Showing 1 - 10 of 86
paths that user parameters based on expert judgment or historical data on security violations. The resulting probability … estimates indicate the relative likelihood of different compromise paths and provide an input for security resource allocation …. Application of the methodology is demonstrated using a national security example. A set of compromise paths and probability models …
Persistent link: https://www.econbiz.de/10009435395
specific attributes for each type of fuel, such as cleanliness, security of supply, and governmental regulation. Geothermal … energy possesses several important attributes in common with electricity (e.g., ease of maintenance and perceived security of …
Persistent link: https://www.econbiz.de/10009435445
Correct operation of an information system requires a balance of ``surety`` domains -- access control (confidentiality), integrity, utility, availability, and safety. However, traditional approaches provide little help on how to systematically analyze and balance the combined impact of surety...
Persistent link: https://www.econbiz.de/10009435476
This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the … National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security … criteria, and a development schedule.The purpose of the NSPP is to promote national security technologies through business …
Persistent link: https://www.econbiz.de/10009435489
The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make...
Persistent link: https://www.econbiz.de/10009435535
Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows … waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to …
Persistent link: https://www.econbiz.de/10009435552
surrounding the reliability of electric power systems in restructured markets as well as security worries are the latest reasons …
Persistent link: https://www.econbiz.de/10009435559
Computers have always helped to amplify and propagate errors made by people. The emergence of Networked Information Systems (NISs), which allow people and systems to quickly interact worldwide, has made understanding and minimizing human error more critical. This paper applies concepts from...
Persistent link: https://www.econbiz.de/10009435568
, user interface, visualization, communications and security. All aspects of the program's operations and research efforts …
Persistent link: https://www.econbiz.de/10009435640
Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and … Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help …'s security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the …
Persistent link: https://www.econbiz.de/10009435677