CN111125929A - Effectiveness evaluation method and system of physical protection system - Google Patents

Effectiveness evaluation method and system of physical protection system Download PDF

Info

Publication number
CN111125929A
CN111125929A CN201911407409.4A CN201911407409A CN111125929A CN 111125929 A CN111125929 A CN 111125929A CN 201911407409 A CN201911407409 A CN 201911407409A CN 111125929 A CN111125929 A CN 111125929A
Authority
CN
China
Prior art keywords
defense
protection system
factor
intrusion
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911407409.4A
Other languages
Chinese (zh)
Other versions
CN111125929B (en
Inventor
郭一丁
郭健
李鹏凡
谭美
朱成华
吴述庆
郭翔
张进才
陈艳霞
陈强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
719th Research Institute of CSIC
Original Assignee
719th Research Institute of CSIC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 719th Research Institute of CSIC filed Critical 719th Research Institute of CSIC
Priority to CN201911407409.4A priority Critical patent/CN111125929B/en
Publication of CN111125929A publication Critical patent/CN111125929A/en
Application granted granted Critical
Publication of CN111125929B publication Critical patent/CN111125929B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • Educational Administration (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Computer Graphics (AREA)
  • Geometry (AREA)
  • Software Systems (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to the technical field of nuclear material physical protection, in particular to a method and a system for evaluating the effectiveness of a physical protection system, wherein the method comprises the following steps: and establishing a simulated physical protection system, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model. And loading the intrusion factors into the simulated physical protection system, and calculating the shortest time for the intrusion factors to reach the physical object and the time for the intrusion factors to trigger the alarm signal. And triggering the action of the defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach the real object. And judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, and determining whether the real object protection system is effective. The problem that the real object protection system is judged by depending on human experience, comparison with relevant specifications or simulation test in the prior art and has strong subjectivity can be solved.

