CN111125929B - Effectiveness evaluation method and system of physical protection system - Google Patents
Effectiveness evaluation method and system of physical protection system Download PDFInfo
- Publication number
- CN111125929B CN111125929B CN201911407409.4A CN201911407409A CN111125929B CN 111125929 B CN111125929 B CN 111125929B CN 201911407409 A CN201911407409 A CN 201911407409A CN 111125929 B CN111125929 B CN 111125929B
- Authority
- CN
- China
- Prior art keywords
- defense
- protection system
- factor
- intrusion
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T17/00—Three dimensional [3D] modelling, e.g. data description of 3D objects
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Game Theory and Decision Science (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Geometry (AREA)
- Computer Graphics (AREA)
- Software Systems (AREA)
- Alarm Systems (AREA)
Abstract
The invention relates to the technical field of nuclear material physical protection, in particular to a method and a system for evaluating the effectiveness of a physical protection system, wherein the method comprises the following steps: and establishing a simulated physical protection system, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model. And loading the intrusion factors into the simulated physical protection system, and calculating the shortest time for the intrusion factors to reach the physical objects and the time for the intrusion factors to trigger the alarm signals. And triggering the action of the defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach the real object. And judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, and determining whether the real object protection system is effective. The problem that the real object protection system is judged by depending on human experience, comparison with relevant specifications or simulation test in the prior art and has strong subjectivity can be solved.
Description
Technical Field
The invention relates to the technical field of nuclear material physical protection, in particular to a method and a system for evaluating effectiveness of a physical protection system.
Background
The physical protection system is a safety precaution system which utilizes a physical barrier, a detection delay technology and the response capability of personnel to prevent the theft, the robbery or the illegal transfer of nuclear materials and the damage to nuclear facilities.
Nuclear materials are radioactive and, once lost, stolen, used illegally or deliberately, can affect the safety of the environment and humans. Therefore, in order to ensure the safety of nuclear materials and nuclear facilities, a physical protection system is required to be arranged, and effective detection, delay and response of the intrusion factors are realized through various defensive measures and equipment.
And evaluating the effectiveness of the physical protection, namely evaluating the effectiveness of the physical protection system. The existing evaluation method adopts a qualitative evaluation method, the method mainly depends on human experience, and is compared with relevant specifications or is judged by simulation test, and the quantitative evaluation is to adopt quantitative means for elements of a physical protection system and adopt a probability analysis method for risk evaluation. The method can be mixed with human factors, and is not beneficial to finding weak links of the material object protection system so as to improve.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide an effectiveness evaluation method and system of a physical protection system, which can solve the problems that in the prior art, the influence of subjective factors is judged by depending on human experience, comparison with relevant specifications or simulation tests, and the evaluation of risks is carried out by adopting a probability analysis method, so that the evaluation process is complex and the result is not visual.
In order to achieve the above purposes, the technical scheme adopted by the invention is as follows:
the effectiveness evaluation method of the physical protection system comprises the following steps:
s1: establishing a simulated physical protection system, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
s2: loading intrusion factors in a simulated physical protection system, and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
s3: triggering a defense factor action according to the alarm signal, and analyzing the shortest time for the defense factor to reach a real object;
s4: and judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective.
On the basis of the above technical solution, the step S1 specifically includes:
building a space structure model according to the physical protection system, and building a defense measure database according to the protection measures of the physical protection system;
and adding defense measures on defense nodes in the space structure model, setting defense factors outside the space structure model, and establishing a simulated virtual physical protection system.
On the basis of the technical scheme, the calculating the shortest time for the intrusion factor to reach the real object specifically comprises the following steps:
analyzing all paths from all inlets of the spatial structure model to the real object by adopting a traversal algorithm;
and calculating the time of the intrusion factor passing through all paths and breaking through all defense measures, and comparing the time of all paths to obtain the shortest time of the intrusion factor reaching the real object.
On the basis of the technical scheme, the calculating the time for the intrusion factor to pass through all paths and break through all defensive measures specifically comprises the following steps:
analyzing the penetration capacity of the invasion factors to break through each defense measure on each path;
and calculating the time of the intrusion factor passing through each path according to the penetration capability.
On the basis of the technical scheme, the penetration capacity is obtained from a database established by experimental data according to the number of personnel, carrying equipment and professional technical capacity of the invasion factors.
