مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

656
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

OPTIMAL STRATEGIES FOR DEFENSE OF SENSITIVE SYSTEMS WITH FALSE TARGETS AND RELIABILITY APPROACH

Pages

  85-94

Abstract

 Nowadays, protecting sensitive resources is one of the most important issues by government politics. So, it is essential that government, in order to achieve this target, utilizes beneficial strategies. In this paper, investment optimization for the protection of SENSITIVE SYSTEMS has been investigated. Defender minimizes the expected damage with respect to budget and area restrictions of DEFENSE equipment. However, the attacker maximizes the expected damage of sensitive targets with respect to cost and weight restrictions of attack equipment. Besides, defender deploys false elements to reduce the probability of system and real target vulnerability. False and real elements cannot be distinguished by the attacker. But the attacker has some probability of successfully detecting FALSE TARGETS. The aim of this study is to determine the optimal strategies for DEFENSE of sensitive targets considering probability of a successful attack, attacker capability in detecting FALSE TARGETS, RELIABILITY block diagram and GAME THEORY approach. Finally, the presented model is illustrated for the case study and final findings are analyzed.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    RAHIMDE MEYBODI, MAHDI, AMIRI, AMIRHOSSEIN, & KARBASIAN, MAHDI. (2016). OPTIMAL STRATEGIES FOR DEFENSE OF SENSITIVE SYSTEMS WITH FALSE TARGETS AND RELIABILITY APPROACH. EMERGENCY MANAGEMENT, 4(8), 85-94. SID. https://sid.ir/paper/226033/en

    Vancouver: Copy

    RAHIMDE MEYBODI MAHDI, AMIRI AMIRHOSSEIN, KARBASIAN MAHDI. OPTIMAL STRATEGIES FOR DEFENSE OF SENSITIVE SYSTEMS WITH FALSE TARGETS AND RELIABILITY APPROACH. EMERGENCY MANAGEMENT[Internet]. 2016;4(8):85-94. Available from: https://sid.ir/paper/226033/en

    IEEE: Copy

    MAHDI RAHIMDE MEYBODI, AMIRHOSSEIN AMIRI, and MAHDI KARBASIAN, “OPTIMAL STRATEGIES FOR DEFENSE OF SENSITIVE SYSTEMS WITH FALSE TARGETS AND RELIABILITY APPROACH,” EMERGENCY MANAGEMENT, vol. 4, no. 8, pp. 85–94, 2016, [Online]. Available: https://sid.ir/paper/226033/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button