Examining metrics and methods for determining critical facility system effectiveness

Approaches for quantifying security system performance vary for different critical facilities, ranging from in-depth quantitative analyses to heuristics-based rules of thumb. Since there is no single accepted definition for what constitutes an effective security system for a critical facility and how best to design and analyse these systems, this technical note is a survey of potential metrics and methods for critical facility system effectiveness. Recommendations are made for which metric is best suited for critical facility system effectiveness and a new method is recommended for evaluating system effectiveness.

[1]  Mary Lynn Garcia,et al.  The Design and Evaluation of Physical Protection Systems , 2001 .

[2]  Achintya Haldar,et al.  Probability, Reliability and Statistical Methods in Engineering Design (Haldar, Mahadevan) , 1999 .

[3]  H. Simon,et al.  Rational choice and the structure of the environment. , 1956, Psychological review.

[4]  Marvin Rausand,et al.  System Reliability Theory: Models, Statistical Methods, and Applications , 2003 .

[5]  J. Cammarano PROJECT MANAGEMENT : HOW TO MAKE IT HAPPEN , 1997 .

[6]  W E Vesely,et al.  Fault Tree Handbook , 1987 .

[7]  R. Brown Theory of Combat: The Probability of Winning , 1963 .

[8]  Michael Wooldridge,et al.  Introduction to multiagent systems , 2001 .

[9]  E. Polak,et al.  Constrained minimization under vector-valued criteria in finite dimensional spaces☆ , 1967 .

[10]  Gregory Dane Wyss,et al.  Comparison of two methods to quantify cyber and physical security effectiveness. , 2005 .

[11]  Jacques Ferber,et al.  Multi-agent systems - an introduction to distributed artificial intelligence , 1999 .

[12]  Zhen Liu,et al.  Performance Analysis of Stochastic Timed Petri Nets Using Linear Programming Approach , 1995, IEEE Trans. Software Eng..

[13]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[14]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[15]  Kurt Jensen,et al.  Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol. 2, Analysis Methods , 1992 .

[16]  Delbert Ray Fulkerson,et al.  Maximizing the minimum source-sink path subject to a budget constraint , 1977, Math. Program..

[17]  Alan W. McMasters,et al.  Optimal interdiction of a supply network , 1970 .

[18]  B. Golden A problem in network interdiction , 1978 .

[19]  H. Fawcett Manual of Political Economy , 1995 .

[20]  Ravindra K. Ahuja,et al.  Network Flows: Theory, Algorithms, and Applications , 1993 .

[21]  D. A. Conway Management Goals and Accounting for Control , 1966 .

[22]  Eitan Israeli,et al.  System Interdiction and Defense. , 1999 .

[23]  Y. Censor Pareto optimality in multiobjective problems , 1977 .

[24]  Saul I. Gass A Process for Determining Priorities and Weights for Large-Scale Linear Goal Programmes , 1986 .

[25]  C. Petri Kommunikation mit Automaten , 1962 .

[26]  David P. Morton,et al.  A Stochastic Program for Interdicting Smuggled Nuclear Material , 2003 .

[27]  M. J. Hicks,et al.  Physical protection systems cost and performance analysis: a case study , 1999 .

[28]  David P. Morton,et al.  Stochastic Network Interdiction , 1998, Oper. Res..