The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2015 Winter Simulation Conference (WSC) 2015
DOI: 10.1109/wsc.2015.7408353
|View full text |Cite
|
Sign up to set email alerts
|

Multi-layered security investment optimization using a simulation embedded within a genetic algorithm

Abstract: The performance of a multi-layered security system, such as those protecting high-value facilities or critical infrastructures, is characterized using several different attributes including detection and interruption probabilities, costs, and false/nuisance alarm rates. The multitude of technology options, alternative locations and configurations for those technologies, threats to the system, and resource considerations that must be weighed make exhaustive evaluation of all possible architectures extremely dif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…The model developed in this paper extends the model given in [4] in two significant dimensions. First, scenarios are used to describe the connection between weather, visibility conditions and intruder capabilities with detection probability.…”
Section: Model Formulationmentioning
confidence: 84%
See 4 more Smart Citations
“…The model developed in this paper extends the model given in [4] in two significant dimensions. First, scenarios are used to describe the connection between weather, visibility conditions and intruder capabilities with detection probability.…”
Section: Model Formulationmentioning
confidence: 84%
“…Many investments are only effective if they are deployed as a cycle or a contiguous boundary instead of possibly disconnected, single-link investments as described in [4]. Consequently, we make use of "layered" investments where a single investment layer consists of a collection of link investments of a single type (e.g., sensor "sX" investments) forming a contiguous boundary around the target at a fixed radius.…”
Section: Model Formulationmentioning
confidence: 99%
See 3 more Smart Citations