CN111125929A - Effectiveness evaluation method and system of physical protection system - Google Patents
Effectiveness evaluation method and system of physical protection system Download PDFInfo
- Publication number
- CN111125929A CN111125929A CN201911407409.4A CN201911407409A CN111125929A CN 111125929 A CN111125929 A CN 111125929A CN 201911407409 A CN201911407409 A CN 201911407409A CN 111125929 A CN111125929 A CN 111125929A
- Authority
- CN
- China
- Prior art keywords
- defense
- protection system
- factor
- intrusion
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T17/00—Three dimensional [3D] modelling, e.g. data description of 3D objects
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- General Physics & Mathematics (AREA)
- Educational Administration (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Game Theory and Decision Science (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Computer Graphics (AREA)
- Geometry (AREA)
- Software Systems (AREA)
- Alarm Systems (AREA)
Abstract
The invention relates to the technical field of nuclear material physical protection, in particular to a method and a system for evaluating the effectiveness of a physical protection system, wherein the method comprises the following steps: and establishing a simulated physical protection system, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model. And loading the intrusion factors into the simulated physical protection system, and calculating the shortest time for the intrusion factors to reach the physical object and the time for the intrusion factors to trigger the alarm signal. And triggering the action of the defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach the real object. And judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, and determining whether the real object protection system is effective. The problem that the real object protection system is judged by depending on human experience, comparison with relevant specifications or simulation test in the prior art and has strong subjectivity can be solved.
Description
Technical Field
The invention relates to the technical field of nuclear material physical protection, in particular to a method and a system for evaluating effectiveness of a physical protection system.
Background
The physical protection system is a safety precaution system which prevents the theft, robbery or illegal transfer of nuclear materials and the damage to nuclear facilities by using a physical barrier, a detection delay technology and the response capability of personnel.
Nuclear materials are radioactive and, once lost, stolen, used illegally or deliberately, can affect the safety of the environment and humans. Therefore, in order to ensure the safety of nuclear materials and nuclear facilities, a physical protection system is required to be arranged, and effective detection, delay and response of the intrusion factors are realized through various defensive measures and equipment.
And evaluating the effectiveness of the physical protection, namely evaluating the effectiveness of the physical protection system. The existing evaluation method adopts a qualitative evaluation method, the method mainly depends on human experience, and is compared with relevant specifications or is judged by simulation test, and the quantitative evaluation is to adopt a quantitative means for elements of a physical protection system and adopt a probability analysis method for risk evaluation. The method can be mixed with human factors, and is not beneficial to finding weak links of the physical protection system so as to improve the physical protection system.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide the effectiveness evaluation method and the effectiveness evaluation system of the physical protection system, which can solve the problems that in the prior art, the influence of subjective factors is judged by depending on human experience, comparison with relevant specifications or simulation tests, and the risk evaluation is carried out by adopting a probability analysis method, so that the evaluation process is complex and the result is not intuitive.
In order to achieve the above purposes, the technical scheme adopted by the invention is as follows:
the effectiveness evaluation method of the physical protection system comprises the following steps:
s1: establishing a simulated physical protection system, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
s2: loading intrusion factors in a simulated physical protection system, and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
s3: triggering the action of the defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach the real object;
s4: and judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective.
On the basis of the above technical solution, the step S1 specifically includes:
building a space structure model according to the physical protection system, and building a defense measure database according to the protection measures of the physical protection system;
and adding defense measures on defense nodes in the space structure model, setting defense factors outside the space structure model, and establishing a simulated virtual physical protection system.
On the basis of the above technical solution, the calculating the shortest time for the intrusion factor to reach the real object specifically includes:
analyzing all paths from all inlets of the spatial structure model to the real object by adopting a traversal algorithm;
and calculating the time of the intrusion factor passing through all paths and breaking through all defense measures, and comparing the time of all paths to obtain the shortest time of the intrusion factor reaching the real object.
On the basis of the technical scheme, the calculating the time for the intrusion factor to pass through all paths and break through all defensive measures specifically comprises the following steps:
analyzing the penetration capacity of the invasion factors to break through each defense measure on each path;
and calculating the time of the intrusion factor passing through each path according to the penetration capability.
On the basis of the technical scheme, the penetration capacity is obtained from a database established by experimental data according to the number of personnel, carrying equipment and professional technical capacity of the invasion factors.