On the basis of the technical scheme, the time for triggering the alarm signal is determined according to the alarm time which exceeds the set alarm time of the defense measure for the first time when the invasion factor breaks through the defense measure on the path.
On the basis of the technical scheme, the analysis of the shortest time for the defense factor to reach the real object specifically comprises the following steps:
and analyzing the optimal path of the defense factor to the real object, and calculating the total time of the defense factor passing through the optimal path according to the time of the preset defense factor passing through each defense measure on the optimal path.
The invention also provides an effectiveness evaluation system with a material object protection system, which comprises: the system comprises a simulated physical protection system module, a data processing module and a data processing module, wherein the simulated physical protection system module is used for establishing a simulated physical protection system, and comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
the intrusion factor loading and analyzing module is used for loading intrusion factors in the simulated physical protection system and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
the defense factor analysis module is used for triggering the defense factors according to the alarm signals and analyzing the shortest time for the defense factors to reach the real objects;
and the judgment and evaluation module is used for judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object from the station, if so, the real object protection system is effective, and if not, the real object protection system is ineffective.
On the basis of the technical scheme, the intrusion factor loading and analyzing module comprises an intrusion factor evaluation submodule and is used for providing the penetration capability data of the intrusion factors through a database, and the database is established through experimental data according to the number of personnel, carrying equipment and professional technical capability of the intrusion factors.
On the basis of the technical scheme, the intrusion factor loading analysis module further comprises an alarm sub-module which is used for analyzing whether each defense measure on the intrusion factor breakthrough path exceeds the set alarm time of the defense measure.
Compared with the prior art, the invention has the advantages that: when the effectiveness evaluation method and the effectiveness evaluation system of the physical protection system are adopted, firstly, a simulated physical protection system is established, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model; loading intrusion factors into the simulated physical protection system, and calculating the shortest time for the intrusion factors to reach the physical object and the time for the intrusion factors to trigger an alarm signal; triggering a defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach a real object; and finally, judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective. The method can visually reflect the weak links of the physical protection system, remove subjective factors, find problems in time, improve the design of the problems and reduce the possibility of accidents. The method and the device avoid the problems that in the prior art, the influence of subjective factors is judged by depending on human experience, comparison with relevant specifications or simulation test, and the risk evaluation is carried out by adopting a probability analysis method, so that the evaluation process is complex and the result is not intuitive.
Drawings
Fig. 1 is a flowchart of an effectiveness evaluation method of a physical protection system in an embodiment of the present invention.
Detailed Description
Embodiments of the present invention are described in further detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of an effectiveness evaluation method of a physical protection system in an embodiment of the present invention. As shown in fig. 1: the invention provides an effectiveness evaluation method of a real object protection system, which comprises the following steps:
s1: and establishing a simulated physical protection system, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model.
Preferably, the S1 step specifically includes:
building a space structure model according to the physical protection system, and building a defensive measure database according to the protective measures of the physical protection system; and adding defense measures on defense nodes in the space structure model, setting defense factors outside the space structure model, and establishing a simulated virtual physical protection system.
In this embodiment, common defensive measures, such as walls, security personnel, door access, camera shooting, and the like, are classified according to physical defense, personal defense, and technical defense, and time functions or set times of the defensive measures are correspondingly stored, and the database has the functions of addition, deletion, and modification, so that new defensive measures can be added or the time functions of the defensive measures can be modified according to the existing measures when the database is used. The actual path of a channel, a stair and the like is represented by a straight line, and nodes can be added on the path and used for adding defensive measures at the nodes. Selecting defensive measures from a database, adding the defensive measures to the spatial structure model, and selecting whether to modify a time function or set time or self-defining the defensive measures to set time and storing the defensive measures to the database; and adding the selected defense measures to the nodes.
S2: and loading the intrusion factors into the simulated physical protection system, and calculating the shortest time for the intrusion factors to reach the physical objects and the time for the intrusion factors to trigger the alarm signals.
Preferably, the calculating the shortest time for the intrusion factor to reach the real object specifically includes:
analyzing all paths from all inlets of the spatial structure model to the real object by adopting a traversal algorithm; and calculating the time of the intrusion factor passing through all paths and breaking through all defense measures, and comparing the time of all paths to obtain the shortest time of the intrusion factor reaching the real object.
