Smallpox: An Attack Scenario

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Smallpox: An attack scenario.

Smallpox virus, which is among the most dangerous organisms that might be used by bioterrorists, is not widely available. The international black market trade in weapons of mass destruction is probably the only means of acquiring the virus. Thus, only a terrorist supported by the resources of a rogue state would be able to procure and deploy smallpox. An attack using the virus would involve rel...

متن کامل

Scenario Graphs and Attack Graphs

ly, an attack graph is a collection of scenarios showing how a malicious agent can compromise the integrity of a target system. Such graphs are a natural application of the scenario graph formalism defined in Chapter 2. With a suitable model of the system, we can use the techniques developed in Part I to generate attack graphs automatically. In this context, correctness properties specify the n...

متن کامل

Decision Priming in an Air-to-Ground Attack Decision Scenario

Motivation – Validate a System Dynamics model of decision speed for a scenario relevant to an Air Force mission task. Research approach – Extend a decision priming basic research paradigm to a more applied case. Findings/Design – Decision priming was found to occur with more complex stimuli relevant to an air-to-ground target identification scenario. A system dynamics model was developed to pre...

متن کامل

Preventing second-generation infections in a smallpox bioterror attack.

This article presents a new probabilistic model for the prevention of second-generation infections by different vaccination strategies in the event of a smallpox bioterror attack. The main results are independent of the reproductive number R0 (the number of secondary infections transmitted per index infected individual) and population mixing patterns. General expressions are derived for the fra...

متن کامل

Scenario Graphs and Attack Graphs: a Summary

For the past twenty years, model checking has been used successfully in many engineering projects. Model checkers assist the engineer in identifying automatically individual design flaws in a system. A typical model checker takes as input a model of the system and a correctness specification. It checks the model against the specification for erroneous behavior. If erroneous behavior exists, the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Emerging Infectious Diseases

سال: 1999

ISSN: 1080-6040,1080-6059

DOI: 10.3201/eid0504.990416