DocumentCode :
443222
Title :
Identifying which infrastructures are critical
Author :
Desmedt, Yuo ; Wang, Yongge
Author_Institution :
Univ. Coll. London, UK
fYear :
2005
fDate :
11 Oct. 2005
Abstract :
The terrorist attacks of September 11, 2001 in the US and the attacks in Madrid on March 11, 2004 have demonstrated that our society is very vulnerable. Heuristics is one approach to analyze which infrastructures are critical and vulnerable. However, this may not be the best approach. Indeed, classical terrorist methods involve the use of explosive or highly flammable material. The use of bacteriological, toxic or nuclear dirty bomb is now often mentioned. However, the attacks on September 11 relied on a technique not used before and not studied extensively. We will discuss several methods that can be used to analyze this topic more scientifically. The methods are independent of the type of attacks the enemy uses, whether, e.g. a traditional bomb or cyber terrorism. We survey methods that use tools from artificial intelligence, data mining, economic models, and reliability.
Keywords :
artificial intelligence; data mining; military computing; reliability; terrorism; September 11 attack; artificial intelligence; bacteriological; data mining; economic models; nuclear dirty bomb; reliability; toxic;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Signal Processing Solutions for Homeland Security, 2005. The IEE Seminar on (Ref. No. 2005/11108)
Conference_Location :
IET
Print_ISBN :
0-86341-564-4
Type :
conf
Filename :
1542893
Link To Document :
بازگشت