Evaluating Deployed Decision Support Systems for Security: Challenges, Analysis, and Approaches

نویسندگان

  • Matthew E. Taylor
  • Christopher Kiekintveld
  • Milind Tambe
چکیده

This chapter discusses the difficult problem of evaluating deployed security-focused decision support systems. In a security setting, one can never expect the adversary to cooperate in evaluation, which disallows many kinds of controlled studies. Furthermore, data is typically sparse — there are thankfully relatively few terrorist attacks on major infrastructure in the U.S. Still, evaluating security measures is critical in ensuring efficient allocation of security resources. We discuss a variety of approaches for evaluating such systems, using the deployed ARMOR and IRIS systems as exemplars. Taken as a whole, the evidence supports the effectiveness of these systems, but there are clearly opportunities to improve our methods for assessing the value proposition of all types of security systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

متن کامل

Application of Rough Set Theory in Data Mining for Decision Support Systems (DSSs)

Decision support systems (DSSs) are prevalent information systems for decision making in many competitive business environments. In a DSS, decision making process is intimately related to some factors which determine the quality of information systems and their related products. Traditional approaches to data analysis usually cannot be implemented in sophisticated Companies, where managers ne...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

An application of principal component analysis and logistic regression to facilitate production scheduling decision support system: an automotive industry case

Production planning and control (PPC) systems have to deal with rising complexity and dynamics. The complexity of planning tasks is due to some existing multiple variables and dynamic factors derived from uncertainties surrounding the PPC. Although literatures on exact scheduling algorithms, simulation approaches, and heuristic methods are extensive in production planning, they seem to be ineff...

متن کامل

Drug-Drug Interaction Clinical Decision Support Systems: Advantages, Challenges and Barriers, and Strategies to Overcome Them

Drug-drug interactions (DDIs) are a common source of preventable medical errors in inpatient and outpatient settings of both developed and developing countries. When two or more drugs are simultaneously prescribed, interactions between their effects may result in preventable adverse events such as damages to vital organs, frequent hospitalizations, prolonged length of hospital stay, and increas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011