outcomes for additional scenarios. Our particular area of interest is statistical methods for emulating complex computer codes that predict if a particular tunnel/explosive configuration results in the breaching of an undergroun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2012
2012
2013
2013

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 13 publications
0
0
0
Order By: Relevance