Description

Effectiveness evaluation method and system of physical protection system
Technical Field
The invention relates to the technical field of nuclear material physical protection, in particular to a method and a system for evaluating effectiveness of a physical protection system.
Background
The physical protection system is a safety precaution system which prevents the theft, robbery or illegal transfer of nuclear materials and the damage to nuclear facilities by using a physical barrier, a detection delay technology and the response capability of personnel.
Nuclear materials are radioactive and, once lost, stolen, used illegally or deliberately, can affect the safety of the environment and humans. Therefore, in order to ensure the safety of nuclear materials and nuclear facilities, a physical protection system is required to be arranged, and effective detection, delay and response of the intrusion factors are realized through various defensive measures and equipment.
And evaluating the effectiveness of the physical protection, namely evaluating the effectiveness of the physical protection system. The existing evaluation method adopts a qualitative evaluation method, the method mainly depends on human experience, and is compared with relevant specifications or is judged by simulation test, and the quantitative evaluation is to adopt a quantitative means for elements of a physical protection system and adopt a probability analysis method for risk evaluation. The method can be mixed with human factors, and is not beneficial to finding weak links of the physical protection system so as to improve the physical protection system.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide the effectiveness evaluation method and the effectiveness evaluation system of the physical protection system, which can solve the problems that in the prior art, the influence of subjective factors is judged by depending on human experience, comparison with relevant specifications or simulation tests, and the risk evaluation is carried out by adopting a probability analysis method, so that the evaluation process is complex and the result is not intuitive.
In order to achieve the above purposes, the technical scheme adopted by the invention is as follows:
the effectiveness evaluation method of the physical protection system comprises the following steps:
s1: establishing a simulated physical protection system, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
s2: loading intrusion factors in a simulated physical protection system, and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
s3: triggering the action of the defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach the real object;
s4: and judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective.
On the basis of the above technical solution, the step S1 specifically includes:
building a space structure model according to the physical protection system, and building a defense measure database according to the protection measures of the physical protection system;
and adding defense measures on defense nodes in the space structure model, setting defense factors outside the space structure model, and establishing a simulated virtual physical protection system.
On the basis of the above technical solution, the calculating the shortest time for the intrusion factor to reach the real object specifically includes:
analyzing all paths from all inlets of the spatial structure model to the real object by adopting a traversal algorithm;
and calculating the time of the intrusion factor passing through all paths and breaking through all defense measures, and comparing the time of all paths to obtain the shortest time of the intrusion factor reaching the real object.
On the basis of the technical scheme, the calculating the time for the intrusion factor to pass through all paths and break through all defensive measures specifically comprises the following steps:
analyzing the penetration capacity of the invasion factors to break through each defense measure on each path;
and calculating the time of the intrusion factor passing through each path according to the penetration capability.
On the basis of the technical scheme, the penetration capacity is obtained from a database established by experimental data according to the number of personnel, carrying equipment and professional technical capacity of the invasion factors.
On the basis of the technical scheme, the time for triggering the alarm signal is determined according to the alarm time which exceeds the set alarm time of the defense measure for the first time when the invasion factor breaks through the defense measure on the path.
On the basis of the technical scheme, the analysis of the shortest time for the defense factor to reach the real object specifically comprises the following steps:
and analyzing the optimal path of the defense factor to the real object, and calculating the total time of the defense factor passing through the optimal path according to the time of the preset defense factor passing through each defense measure on the optimal path.
The invention also provides an effectiveness evaluation system with a physical protection system, which comprises: the system comprises a simulated physical protection system module, a data processing module and a data processing module, wherein the simulated physical protection system module is used for establishing a simulated physical protection system, and comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
the intrusion factor loading analysis module is used for loading intrusion factors in the simulated physical protection system and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
the defense factor analysis module is used for triggering the defense factor according to the alarm signal and analyzing the shortest time for the defense factor to reach a real object;
and the judgment and evaluation module is used for judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object from the station, if so, the real object protection system is effective, and if not, the real object protection system is ineffective.
On the basis of the technical scheme, the intrusion factor loading and analyzing module comprises an intrusion factor evaluation submodule and is used for providing the defense capability data of the intrusion factors through a database, and the database is established through experimental data according to the number of personnel, carrying equipment and professional technical capability of the intrusion factors.
On the basis of the technical scheme, the intrusion factor loading analysis module further comprises an alarm sub-module which is used for analyzing whether each defense measure on the intrusion factor breakthrough path exceeds the set alarm time of the defense measure.
Compared with the prior art, the invention has the advantages that: when the effectiveness evaluation method and the effectiveness evaluation system of the physical protection system are adopted, firstly, a simulated physical protection system is established, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model; loading intrusion factors into the simulated physical protection system, and calculating the shortest time for the intrusion factors to reach the physical object and the time for the intrusion factors to trigger an alarm signal; then triggering a defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach a real object; and finally, judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective. The method can visually reflect the weak links of the physical protection system, remove subjective factors, find problems in time, improve the design of the problems and reduce the possibility of accidents. The method and the device avoid the problems that in the prior art, the influence of subjective factors is judged by depending on human experience, comparison with relevant specifications or simulation test, and the risk evaluation is carried out by adopting a probability analysis method, so that the evaluation process is complex and the result is not intuitive.
Drawings
Fig. 1 is a flowchart of an effectiveness evaluation method of a physical protection system in an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of an effectiveness evaluation method of a physical protection system in an embodiment of the present invention. As shown in fig. 1: the invention provides an effectiveness evaluation method of a real object protection system, which comprises the following steps:
