Share Email Print

Proceedings Paper

Security simulation for vulnerability assessment
Author(s): Brian Hennessey; Bradley Norman; Robert B. Wesson
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, CONOPS development and operator training. The paper discusses the specific techniques used for creating a 3d virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modeling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using Air Traffic Control simulators for operator training, incident recreation, procedure development and pre acquisition planning and testing.

Paper Details

Date Published: 22 May 2006
PDF: 9 pages
Proc. SPIE 6227, Enabling Technologies for Simulation Science X, 622708 (22 May 2006); doi: 10.1117/12.665741
Show Author Affiliations
Brian Hennessey, Adacel Systems Inc. (United States)
Bradley Norman, Sandia National Labs. (United States)
Robert B. Wesson, Adacel Systems Inc. (United States)

Published in SPIE Proceedings Vol. 6227:
Enabling Technologies for Simulation Science X
Dawn A. Trevisani, Editor(s)

© SPIE. Terms of Use
Back to Top