Defense and homeland security applications of multi-agent simulations

被引:0
|
作者
Lucas, Thomas W. [1 ]
Sanchez, Susan M. [1 ]
Martinez, Felix [2 ]
Sickinger, Lisa R. [3 ]
Roginski, Jonathan W. [4 ]
机构
[1] USN, Postgrad Sch, Dept Operat Res, Monterey, CA 93943 USA
[2] Ctr Estudios Super Navales, Wargaming Dept, Mexico City, DF 04840, Mexico
[3] USS Laboon DDG 58, FPO, AE 09577 USA
[4] US Mil Acad, Dept Math Sci, West Point, NY 10996 USA
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Department of Defense and Homeland Security analysts are increasingly using multi-agent simulation (MAS) to examine national security issues. This paper summarizes three MAS national security studies conducted at the Naval Postgraduate School. The first example explores equipment and employment options for protecting critical infrastructure. The second case considers non-lethal weapons within the spectrum of force-protection options in a martitime environment. The final application investigates emergency (police, fire, and medical) responses to an urban terrorist attack. There are many potentially influential factors and many sources of uncertainty associated with each of these simulated scenarios. Thus, efficient experimental designs and computing clusters are used to enable us to explore many thousands of computational experiments, while simultaneously varying many factors. The results illustrate how MAS experiments can provide valuable insights into defense and homeland security operations.
引用
收藏
页码:126 / +
页数:4
相关论文
共 50 条
  • [1] Multi-agent modelling and simulation of cyber-attacks and cyber-defense for homeland security
    Kotenko, Igor
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 614 - 619
  • [2] Security applications of trust in multi-agent systems
    DeAngelis, David
    Barber, K. Suzanne
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (01) : 57 - 99
  • [3] Process detection in homeland security and defense applications
    Cybenko, George
    Berk, Vincent
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201
  • [4] Distributed security for multi-agent systems - review and applications
    Rashvand, H. F.
    Salah, K.
    Calero, J. M. A.
    Harn, L.
    IET INFORMATION SECURITY, 2010, 4 (04) : 188 - 201
  • [5] A Multi-agent Security Architecture
    Sulaiman, Rossilawati
    Sharma, Dharmendra
    Ma, Wanli
    Tran, Dat
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 184 - 191
  • [6] Security in Multi-Agent Systems
    Hedin, Yaqin
    Moradian, Esmiralda
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 1604 - 1612
  • [7] Bayesian paradox in Homeland Security and homeland defense
    Jannson, Tomasz
    Forrester, Thomas
    Wang, Wenjian
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE X, 2011, 8019
  • [8] Homeland Security Agent
    Lin, Esther
    YALE REVIEW, 2024, 112 (02):
  • [9] IT Issues on Homeland Security and Defense
    Yim, Kangbin
    You, Ilsun
    AVAILABILITY, RELIABILITY AND SECURITY FOR BUSINESS, ENTERPRISE AND HEALTH INFORMATION SYSTEMS, 2011, 6908 : 374 - 385
  • [10] Massively Multi-Agent Simulations of Religion
    Bainbridge, William Sims
    JOURNAL OF COGNITION AND CULTURE, 2018, 18 (05) : 565 - 586