Preferably, the calculating the time for the intrusion factor to pass through all paths and break through all defensive measures specifically includes: analyzing the penetration capacity of the invasion factors to break through each defense measure on each path; and calculating the time of the intrusion factor passing through each path according to the penetration capability.
Preferably, the penetration capacity is obtained from a database established by experimental data according to the number of persons carrying the intrusion factors, equipment carrying and professional skill capacity.
In particular, a penetration time function of the intrusion factor penetration capacity can be fitted by a number of tests. The penetration function is a function of parameters related to the intrusion factors, such as the number of people, carrying equipment, professional skill and the like.
In the embodiment, when the database is established, the penetration capacity of the invasion factors such as terrorists or insiders on various defense measures such as physical defense, civil defense and technical defense is set as x, the standard of the penetration capacity of the invasion factors such as the terrorists or the insiders on various defense measures such as physical defense, civil defense and technical defense is taken as x, the normalization is [0,1], that is, when the penetration capacity is completely absent, x is 0, and the corresponding penetration time is the longest time; the cracking capability of the tip professional technical team carrying professional tools is 1, and the shortest time corresponds to the shortest time.
Preferably, the time for triggering the alarm signal is determined according to the alarm time which exceeds the set alarm time of the defense measure for the first time when the intrusion factor breaks through the defense measure on the path.
Specifically, the triggering alarm time of each defense measure is set, and when the intrusion factor breaks through the defense measure, the triggering alarm time exceeds the correspondingly set triggering alarm time, and an alarm signal is triggered.
S3: and triggering the action of the defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach the real object.
Preferably, analyzing the shortest time for the defensive factor to reach the real object specifically comprises:
and analyzing the optimal path of the defense factor to the real object, and calculating the total time of the defense factor passing through the optimal path according to the time of the preset defense factor passing through each defense measure on the optimal path.
S4: and judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, determining that the real object protection system is effective, and if not, determining that the real object protection system is ineffective.
In addition, when the real object protection system is judged to be invalid, defensive measures can be added into the simulated real object protection system until the requirements of the real object protection system are met, and a modification suggestion is provided according to the defensive measures.
The invention also provides an effectiveness evaluation system of the material object protection system, which comprises the following components: the simulated physical protection system module is used for establishing a simulated physical protection system, and the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
the intrusion factor loading and analyzing module is used for loading intrusion factors in the simulated physical protection system and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
the defense factor analysis module is used for triggering the defense factors according to the alarm signals and analyzing the shortest time for the defense factors to reach the real objects;
and the judgment and evaluation module is used for judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object from the station, if so, the real object protection system is effective, and if not, the real object protection system is ineffective.
Preferably, the intrusion factor loading and analyzing module comprises an intrusion factor evaluation submodule for providing the defense capability data of the intrusion factors through a database, and the database is established through experimental data according to the number of people, carrying equipment and professional technical capability of the intrusion factors.
Preferably, the intrusion factor loading analysis module further comprises an alarm sub-module, which is used for analyzing whether each defense measure on the intrusion factor breakthrough path exceeds the set alarm time of the defense measure.
In summary, the following steps: when the effectiveness evaluation method and the effectiveness evaluation system of the physical protection system are adopted, firstly, a simulated physical protection system is established, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model; loading invasion factors into the simulated physical protection system, and calculating the shortest time for the invasion factors to reach the physical objects and the time for the invasion factors to trigger alarm signals; triggering a defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach a real object; and finally, judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective. The method can visually reflect the weak links of the physical protection system, remove subjective factors, find problems in time, improve the design of the problems and reduce the possibility of accidents. The method and the device avoid the problems that in the prior art, the influence of subjective factors is judged by depending on human experience, comparison with relevant specifications or simulation test, and the risk evaluation is carried out by adopting a probability analysis method, so that the evaluation process is complex and the result is not intuitive.
The present invention is not limited to the above-mentioned preferred embodiments, and any other products in various forms can be obtained by anyone with the teaching of the present invention, but any changes in the shape or structure thereof, which have the same or similar technical solutions as the present invention, are within the protection scope.
