• DocumentCode
    443222
  • Title

    Identifying which infrastructures are critical

  • Author

    Desmedt, Yuo ; Wang, Yongge

  • Author_Institution
    Univ. Coll. London, UK
  • fYear
    2005
  • fDate
    11 Oct. 2005
  • Abstract
    The terrorist attacks of September 11, 2001 in the US and the attacks in Madrid on March 11, 2004 have demonstrated that our society is very vulnerable. Heuristics is one approach to analyze which infrastructures are critical and vulnerable. However, this may not be the best approach. Indeed, classical terrorist methods involve the use of explosive or highly flammable material. The use of bacteriological, toxic or nuclear dirty bomb is now often mentioned. However, the attacks on September 11 relied on a technique not used before and not studied extensively. We will discuss several methods that can be used to analyze this topic more scientifically. The methods are independent of the type of attacks the enemy uses, whether, e.g. a traditional bomb or cyber terrorism. We survey methods that use tools from artificial intelligence, data mining, economic models, and reliability.
  • Keywords
    artificial intelligence; data mining; military computing; reliability; terrorism; September 11 attack; artificial intelligence; bacteriological; data mining; economic models; nuclear dirty bomb; reliability; toxic;
  • fLanguage
    English
  • Publisher
    iet
  • Conference_Titel
    Signal Processing Solutions for Homeland Security, 2005. The IEE Seminar on (Ref. No. 2005/11108)
  • Conference_Location
    IET
  • Print_ISBN
    0-86341-564-4
  • Type

    conf

  • Filename
    1542893