On the basis of the technical scheme, the time for triggering the alarm signal is determined according to the alarm time which exceeds the set alarm time of the defense measure for the first time when the invasion factor breaks through the defense measure on the path.
On the basis of the technical scheme, the analysis of the shortest time for the defense factor to reach the real object specifically comprises the following steps:
and analyzing the optimal path of the defense factor to the real object, and calculating the total time of the defense factor passing through the optimal path according to the time of the preset defense factor passing through each defense measure on the optimal path.
The invention also provides an effectiveness evaluation system with a physical protection system, which comprises: the system comprises a simulated physical protection system module, a data processing module and a data processing module, wherein the simulated physical protection system module is used for establishing a simulated physical protection system, and comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
the intrusion factor loading analysis module is used for loading intrusion factors in the simulated physical protection system and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
the defense factor analysis module is used for triggering the defense factor according to the alarm signal and analyzing the shortest time for the defense factor to reach a real object;
and the judgment and evaluation module is used for judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object from the station, if so, the real object protection system is effective, and if not, the real object protection system is ineffective.
On the basis of the technical scheme, the intrusion factor loading and analyzing module comprises an intrusion factor evaluation submodule and is used for providing the defense capability data of the intrusion factors through a database, and the database is established through experimental data according to the number of personnel, carrying equipment and professional technical capability of the intrusion factors.
On the basis of the technical scheme, the intrusion factor loading analysis module further comprises an alarm sub-module which is used for analyzing whether each defense measure on the intrusion factor breakthrough path exceeds the set alarm time of the defense measure.
Compared with the prior art, the invention has the advantages that: when the effectiveness evaluation method and the effectiveness evaluation system of the physical protection system are adopted, firstly, a simulated physical protection system is established, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model; loading intrusion factors into the simulated physical protection system, and calculating the shortest time for the intrusion factors to reach the physical object and the time for the intrusion factors to trigger an alarm signal; then triggering a defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach a real object; and finally, judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective. The method can visually reflect the weak links of the physical protection system, remove subjective factors, find problems in time, improve the design of the problems and reduce the possibility of accidents. The method and the device avoid the problems that in the prior art, the influence of subjective factors is judged by depending on human experience, comparison with relevant specifications or simulation test, and the risk evaluation is carried out by adopting a probability analysis method, so that the evaluation process is complex and the result is not intuitive.
Drawings
Fig. 1 is a flowchart of an effectiveness evaluation method of a physical protection system in an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of an effectiveness evaluation method of a physical protection system in an embodiment of the present invention. As shown in fig. 1: the invention provides an effectiveness evaluation method of a real object protection system, which comprises the following steps:
s1: and establishing a simulated physical protection system, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model.
Preferably, the step of S1 specifically includes:
building a space structure model according to the physical protection system, and building a defense measure database according to the protection measures of the physical protection system; and adding defense measures on defense nodes in the space structure model, setting defense factors outside the space structure model, and establishing a simulated virtual physical protection system.
In this embodiment, common defensive measures, such as walls, security personnel, door access, camera shooting, and the like, are classified according to physical defense, personal defense, and technical defense, and time functions or set times of the defensive measures are correspondingly stored, and the database has the functions of addition, deletion, and modification, so that new defensive measures can be added or the time functions of the defensive measures can be modified according to the existing measures when the database is used. The actual path of a channel, a stair and the like is represented by a straight line, and nodes can be added on the path and used for adding defensive measures at the nodes. Selecting defensive measures from a database, adding the defensive measures to a spatial structure model, and selecting whether to modify a time function or set time or self-define the defensive measure set time and storing the defensive measures in the database; and adding the selected defense measures to the nodes.
S2: and loading the intrusion factors into the simulated physical protection system, and calculating the shortest time for the intrusion factors to reach the physical object and the time for the intrusion factors to trigger the alarm signal.
Preferably, the calculating the shortest time for the intrusion factor to reach the real object specifically includes:
analyzing all paths from all inlets of the spatial structure model to the real object by adopting a traversal algorithm; and calculating the time of the intrusion factor passing through all paths and breaking through all defense measures, and comparing the time of all paths to obtain the shortest time of the intrusion factor reaching the real object.
