Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy

@article{Dai2012BenefitCostAO,
  title={Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy},
  author={J. Dai and R. Hu and J. Chen and Qing Cai},
  journal={Entropy},
  year={2012},
  volume={14},
  pages={571-580}
}
  • J. Dai, R. Hu, +1 author Qing Cai
  • Published 2012
  • Computer Science
  • Entropy
  • This article proposes a quantitative risk assessment for security systems which have multiple protected assets and a risk-based benefit-cost analysis for decision makers. The proposed methodology consists of five phases: identification of assets, security unit and intrusion path, security unit effectiveness estimation, intrusion path effectiveness estimation, security system risk assessment and benefit-cost estimation. Key innovations in this methodology include its use of effectiveness entropy… CONTINUE READING
    6 Citations

    Figures, Tables, and Topics from this paper.

    Explore Further: Topics Discussed in This Paper

    Dynamic information-theoretic measures for security informatics
    • 2
    Securing the Network for a Smart Bracelet System
    • Iuliana Marin, N. Goga
    • Computer Science
    • 2018 22nd International Conference on System Theory, Control and Computing (ICSTCC)
    • 2018
    • 2

    References

    SHOWING 1-10 OF 39 REFERENCES
    Robust allocation of a defensive budget considering an attacker's private information.
    • 79
    • PDF
    Physical protection systems cost and performance analysis: a case study
    • 28
    Introduction to Security
    • 170
    • PDF
    Modeling values for anti-terrorism analysis.
    • R. Keeney
    • Engineering, Medicine
    • Risk analysis : an official publication of the Society for Risk Analysis
    • 2007
    • 63
    The timing and deterrence of terrorist attacks due to exogenous dynamics
    • 46
    • PDF
    Modeling secrecy and deception in a multiple-period attacker-defender signaling game
    • 171
    • PDF
    Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers.
    • 60
    • PDF