Claims (9)
1. The method for evaluating the effectiveness of the physical protection system is characterized by comprising the following steps of:
s1: establishing a simulated physical protection system, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
s2: loading intrusion factors in a simulated physical protection system, and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal; the calculating the shortest time for the intrusion factor to reach the real object specifically comprises:
analyzing all paths from all inlets of the spatial structure model to the real object by adopting a traversal algorithm;
calculating the time of the invasion factors passing through all paths and breaking through all defense measures, and comparing the time of all paths to obtain the shortest time of the invasion factors reaching the real object;
s3: triggering the action of the defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach the real object;
s4: and judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective.
2. The method for evaluating the effectiveness of the material object protection system according to claim 1, wherein the step S1 specifically includes:
building a space structure model according to the physical protection system, and building a defense measure database according to the protection measures of the physical protection system;
and adding defense measures on defense nodes in the space structure model, setting defense factors outside the space structure model, and establishing a simulated virtual physical protection system.
3. The method for evaluating the effectiveness of the physical protection system according to claim 1, wherein the calculating the time for the intrusion factor to pass through all paths and break through all defensive measures specifically comprises:
analyzing the penetration capacity of the invasion factors to break through each defense measure on each path;
and calculating the time of the intrusion factor passing through each path according to the penetration capability.
4. The method for evaluating the effectiveness of the physical protection system according to claim 3, wherein the penetration ability is obtained from a database created by experimental data according to the number of persons, carrying equipment and professional skills of the invasion factors.
5. The method for evaluating the effectiveness of the physical protection system according to claim 1, wherein the time for triggering the alarm signal is determined according to the alarm time when the intrusion factor first exceeds the set time of the defense measure when the intrusion factor breaks through the defense measure on the path.
6. The method for evaluating the effectiveness of a material object protection system according to claim 1, wherein the analyzing the shortest time for the defense factor to reach the material object specifically comprises:
and analyzing the optimal path of the defense factor to the real object, and calculating the total time of the defense factor passing through the optimal path according to the time of the preset defense factor passing through each defense measure on the optimal path.
7. An effectiveness evaluation system for implementing the effectiveness evaluation method according to claim 1,
the system comprises a simulated physical protection system module, a data processing module and a data processing module, wherein the simulated physical protection system module is used for establishing a simulated physical protection system, and comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
the intrusion factor loading and analyzing module is used for loading intrusion factors in the simulated physical protection system and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal; the calculating the shortest time for the intrusion factor to reach the real object specifically comprises:
analyzing all paths from all inlets of the spatial structure model to the real object by adopting a traversal algorithm;
calculating the time of the invasion factors passing through all paths and breaking through all defense measures, and comparing the time of all paths to obtain the shortest time of the invasion factors reaching the real object;
the defense factor analysis module is used for triggering the defense factor according to the alarm signal and analyzing the shortest time for the defense factor to reach a real object;
and the judgment and evaluation module is used for judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object from the station, if so, the real object protection system is effective, and if not, the real object protection system is ineffective.
8. The validity evaluation system of the physical protection system of claim 7, wherein the intrusion factor loading analysis module comprises an intrusion factor evaluation sub-module for providing the penetration capability data of the intrusion factors through a database, the database being established by experimental data according to the number of people, carrying equipment and professional skills of the intrusion factors.