Preferably, the calculating the time for the intrusion factor to pass through all paths and break through all defensive measures specifically includes: analyzing the penetration capacity of the invasion factors to break through each defense measure on each path; and calculating the time of the intrusion factor passing through each path according to the penetration capability.
Preferably, the penetration capacity is obtained from a database established by experimental data according to the number of persons carrying the intrusion factors, equipment carrying and professional skill capacity.
In particular, a penetration time function of the intrusion factor penetration capacity can be fitted by a number of tests. The penetration function is a function of parameters related to the intrusion factors, such as the number of people, carrying equipment, professional skill and the like.
In the embodiment, when the database is established, the penetration capacity of the invasion factors such as terrorists or insiders on various defense measures such as physical defense, civil defense and technical defense is set as x, the penetration capacity of the invasion factors such as the terrorists or the insiders on various defense measures such as physical defense, personal defense and technical defense is set as the standard, the normalization is between [0 and 1], namely when the penetration capacity is completely absent, x is 0, and the corresponding penetration time is the longest time; the cracking capability of the tip professional technical team carrying professional tools is 1, and the shortest time corresponds to the shortest time.
Preferably, the time for triggering the alarm signal is determined according to the alarm time which exceeds the set alarm time of the defense measure for the first time when the intrusion factor breaks through the defense measure on the path.
Specifically, the triggering alarm time of each defense measure is set, and when the intrusion factor breaks through the defense measure, the triggering alarm time exceeds the correspondingly set triggering alarm time, and an alarm signal is triggered.
S3: and triggering the action of the defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach the real object.
Preferably, analyzing the shortest time for the defensive factor to reach the real object specifically comprises:
and analyzing the optimal path of the defense factor to the real object, and calculating the total time of the defense factor passing through the optimal path according to the time of the preset defense factor passing through each defense measure on the optimal path.
S4: and judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective.
In addition, when the real object protection system is judged to be invalid, defensive measures can be added into the simulated real object protection system until the requirements of the real object protection system are met, and a modification suggestion is proposed according to the defensive measures.
The invention also provides an effectiveness evaluation system of the material object protection system, which comprises the following components: the simulated physical protection system module is used for establishing a simulated physical protection system, and the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
the intrusion factor loading analysis module is used for loading intrusion factors in the simulated physical protection system and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
the defense factor analysis module is used for triggering the defense factor according to the alarm signal and analyzing the shortest time for the defense factor to reach a real object;
and the judgment and evaluation module is used for judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object from the station, if so, the real object protection system is effective, and if not, the real object protection system is ineffective.
Preferably, the intrusion factor loading and analyzing module comprises an intrusion factor evaluation submodule for providing the defense capability data of the intrusion factors through a database, and the database is established through experimental data according to the number of people, carrying equipment and professional technical capability of the intrusion factors.
Preferably, the intrusion factor loading analysis module further comprises an alarm sub-module, which is used for analyzing whether each defense measure on the intrusion factor breakthrough path exceeds the set alarm time of the defense measure.
In summary, the following steps: when the effectiveness evaluation method and the effectiveness evaluation system of the physical protection system are adopted, firstly, a simulated physical protection system is established, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model; loading intrusion factors into the simulated physical protection system, and calculating the shortest time for the intrusion factors to reach the physical object and the time for the intrusion factors to trigger an alarm signal; then triggering a defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach a real object; and finally, judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective. The method can visually reflect the weak links of the physical protection system, remove subjective factors, find problems in time, improve the design of the problems and reduce the possibility of accidents. The method and the device avoid the problems that in the prior art, the influence of subjective factors is judged by depending on human experience, comparison with relevant specifications or simulation test, and the risk evaluation is carried out by adopting a probability analysis method, so that the evaluation process is complex and the result is not intuitive.
The present invention is not limited to the above-mentioned preferred embodiments, and any other products in various forms can be obtained by anyone with the teaching of the present invention, but any changes in the shape or structure thereof, which have the same or similar technical solutions as the present invention, are within the protection scope.
Claims (10)
1. The method for evaluating the effectiveness of the physical protection system is characterized by comprising the following steps of:
s1: establishing a simulated physical protection system, wherein the simulated physical protection system comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
s2: loading intrusion factors in a simulated physical protection system, and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
s3: triggering the action of the defense factor according to the alarm signal, and analyzing the shortest time for the defense factor to reach the real object;
s4: and judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object, if so, enabling the real object protection system to be effective, and if not, enabling the real object protection system to be ineffective.
