Username   Password       Forgot your password?  Forgot your username? 

ISSUES BY YEAR

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006

 

False Target vs Protection in Defending Parallel Systems against Unintentional and Intentional Impacts

Volume 8, Number 5, September 2012 - Paper 1 - pp. 465-478

G. LEVITIN1, R. PENG2, M. XIE2, S-H. NG2, and H. BEN HAIM1

1 The Israel Electric Corporation Ltd. P.O. Box 10, Haifa 31000, Israel
2 Department of Industrial and Systems Engineering, National University of Singapore, Singapore, Singapore 119260

(Received on October 06, 2011 and revised on July 09, 2012)

Abstract:

This article considers a parallel system exposed to external intentional impacts caused by malicious attacks, and unintentional impacts caused by natural disasters or technological accidents. The defender distributes its resource between the deployment of false targets and the protection of genuine system elements. The deployment of false targets is intended to misinform the attacker so that it is not able to distinguish between the false targets and the genuine system elements, which leads to dissipating the attack resources. Different combinations of unintentional and intentional impacts sequences are considered. The vulnerability of each system element is determined by an attacker-defender and unintentional impact-defender contest success functions. A framework of solving the optimal defense resource distribution which minimizes the overall system vulnerability is suggested. Illustrative examples are presented.

 

References: 26

Click here to download the paper.

Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

 

Important Access Information

Individuals, Institutions and Corporations with access via userid and password:

If you have a valid userid and password, you will need to login at the top of the screen. All volumes that are authorized by your subscription will be available for download. If you are not authorized, you will see an 'add to cart' option and you have the choice of purchasing the articles. You may also apply for subscription from our Subscription page.

 

If you cannot access any paper and you feel your subscription entitles you to access, please notify us by using the contact form on the Contact Us page. Please provide as much detail as possible.

 

Institutions and Corporations with access via IP addresses:

If you have a subscription via IP addresses, all volumes that are authorized by your subscription will be available for download. If you are not authorized, you will see an 'add to cart' option and you have the choice of purchasing the articles. You may also apply for subscription from our Subscription page.

 

If you cannot access any paper and you feel your subscription entitles you to access, please verify that the EXTERNAL IP address of your computer is authorized. Before contacting us, contact your system administrator and confirm if the IP address of your network has been authorized for access. To find out the EXTERNAL IP address of your network, simply open any Internet browser and point it to : http://www.WhatIsMyIP.com. Your EXTERNAL IP address will be shown in the browser window.

 

Once you have this information, you may email us using the contact form on the Contact Us page. Please provide as much detail as possible. You may also email a screenshot of the browser to :subscriptions@IJPE-Online.com

 

Thank you for your understanding. We will try our best to reply within 24-48 hours.

This site uses encryption for transmitting your passwords. ratmilwebsolutions.com