s1: and establishing a simulated physical protection system, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model.
Preferably, the step of S1 specifically includes:
building a space structure model according to the physical protection system, and building a defense measure database according to the protection measures of the physical protection system; and adding defense measures on defense nodes in the space structure model, setting defense factors outside the space structure model, and establishing a simulated virtual physical protection system.
In this embodiment, common defensive measures, such as walls, security personnel, door access, camera shooting, and the like, are classified according to physical defense, personal defense, and technical defense, and time functions or set times of the defensive measures are correspondingly stored, and the database has the functions of addition, deletion, and modification, so that new defensive measures can be added or the time functions of the defensive measures can be modified according to the existing measures when the database is used. The actual path of a channel, a stair and the like is represented by a straight line, and nodes can be added on the path and used for adding defensive measures at the nodes. Selecting defensive measures from a database, adding the defensive measures to a spatial structure model, and selecting whether to modify a time function or set time or self-define the defensive measure set time and storing the defensive measures in the database; and adding the selected defense measures to the nodes.
S2: and loading the intrusion factors into the simulated physical protection system, and calculating the shortest time for the intrusion factors to reach the physical object and the time for the intrusion factors to trigger the alarm signal.
Preferably, the calculating the shortest time for the intrusion factor to reach the real object specifically includes:
analyzing all paths from all inlets of the spatial structure model to the real object by adopting a traversal algorithm; and calculating the time of the intrusion factor passing through all paths and breaking through all defense measures, and comparing the time of all paths to obtain the shortest time of the intrusion factor reaching the real object.
Preferably, the calculating the time for the intrusion factor to pass through all paths and break through all defensive measures specifically includes: analyzing the penetration capacity of the invasion factors to break through each defense measure on each path; and calculating the time of the intrusion factor passing through each path according to the penetration capability.
Preferably, the penetration capacity is obtained from a database established by experimental data according to the number of persons carrying the intrusion factors, equipment carrying and professional skill capacity.
In particular, a penetration time function of the intrusion factor penetration capacity can be fitted by a number of tests. The penetration function is a function of parameters related to the intrusion factors, such as the number of people, carrying equipment, professional skill and the like.
In the embodiment, when the database is established, the penetration capacity of the invasion factors such as terrorists or insiders on various defense measures such as physical defense, civil defense and technical defense is set as x, the penetration capacity of the invasion factors such as the terrorists or the insiders on various defense measures such as physical defense, personal defense and technical defense is set as the standard, the normalization is between [0 and 1], namely when the penetration capacity is completely absent, x is 0, and the corresponding penetration time is the longest time; the cracking capability of the tip professional technical team carrying professional tools is 1, and the shortest time corresponds to the shortest time.
Preferably, the time for triggering the alarm signal is determined according to the alarm time which exceeds the set alarm time of the defense measure for the first time when the intrusion factor breaks through the defense measure on the path.
Specifically, the triggering alarm time of each defense measure is set, and when the intrusion factor breaks through the defense measure, the triggering alarm time exceeds the correspondingly set triggering alarm time, and an alarm signal is triggered.
S3: and triggering the action of the defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach the real object.
Preferably, analyzing the shortest time for the defensive factor to reach the real object specifically comprises:
and analyzing the optimal path of the defense factor to the real object, and calculating the total time of the defense factor passing through the optimal path according to the time of the preset defense factor passing through each defense measure on the optimal path.
S4: and judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective.
In addition, when the real object protection system is judged to be invalid, defensive measures can be added into the simulated real object protection system until the requirements of the real object protection system are met, and a modification suggestion is proposed according to the defensive measures.
The invention also provides an effectiveness evaluation system of the material object protection system, which comprises the following components: the simulated physical protection system module is used for establishing a simulated physical protection system, and the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
the intrusion factor loading analysis module is used for loading intrusion factors in the simulated physical protection system and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
the defense factor analysis module is used for triggering the defense factor according to the alarm signal and analyzing the shortest time for the defense factor to reach a real object;
and the judgment and evaluation module is used for judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object from the station, if so, the real object protection system is effective, and if not, the real object protection system is ineffective.
Preferably, the intrusion factor loading and analyzing module comprises an intrusion factor evaluation submodule for providing the defense capability data of the intrusion factors through a database, and the database is established through experimental data according to the number of people, carrying equipment and professional technical capability of the intrusion factors.
Preferably, the intrusion factor loading analysis module further comprises an alarm sub-module, which is used for analyzing whether each defense measure on the intrusion factor breakthrough path exceeds the set alarm time of the defense measure.
In summary, the following steps: when the effectiveness evaluation method and the effectiveness evaluation system of the physical protection system are adopted, firstly, a simulated physical protection system is established, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model; loading intrusion factors into the simulated physical protection system, and calculating the shortest time for the intrusion factors to reach the physical object and the time for the intrusion factors to trigger an alarm signal; then triggering a defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach a real object; and finally, judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective. The method can visually reflect the weak links of the physical protection system, remove subjective factors, find problems in time, improve the design of the problems and reduce the possibility of accidents. The method and the device avoid the problems that in the prior art, the influence of subjective factors is judged by depending on human experience, comparison with relevant specifications or simulation test, and the risk evaluation is carried out by adopting a probability analysis method, so that the evaluation process is complex and the result is not intuitive.
The present invention is not limited to the above-mentioned preferred embodiments, and any other products in various forms can be obtained by anyone with the teaching of the present invention, but any changes in the shape or structure thereof, which have the same or similar technical solutions as the present invention, are within the protection scope.