9. The system for evaluating the effectiveness of a physical protection system according to claim 7, wherein: the intrusion factor loading analysis module also comprises an alarm sub-module which is used for analyzing whether each defense measure on the intrusion factor breakthrough path exceeds the set alarm time of the defense measure.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201911407409.4A CN111125929B (en) | 2019-12-31 | 2019-12-31 | Effectiveness evaluation method and system of physical protection system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201911407409.4A CN111125929B (en) | 2019-12-31 | 2019-12-31 | Effectiveness evaluation method and system of physical protection system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111125929A CN111125929A (en) | 2020-05-08 |
| CN111125929B true CN111125929B (en) | 2023-04-18 |
Family
ID=70506163
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201911407409.4A Active CN111125929B (en) | 2019-12-31 | 2019-12-31 | Effectiveness evaluation method and system of physical protection system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111125929B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115438463A (en) * | 2022-08-02 | 2022-12-06 | 国家核安保技术中心 | Protection system evaluation method, evaluation device, and storage medium |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104463455A (en) * | 2014-12-02 | 2015-03-25 | 中广核工程有限公司 | Nuclear power physical protection effectiveness analysis method, device and system |
| CN105844704A (en) * | 2016-03-23 | 2016-08-10 | 深圳市欣横纵数码科技有限公司 | Nuclear security 3D virtual simulation method |
| CN205644630U (en) * | 2016-03-23 | 2016-10-12 | 深圳市欣横纵数码科技有限公司 | Validity evaluation system of nuclear power physical protection |
| CN109190932A (en) * | 2018-08-15 | 2019-01-11 | 华南理工大学 | A kind of critical infrastructures physical protection system risk monitoring and control method |
| CN109598374A (en) * | 2018-11-21 | 2019-04-09 | 华南理工大学 | A kind of heuristic efficiency analysis method of key facility physical protection system |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7194395B2 (en) * | 2000-02-23 | 2007-03-20 | The United States Of America As Represented By The Secretary Of The Army | System and method for hazardous incident decision support and training |
-
2019
- 2019-12-31 CN CN201911407409.4A patent/CN111125929B/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104463455A (en) * | 2014-12-02 | 2015-03-25 | 中广核工程有限公司 | Nuclear power physical protection effectiveness analysis method, device and system |
| CN105844704A (en) * | 2016-03-23 | 2016-08-10 | 深圳市欣横纵数码科技有限公司 | Nuclear security 3D virtual simulation method |
| CN205644630U (en) * | 2016-03-23 | 2016-10-12 | 深圳市欣横纵数码科技有限公司 | Validity evaluation system of nuclear power physical protection |
| CN109190932A (en) * | 2018-08-15 | 2019-01-11 | 华南理工大学 | A kind of critical infrastructures physical protection system risk monitoring and control method |
| CN109598374A (en) * | 2018-11-21 | 2019-04-09 | 华南理工大学 | A kind of heuristic efficiency analysis method of key facility physical protection system |
Non-Patent Citations (1)
| Title |
|---|
| 李征 ; 关晨 ; 吕敬 ; .信息系统安全防护策略有效性评价探讨.通讯世界.2016,(第08期),第3页. * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111125929A (en) | 2020-05-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zou et al. | Insider threats of Physical Protection Systems in nuclear power plants: Prevention and evaluation | |
| Dostonbek et al. | Use of artificial intelligence opportunities for early detection of threats to information systems | |
| Song et al. | Security assessment of process facilities–Intrusion modeling | |
| CN107517214A (en) | System and method for providing computer network security | |
| CN111178684B (en) | Weak path determination method for nuclear facility physical protection system | |
| El Wely et al. | Analysis of physical protection system effectiveness of nuclear power plants based on performance approach | |
| CN111125929B (en) | Effectiveness evaluation method and system of physical protection system | |
| Bowen et al. | Vulnerability learning of adversary paths in Physical Protection Systems using AMC/EASI | |
| EP3690680A1 (en) | Method of automated design and analysis of security systems | |
| Jordan et al. | Discrete-event simulation for the design and evaluation of physical protection systems | |
| CN115438463A (en) | Protection system evaluation method, evaluation device, and storage medium | |
| Williams | Physical protection system design and evaluation | |
| Le Sage et al. | An object-oriented approach for modelling security scenarios | |
| Majeed | Physical Protection Systems (PPS) for Nuclear Facilities | |
| KR102240737B1 (en) | Method of security vulnerability assessment for chemcial facility | |
| Platt | Physical threats to the information infrastructure | |
| Arwui et al. | Modeling a Physical Protection System for the 444 TBq 60 CoIrradiation Source at the Center for Applied Radiation Science and Technology, Mafikeng, South Africa. | |
| KR102211242B1 (en) | Method of terror risk assessment for chemcial facility | |
| Pratama et al. | Analysis of Airport Security Threat Prediction through AI Integration and Gesture Analysis: A Hypothetical Study in the Apron Zone | |
| Philpott | How Your Facility Can Avert a Terrorist Attack. | |
| Ebong et al. | Assessment of Crime Prevention Mechanisms in Public Buildings in Akwa Ibom State Of Nigeria | |
| Boozer et al. | Simulation of personnel control systems with the insider safeguards effectiveness model (ISEM) | |
| CN116307356A (en) | Method and system for evaluating safety precaution efficiency based on entity area | |
| Orr et al. | Notional Chemical Facility PathTrace Modeling Study | |
| Ek | IAEA VA Paper. |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |