Nuclear Smuggling and Threats to Lithuanian Security
نویسندگان
چکیده
منابع مشابه
Nuclear Power and Security Threats
Nuclear facilities have not been designed to withstand a deliberate crash by a jumbo jet full of fuel or many other types of attack. A successful attack could have widespread and catastrophic consequences for both the environment and public health. The extent of damage caused will depend on the type of nuclear facility, the nature of the attack, weather conditions and the success of mitigation ...
متن کاملUsing Sensors to Interdict Nuclear Material Smuggling
We describe a stochastic network interdiction model for locating sensors that detect nuclear material. A nuclear material smuggler selects a path through a transportation network that maximizes the probability of avoiding detection. An interdictor installs sensors to minimize that maximum probability. We formulate this problem as a bi-level stochastic mixed-integer program, and then focus on a ...
متن کاملModels for nuclear smuggling interdiction
We describe two stochastic network interdiction models for thwarting nuclear smuggling. In the first model, the smuggler travels through a transportation network on a path that maximizes the probability of evading detection, and the interdictor installs radiation sensors to minimize that evasion probability. The problem is stochastic because the smuggler’s origin-destination pair is known only ...
متن کاملasean and new security threats
association of southeast asia nations (asean) was created in 1967 in order to prevent the threat of communism in southeast asia. but, over time, new states joined it and goals and activities of this organization expanded to other areas such as economic, commercial, political and cultural ones. thus, over time, cooperation between members expanded in a way today this regional organization is con...
متن کاملThreats to TCP/IP Security
Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration. New tools that probe for system vulnerabilities, such as IIS (Internet Security Scanner) assist in these efforts, but these tools only point out areas of weakness instead of providing a means to protect networks. Thus, as ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lithuanian Annual Strategic Review
سال: 2016
ISSN: 1648-8024,2335-870X
DOI: 10.1515/lasr-2016-0008