2. The method for evaluating the effectiveness of the material object protection system according to claim 1, wherein the step S1 specifically includes:
building a space structure model according to the physical protection system, and building a defense measure database according to the protection measures of the physical protection system;
and adding defense measures on defense nodes in the space structure model, setting defense factors outside the space structure model, and establishing a simulated virtual physical protection system.
3. The method for evaluating the effectiveness of the entity protection system according to claim 1, wherein the calculating the shortest time for the intrusion factor to reach the entity specifically comprises:
analyzing all paths from all inlets of the spatial structure model to the real object by adopting a traversal algorithm;
and calculating the time of the intrusion factor passing through all paths and breaking through all defense measures, and comparing the time of all paths to obtain the shortest time of the intrusion factor reaching the real object.
4. The method for evaluating the effectiveness of the physical protection system according to claim 3, wherein the calculating the time for the intrusion factor to pass through all paths and break through all defensive measures specifically comprises:
analyzing the penetration capacity of the invasion factors to break through each defense measure on each path;
and calculating the time of the intrusion factor passing through each path according to the penetration capability.
5. The method for evaluating the effectiveness of the physical protection system according to claim 4, wherein the penetration ability is obtained from a database created by experimental data according to the number of persons, carrying equipment and professional skills of the invasion factors.
6. The method for evaluating the effectiveness of the physical protection system according to claim 1, wherein the time for triggering the alarm signal is determined according to the alarm time when the intrusion factor first exceeds the set time of the defense measure when the intrusion factor breaks through the defense measure on the path.
7. The method for evaluating the effectiveness of a material object protection system according to claim 1, wherein the analyzing the shortest time for the defense factor to reach the material object specifically comprises:
and analyzing the optimal path of the defense factor to the real object, and calculating the total time of the defense factor passing through the optimal path according to the time of the preset defense factor passing through each defense measure on the optimal path.
8. An effectiveness evaluation system for implementing the effectiveness evaluation method according to claim 1,
the system comprises a simulated physical protection system module, a data processing module and a data processing module, wherein the simulated physical protection system module is used for establishing a simulated physical protection system, and comprises a space structure model, defense measures set on nodes of the space structure model and defense factors set outside the space structure model;
the intrusion factor loading analysis module is used for loading intrusion factors in the simulated physical protection system and calculating the shortest time for the intrusion factors to reach a physical object and the time for the intrusion factors to trigger an alarm signal;
the defense factor analysis module is used for triggering the defense factor according to the alarm signal and analyzing the shortest time for the defense factor to reach a real object;
and the judgment and evaluation module is used for judging whether the shortest time for the intrusion factor to reach the real object after triggering the alarm is greater than the time for the defense factor to reach the real object from the station, if so, the real object protection system is effective, and if not, the real object protection system is ineffective.
9. The validity evaluation system of the physical protection system of claim 8, wherein the intrusion factor loading analysis module comprises an intrusion factor evaluation sub-module for providing the penetration capability data of the intrusion factors through a database, the database being established by experimental data according to the number of people, carrying equipment and professional skills of the intrusion factors.