Claims (10)

1. The method for evaluating the effectiveness of the physical protection system is characterized by comprising the following steps of:
s1: establishing a simulated physical protection system, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
s2: loading intrusion factors in a simulated physical protection system, and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
s3: triggering the action of the defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach the real object;
s4: and judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective.
2. The method for evaluating the effectiveness of the material object protection system according to claim 1, wherein the step S1 specifically includes:
building a space structure model according to the physical protection system, and building a defense measure database according to the protection measures of the physical protection system;
and adding defense measures on defense nodes in the space structure model, setting defense factors outside the space structure model, and establishing a simulated virtual physical protection system.
3. The method for evaluating the effectiveness of the entity protection system according to claim 1, wherein the calculating the shortest time for the intrusion factor to reach the entity specifically comprises:
analyzing all paths from all inlets of the spatial structure model to the real object by adopting a traversal algorithm;
and calculating the time of the intrusion factor passing through all paths and breaking through all defense measures, and comparing the time of all paths to obtain the shortest time of the intrusion factor reaching the real object.
4. The method for evaluating the effectiveness of the physical protection system according to claim 3, wherein the calculating the time for the intrusion factor to pass through all paths and break through all defensive measures specifically comprises:
analyzing the penetration capacity of the invasion factors to break through each defense measure on each path;
and calculating the time of the intrusion factor passing through each path according to the penetration capability.
5. The method for evaluating the effectiveness of the physical protection system according to claim 4, wherein the penetration ability is obtained from a database created by experimental data according to the number of persons, carrying equipment and professional skills of the invasion factors.
6. The method for evaluating the effectiveness of the physical protection system according to claim 1, wherein the time for triggering the alarm signal is determined according to the alarm time when the intrusion factor first exceeds the set time of the defense measure when the intrusion factor breaks through the defense measure on the path.
7. The method for evaluating the effectiveness of a material object protection system according to claim 1, wherein the analyzing the shortest time for the defense factor to reach the material object specifically comprises:
and analyzing the optimal path of the defense factor to the real object, and calculating the total time of the defense factor passing through the optimal path according to the time of the preset defense factor passing through each defense measure on the optimal path.
8. An effectiveness evaluation system for implementing the effectiveness evaluation method according to claim 1,
the system comprises a simulated physical protection system module, a data processing module and a data processing module, wherein the simulated physical protection system module is used for establishing a simulated physical protection system, and comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
the intrusion factor loading analysis module is used for loading intrusion factors in the simulated physical protection system and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
the defense factor analysis module is used for triggering the defense factor according to the alarm signal and analyzing the shortest time for the defense factor to reach a real object;
and the judgment and evaluation module is used for judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object from the station, if so, the real object protection system is effective, and if not, the real object protection system is ineffective.
9. The validity evaluation system of the physical protection system of claim 8, wherein the intrusion factor loading analysis module comprises an intrusion factor evaluation sub-module for providing the penetration capability data of the intrusion factors through a database, the database being established by experimental data according to the number of people, carrying equipment and professional skills of the intrusion factors.
10. The system for evaluating the effectiveness of a physical protection system according to claim 8, wherein: the intrusion factor loading analysis module also comprises an alarm sub-module which is used for analyzing whether each defense measure on the intrusion factor breakthrough path exceeds the set alarm time of the defense measure.
CN201911407409.4A 2019-12-31 2019-12-31 Effectiveness evaluation method and system of physical protection system Active CN111125929B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911407409.4A CN111125929B (en) 2019-12-31 2019-12-31 Effectiveness evaluation method and system of physical protection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911407409.4A CN111125929B (en) 2019-12-31 2019-12-31 Effectiveness evaluation method and system of physical protection system

Publications (2)

Publication Number Publication Date
CN111125929A true CN111125929A (en) 2020-05-08
CN111125929B CN111125929B (en) 2023-04-18

Family

ID=70506163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911407409.4A Active CN111125929B (en) 2019-12-31 2019-12-31 Effectiveness evaluation method and system of physical protection system

Country Status (1)

Country Link
CN (1) CN111125929B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115438463A (en) * 2022-08-02 2022-12-06 国家核安保技术中心 Protection system evaluation method, evaluation device, and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060085367A1 (en) * 2000-02-23 2006-04-20 Genovese James A System and method for hazardous incident decision support and training
CN104463455A (en) * 2014-12-02 2015-03-25 中广核工程有限公司 Nuclear power physical protection effectiveness analysis method, device and system
CN105844704A (en) * 2016-03-23 2016-08-10 深圳市欣横纵数码科技有限公司 Nuclear security 3D virtual simulation method
CN205644630U (en) * 2016-03-23 2016-10-12 深圳市欣横纵数码科技有限公司 Validity evaluation system of nuclear power physical protection
CN109190932A (en) * 2018-08-15 2019-01-11 华南理工大学 A kind of critical infrastructures physical protection system risk monitoring and control method
CN109598374A (en) * 2018-11-21 2019-04-09 华南理工大学 A kind of heuristic efficiency analysis method of key facility physical protection system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060085367A1 (en) * 2000-02-23 2006-04-20 Genovese James A System and method for hazardous incident decision support and training
CN104463455A (en) * 2014-12-02 2015-03-25 中广核工程有限公司 Nuclear power physical protection effectiveness analysis method, device and system
CN105844704A (en) * 2016-03-23 2016-08-10 深圳市欣横纵数码科技有限公司 Nuclear security 3D virtual simulation method
CN205644630U (en) * 2016-03-23 2016-10-12 深圳市欣横纵数码科技有限公司 Validity evaluation system of nuclear power physical protection
CN109190932A (en) * 2018-08-15 2019-01-11 华南理工大学 A kind of critical infrastructures physical protection system risk monitoring and control method
CN109598374A (en) * 2018-11-21 2019-04-09 华南理工大学 A kind of heuristic efficiency analysis method of key facility physical protection system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李征;关晨;吕敬;: "信息系统安全防护策略有效性评价探讨" *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115438463A (en) * 2022-08-02 2022-12-06 国家核安保技术中心 Protection system evaluation method, evaluation device, and storage medium

Also Published As

Publication number Publication date
CN111125929B (en) 2023-04-18

Similar Documents

Publication Publication Date Title
CN104283889B (en) APT attack detectings and early warning system inside electric system based on the network architecture
CN104811447B (en) One kind is based on the associated safety detection method of attack and system
CN112653678B (en) Network security situation perception analysis method and device
Zou et al. Insider threats of Physical Protection Systems in nuclear power plants: Prevention and evaluation
CN107517214A (en) System and method for providing computer network security
CN105573291B (en) A kind of threat detection method and safety device based on key parameter fusion verification
CN106713358A (en) Attack detection method and device
CN111178684B (en) Weak path determination method for nuclear facility physical protection system
CN111125929B (en) Effectiveness evaluation method and system of physical protection system
Back et al. Cyber-situational crime prevention and the breadth of cybercrimes among higher education institutions
El Wely et al. Analysis of physical protection system effectiveness of nuclear power plants based on performance approach
CN109190932B (en) Risk monitoring method for key infrastructure physical protection system
Amin et al. A holistic framework for process safety and security analysis
Jordan et al. Discrete-event simulation for the design and evaluation of physical protection systems
CN106453235A (en) Network security method
CN115438463A (en) Protection system evaluation method, evaluation device, and storage medium
Mariš et al. Security of infrastructure systems: infrastructure security assessment
Lovecek et al. Resistance of passive security elements as a quantitative parameter influencing the overall resistance and resilience of a critical infrastructure element
Majeed Physical Protection Systems (PPS) for Nuclear Facilities
KR102239376B1 (en) System of security level assessment for chemcial facility
KR102240737B1 (en) Method of security vulnerability assessment for chemcial facility
Le Sage et al. An object-oriented approach for modelling security scenarios
Li et al. Network security risk assessment based on item response theory
KR102211242B1 (en) Method of terror risk assessment for chemcial facility
Arwui et al. Modeling a Physical Protection System for the 444 TBq 60 CoIrradiation Source at the Center for Applied Radiation Science and Technology, Mafikeng, South Africa.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant