Int J Performability Eng ›› 2013, Vol. 9 ›› Issue (5): 529-537.doi: 10.23940/ijpe.13.5.p529.mag
• Original articles • Previous Articles Next Articles
B. KOUSALYA1 and .T.VASANTHI2
Abstract:
This paper aims to find the optimal allocation of defense resources between protecting the genuine elements of a k–out–of–n system and deployment of imperfect false elements. Networks such as telecommunication networks, oil pipeline networks can be modeled as k–out–of–n systems. Different type of weapons used in Army, Navy and Air defenses are considered as branches of the force. A country in warfare is defeated if a considerable number of branches are destroyed. This phenomenon is also identical with the failure of a k–out–of–n system. In this work, the destruction probability of a network, protected using imperfect false elements, under intentional attacks is obtained as the damage of a k–out–of–n system. A numerical example is shown to explain this model, and the methodology used in this paper.
B. KOUSALYA .T.VASANTHI. Protection of k-out-of-n Systems under Intentional Attacks using Imperfect False Elements [J]. Int J Performability Eng, 2013, 9(5): 529-537.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
/ / Recommend
URL: https://www.ijpe-online.com/EN/10.23940/ijpe.13.5.p529.mag
https://www.ijpe-online.com/EN/Y2013/V9/I5/529