10. The system for evaluating the effectiveness of a physical protection system according to claim 8, wherein: the intrusion factor loading analysis module also comprises an alarm sub-module which is used for analyzing whether each defense measure on the intrusion factor breakthrough path exceeds the set alarm time of the defense measure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911407409.4A CN111125929B (en) | 2019-12-31 | 2019-12-31 | Effectiveness evaluation method and system of physical protection system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911407409.4A CN111125929B (en) | 2019-12-31 | 2019-12-31 | Effectiveness evaluation method and system of physical protection system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111125929A true CN111125929A (en) | 2020-05-08 |
CN111125929B CN111125929B (en) | 2023-04-18 |
Family
ID=70506163
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911407409.4A Active CN111125929B (en) | 2019-12-31 | 2019-12-31 | Effectiveness evaluation method and system of physical protection system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111125929B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115438463A (en) * | 2022-08-02 | 2022-12-06 | 国家核安保技术中心 | Protection system evaluation method, evaluation device, and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060085367A1 (en) * | 2000-02-23 | 2006-04-20 | Genovese James A | System and method for hazardous incident decision support and training |
CN104463455A (en) * | 2014-12-02 | 2015-03-25 | 中广核工程有限公司 | Nuclear power physical protection effectiveness analysis method, device and system |
CN105844704A (en) * | 2016-03-23 | 2016-08-10 | 深圳市欣横纵数码科技有限公司 | Nuclear security 3D virtual simulation method |
CN205644630U (en) * | 2016-03-23 | 2016-10-12 | 深圳市欣横纵数码科技有限公司 | Validity evaluation system of nuclear power physical protection |
CN109190932A (en) * | 2018-08-15 | 2019-01-11 | 华南理工大学 | A kind of critical infrastructures physical protection system risk monitoring and control method |
CN109598374A (en) * | 2018-11-21 | 2019-04-09 | 华南理工大学 | A kind of heuristic efficiency analysis method of key facility physical protection system |
-
2019
- 2019-12-31 CN CN201911407409.4A patent/CN111125929B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060085367A1 (en) * | 2000-02-23 | 2006-04-20 | Genovese James A | System and method for hazardous incident decision support and training |
CN104463455A (en) * | 2014-12-02 | 2015-03-25 | 中广核工程有限公司 | Nuclear power physical protection effectiveness analysis method, device and system |
CN105844704A (en) * | 2016-03-23 | 2016-08-10 | 深圳市欣横纵数码科技有限公司 | Nuclear security 3D virtual simulation method |
CN205644630U (en) * | 2016-03-23 | 2016-10-12 | 深圳市欣横纵数码科技有限公司 | Validity evaluation system of nuclear power physical protection |
CN109190932A (en) * | 2018-08-15 | 2019-01-11 | 华南理工大学 | A kind of critical infrastructures physical protection system risk monitoring and control method |
CN109598374A (en) * | 2018-11-21 | 2019-04-09 | 华南理工大学 | A kind of heuristic efficiency analysis method of key facility physical protection system |
Non-Patent Citations (1)
Title |
---|
李征;关晨;吕敬;: "信息系统安全防护策略有效性评价探讨" * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115438463A (en) * | 2022-08-02 | 2022-12-06 | 国家核安保技术中心 | Protection system evaluation method, evaluation device, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN111125929B (en) | 2023-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104283889B (en) | APT attack detectings and early warning system inside electric system based on the network architecture | |
CN104811447B (en) | One kind is based on the associated safety detection method of attack and system | |
CN112653678B (en) | Network security situation perception analysis method and device | |
Zou et al. | Insider threats of Physical Protection Systems in nuclear power plants: Prevention and evaluation | |
CN107517214A (en) | System and method for providing computer network security | |
CN105573291B (en) | A kind of threat detection method and safety device based on key parameter fusion verification | |
CN106713358A (en) | Attack detection method and device | |
CN111178684B (en) | Weak path determination method for nuclear facility physical protection system | |
CN111125929B (en) | Effectiveness evaluation method and system of physical protection system | |
Back et al. | Cyber-situational crime prevention and the breadth of cybercrimes among higher education institutions | |
El Wely et al. | Analysis of physical protection system effectiveness of nuclear power plants based on performance approach | |
CN109190932B (en) | Risk monitoring method for key infrastructure physical protection system | |
Amin et al. | A holistic framework for process safety and security analysis | |
Jordan et al. | Discrete-event simulation for the design and evaluation of physical protection systems | |
CN106453235A (en) | Network security method | |
CN115438463A (en) | Protection system evaluation method, evaluation device, and storage medium | |
Mariš et al. | Security of infrastructure systems: infrastructure security assessment | |
Lovecek et al. | Resistance of passive security elements as a quantitative parameter influencing the overall resistance and resilience of a critical infrastructure element | |
Majeed | Physical Protection Systems (PPS) for Nuclear Facilities | |
KR102239376B1 (en) | System of security level assessment for chemcial facility | |
KR102240737B1 (en) | Method of security vulnerability assessment for chemcial facility | |
Le Sage et al. | An object-oriented approach for modelling security scenarios | |
Li et al. | Network security risk assessment based on item response theory | |
KR102211242B1 (en) | Method of terror risk assessment for chemcial facility | |
Arwui et al. | Modeling a Physical Protection System for the 444 TBq 60 CoIrradiation Source at the Center for Applied Radiation Science and Technology, Mafikeng, South Africa. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |