Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Risk Analysis

Categorizing High Energy Laser Effects For The Joint Munitions Effectiveness Manual, James A. Markham Jun 2005

Categorizing High Energy Laser Effects For The Joint Munitions Effectiveness Manual, James A. Markham

Theses and Dissertations

With the high risk and cost in fielding High Energy Laser (HEL) weapon systems, the development process must include computer simulation models of weapon system performance from the engineering level up to predicting the military worth of employing specific systems in a combat scenario. This research effort focuses on defining how to measure lethality for HEL weapons in an Advanced Tactical Laser (ATL) scenario. In order to create an effective measure for direct comparison between the emerging laser weapon system and existing conventionally delivered weapons, lase time in seconds is presented as a measure comparable to rounds required to cause …


An Analysis Of Information Assurance Relating To The Department Of Defense Radio Frequency Identification (Rfid) Passive Network, Robert G. Giovannetti Mar 2005

An Analysis Of Information Assurance Relating To The Department Of Defense Radio Frequency Identification (Rfid) Passive Network, Robert G. Giovannetti

Theses and Dissertations

The mandates for suppliers to commence Radio Frequency Identification tagging set by Wal-Mart and the Department of Defense is changing this long-time rumored technology into reality. Despite the many conveniences to automate and improve asset tracking this technology offers, consumer groups have obstinately opposed this adoption due to the perceived weaknesses in security and privacy of the network. While the heated debate between consumers and retailers continues, little to no research has addressed the implications of security on the Department of Defense Radio Frequency Identification network. This thesis utilized a historical analysis of Radio Frequency Identification literature to determine whether …


An Historical Analysis Of Factors Contributing To The Emergence Of The Intrusion Detection Discipline And Its Role In Information Assurance, James L.M. Hart Mar 2005

An Historical Analysis Of Factors Contributing To The Emergence Of The Intrusion Detection Discipline And Its Role In Information Assurance, James L.M. Hart

Theses and Dissertations

In 2003, Gartner, Inc., predicted the inevitable demise of the intrusion detection (ID) market, a major player in the computer security technology industry. In light of this prediction, IT executives need to know if intrusion detection technologies serve a strategic purpose within the framework of information assurance (IA). This research investigated the historical background and circumstances that led to the birth of the intrusion detection field and explored the evolution of the discipline through current research in order to identify appropriate roles for IDS technology within an information assurance framework. The research identified factors contributing to the birth of ID …


Determining A Relationship Between Foreign News Media Reports Covering U.S. Military Events And Network Incidents Against Dod Networks, Jason D. Jaros Mar 2005

Determining A Relationship Between Foreign News Media Reports Covering U.S. Military Events And Network Incidents Against Dod Networks, Jason D. Jaros

Theses and Dissertations

This thesis explores the nature of the relationship between foreign news media and network incidents against DoD networks. A rank correlation was performed between the number of network incidents against DoD networks and foreign news media reports covering U.S. Military events. Further analysis was conducted to determine the key terms used in the contents of foreign news media reports for the months the reports were significantly correlated with network incidents. Several significant correlations were found between various combinations of regions and categories of network incidents. However, the correlations were only moderate and the key terms only led to a slightly …


Selection And Application Of Distorted Risk Measures, Edwin J. Offutt Mar 2005

Selection And Application Of Distorted Risk Measures, Edwin J. Offutt

Theses and Dissertations

This thesis develops and illustrates a methodology for the selection of probability distributions and distortion functions associated with risk scenarios resulting from military capability shortfalls. Distorted (or transformed) risk measures are analyzed and applied to account for loss scenarios that may occur with low frequency but result in catastrophic outcomes. After reviewing the rudimentary concepts of distortion, four well-known continuous distributions, suitable for modeling risk scenarios, are chosen using defined criteria. Based on subject matter expert inputs, a simple method for assigning exactly one of the four distributions to any risk scenario is proposed. Four parametric distortion functions from the …