Simulating Terrorist Threat in the Hats Simulator

نویسندگان

  • Clayton T. Morrison
  • Paul R. Cohen
  • Gary W. King
  • Joshua Moody
  • Andrew Hannon
چکیده

The Hats Simulator is a lightweight proxy for many intelligence analysis problems, and thus a test environment for analysts' tools. It is a virtual world in which many agents engage in individual and collective activities. Most agents are benign, some intend harm. Agent activities are planned by a generative planner. Playing against the simulator, the job of the analyst is to find harmful agents before they carry out attacks. The simulator maintains information about all agents. However, information is hidden from the analyst and some is expensive. After each game, the analyst is assessed a set of scores including the cost of acquiring information about agents, the cost of falsely accusing benign agents, and the cost of failing to detect harmful agents. The simulator is implemented and currently manages the activities of up to a hundred thousand agents.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment

We present an overview of our work in information fusion for intelligence analysis. This work includes the Hats Simulator and the COLAB system. The Hats Simulator is a parameterized model of a virtual world in which hundreds of thousands of agents engage in individual and collective activities. Playing against the simulator, the goal of the analyst is to identify and stop harmful agents before ...

متن کامل

A user-layered approach for modelling and simulating terrorist attacks Abstract Modelling and simulation techniques offer a comprehensive method for assessing the impact of a terrorist attack, allowing multiple scenarios to be simulated with ease without imposing

Modelling and simulation techniques offer a comprehensive method for assessing the impact of a terrorist attack, allowing multiple scenarios to be simulated with ease without imposing extensive time or cost constraints. The aim of this paper is to provide a comprehensive model for the different categories of users who are likely to be involved in the modelling and simulation of a terrorist atta...

متن کامل

Simulating Network Robustness for Critical Infrastructure Networks

We examine the robustness of critical infrastructure networks in the face of terrorist attack, using a simulation experiment that incorporates link capacity; and an extension of data farming which we call network farming. Our results show that symmetrical designed networks generally outperform randomly generated networks, although ring-like structures are very vulnerable. Under targeted attacks...

متن کامل

A Microcomputer-Based Simulator for Digital Control Systems

A microcomputer-based simulator for digital control systems is proposed. The proposed simulator is a hybrid system in which the plant is simulated by conventional method of analog computers and other parts of the system including generation of input signal is performed digitally, using a Z-80 based microcomputer. To overcome the difficulty of programming in assembly language, and at the same ti...

متن کامل

Mathematical modeling of dynamics behavior of terrorism and control

Terrorism is generally understood to be the use of threat or extra normal violence to gain ideological reasons and personal benefit. In this paper, a mathematical modelling of terrorism with military strategies and rehabilitation of terrorists was constructed. The model is developed to control the spread of terrorist ideologies in the society and suitable to describe terrorist group. The popula...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006