Fuzzy inference system for vulnerability risk estimation of perimeter security

The methods estimating vulnerability of perimeter security systems are developed in the current study. Appropriate estimations are based on the fuzzy inference methods of intruder undetection risks on security zones set in territory's perimeter.

[1]  V. Kochan,et al.  Genetic Algorithm Implementation for Perimeter Security Systems CAD , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.

[2]  Y. Pigovsky,et al.  Genetic algorithm implementation for distributed security systems optimization , 2008, 2008 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications.

[3]  Ernest J. Henley,et al.  Reliability engineering and risk assessment , 1981 .

[4]  Danuta Rutkowska,et al.  Neuro-Fuzzy Architectures and Hybrid Learning , 2002, Studies in Fuzziness and Soft Computing.

[5]  Volodymyr Turchenko,et al.  Database design for CAD system optimising distributed sensor networks for perimeter security , 2004, IASTED Conf. on Software Engineering and Applications.