DocumentCode
443222
Title
Identifying which infrastructures are critical
Author
Desmedt, Yuo ; Wang, Yongge
Author_Institution
Univ. Coll. London, UK
fYear
2005
fDate
11 Oct. 2005
Abstract
The terrorist attacks of September 11, 2001 in the US and the attacks in Madrid on March 11, 2004 have demonstrated that our society is very vulnerable. Heuristics is one approach to analyze which infrastructures are critical and vulnerable. However, this may not be the best approach. Indeed, classical terrorist methods involve the use of explosive or highly flammable material. The use of bacteriological, toxic or nuclear dirty bomb is now often mentioned. However, the attacks on September 11 relied on a technique not used before and not studied extensively. We will discuss several methods that can be used to analyze this topic more scientifically. The methods are independent of the type of attacks the enemy uses, whether, e.g. a traditional bomb or cyber terrorism. We survey methods that use tools from artificial intelligence, data mining, economic models, and reliability.
Keywords
artificial intelligence; data mining; military computing; reliability; terrorism; September 11 attack; artificial intelligence; bacteriological; data mining; economic models; nuclear dirty bomb; reliability; toxic;
fLanguage
English
Publisher
iet
Conference_Titel
Signal Processing Solutions for Homeland Security, 2005. The IEE Seminar on (Ref. No. 2005/11108)
Conference_Location
IET
Print_ISBN
0-86341-564-4
Type
conf
Filename
1542893
Link To Document