Abstract | ||
---|---|---|
Identification of vulnerabilities of water distribution systems and identification of appropriate counter-measures are important components of homeland security. These are difficult and time consuming tasks. This paper provides a new approach to resolve these problems in complex infrastructure systems. It is based on the use of co-evolutionary computation for the generation of both terrorist and security scenarios. The basic concepts of co-evolutionary computation are briefly explained. The concept of co-evolutionary generation of terrorist and security scenarios is introduced in the context of a hypothetical water distribution system for a small town. A tool developed at George Mason University is used for a number of experiments that reveal a variety of emerging security patterns. The experiments show that these patterns may be helpful in effectively protecting the network. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1016/j.advengsoft.2008.04.001 | Advances in Engineering Software |
Keywords | Field | DocType |
terrorism,homeland security,security pattern,water distribution system,appropriate counter-measures,evolutionary computation,george mason university,patterns,basic concept,co-evolution,hypothetical water distribution system,co-evolutionary computation,security scenario,co-evolutionary generation,co evolution,evolutionary computing | Homeland security,Computer science,Computer security,Distribution system,Terrorism,Evolutionary computation,Computer security model,Computation,Vulnerability | Journal |
Volume | Issue | ISSN |
39 | 10 | Advances in Engineering Software |
Citations | PageRank | References |
4 | 0.64 | 1 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zbigniew Skolicki | 1 | 124 | 5.71 |
Tomasz Arciszewski | 2 | 29 | 16.36 |
M. H. Houck | 3 | 4 | 0.64 |
Kenneth A. De Jong | 4 | 143 | 20.40 |