ISSUES BY YEAR
Volume 12 - 2016
Volume 11 - 2015
Volume 10 - 2014
Volume 9 - 2013
Volume 8 - 2012
Volume 7 - 2011
Volume 6 - 2010
Volume 5 - 2009
Volume 4 - 2008
Volume 3 - 2007
Volume 2 - 2006
False Target vs Protection in Defending Parallel Systems against Unintentional and Intentional Impacts
Volume 8, Number 5, September 2012 - Paper 1 - pp. 465-478
G. LEVITIN1, R. PENG2, M. XIE2, S-H. NG2, and H. BEN HAIM11 The Israel Electric Corporation Ltd. P.O. Box 10, Haifa 31000, Israel
2 Department of Industrial and Systems Engineering, National University of Singapore, Singapore, Singapore 119260
(Received on October 06, 2011 and revised on July 09, 2012)
This article considers a parallel system exposed to external intentional impacts caused by malicious attacks, and unintentional impacts caused by natural disasters or technological accidents. The defender distributes its resource between the deployment of false targets and the protection of genuine system elements. The deployment of false targets is intended to misinform the attacker so that it is not able to distinguish between the false targets and the genuine system elements, which leads to dissipating the attack resources. Different combinations of unintentional and intentional impacts sequences are considered. The vulnerability of each system element is determined by an attacker-defender and unintentional impact-defender contest success functions. A framework of solving the optimal defense resource distribution which minimizes the overall system vulnerability is suggested. Illustrative examples are presented.
Click here to download the paper.
Please note : You will need Adobe Acrobat viewer to view the full articles.
Important Access Information
Individuals, Institutions and Corporations with access via userid and password:
If you have a valid userid and password, you will need to login at the top of the screen. All volumes that are authorized by your subscription will be available for download. If you are not authorized, you will see an 'add to cart' option and you have the choice of purchasing the articles. You may also apply for subscription from our Subscription page.
If you cannot access any paper and you feel your subscription entitles you to access, please notify us by using the contact form on the Contact Us page. Please provide as much detail as possible.
Institutions and Corporations with access via IP addresses:
If you have a subscription via IP addresses, all volumes that are authorized by your subscription will be available for download. If you are not authorized, you will see an 'add to cart' option and you have the choice of purchasing the articles. You may also apply for subscription from our Subscription page.
If you cannot access any paper and you feel your subscription entitles you to access, please verify that the EXTERNAL IP address of your computer is authorized. Before contacting us, contact your system administrator and confirm if the IP address of your network has been authorized for access. To find out the EXTERNAL IP address of your network, simply open any Internet browser and point it to : http://www.WhatIsMyIP.com. Your EXTERNAL IP address will be shown in the browser window.
Once you have this information, you may email us using the contact form on the Contact Us page. Please provide as much detail as possible. You may also email a screenshot of the browser to :subscriptions@IJPE-Online.com
Thank you for your understanding. We will try our best to reply within 24-48 hours.