منابع مشابه
Smallpox: An attack scenario.
Smallpox virus, which is among the most dangerous organisms that might be used by bioterrorists, is not widely available. The international black market trade in weapons of mass destruction is probably the only means of acquiring the virus. Thus, only a terrorist supported by the resources of a rogue state would be able to procure and deploy smallpox. An attack using the virus would involve rel...
متن کاملScenario Graphs and Attack Graphs
ly, an attack graph is a collection of scenarios showing how a malicious agent can compromise the integrity of a target system. Such graphs are a natural application of the scenario graph formalism defined in Chapter 2. With a suitable model of the system, we can use the techniques developed in Part I to generate attack graphs automatically. In this context, correctness properties specify the n...
متن کاملDecision Priming in an Air-to-Ground Attack Decision Scenario
Motivation – Validate a System Dynamics model of decision speed for a scenario relevant to an Air Force mission task. Research approach – Extend a decision priming basic research paradigm to a more applied case. Findings/Design – Decision priming was found to occur with more complex stimuli relevant to an air-to-ground target identification scenario. A system dynamics model was developed to pre...
متن کاملPreventing second-generation infections in a smallpox bioterror attack.
This article presents a new probabilistic model for the prevention of second-generation infections by different vaccination strategies in the event of a smallpox bioterror attack. The main results are independent of the reproductive number R0 (the number of secondary infections transmitted per index infected individual) and population mixing patterns. General expressions are derived for the fra...
متن کاملScenario Graphs and Attack Graphs: a Summary
For the past twenty years, model checking has been used successfully in many engineering projects. Model checkers assist the engineer in identifying automatically individual design flaws in a system. A typical model checker takes as input a model of the system and a correctness specification. It checks the model against the specification for erroneous behavior. If erroneous behavior exists, the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Emerging Infectious Diseases
سال: 1999
ISSN: 1080-6040,1080-6059
DOI: 10.3201/eid0504.990416