Paper
22 May 2006 Security simulation for vulnerability assessment
Brian Hennessey, Bradley Norman, Robert B. Wesson
Author Affiliations +
Abstract
This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, CONOPS development and operator training. The paper discusses the specific techniques used for creating a 3d virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modeling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using Air Traffic Control simulators for operator training, incident recreation, procedure development and pre acquisition planning and testing.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Brian Hennessey, Bradley Norman, and Robert B. Wesson "Security simulation for vulnerability assessment", Proc. SPIE 6227, Enabling Technologies for Simulation Science X, 622708 (22 May 2006); https://doi.org/10.1117/12.665741
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer simulations

Sensors

Device simulation

Monte Carlo methods

Telecommunications

Cameras

Control systems

Back to Top