Critical Infrastructure Protection Risk Modelling with Games Technology

@inproceedings{Masek2010CriticalIP,
  title={Critical Infrastructure Protection Risk Modelling with Games Technology},
  author={Martin Masek and Adrian Boeing and William Bailey},
  booktitle={HCC},
  year={2010}
}
Threats to critical infrastructure are not passive. Trying to identify what is in fact ’critical’ is proving to be very difficult as threats constantly evolve. A major benefit of simulating the infrastructure is that security tests and risk modelling can be applied before infrastructure is built or its environment modified, allowing for lower cost design alterations to minimise vulnerabilities. By using the 3D environment of an existing Game Engine we can explore several possibilities for… 
Multiplayer Game Technology to Manage Critical Infrastructure Protection
  • L. Beltran, M. Merabti, Q. Shi
  • Computer Science
    2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
  • 2012
TLDR
This project proposes a tool that models and represents a complex system in an easy-to-understand, comprehensive manner, enabling all those involved in monitoring the system to detect problems and threats, and make better informed security decisions.
WAMbot: Simulation and modelling of a team of autonomous mobile robots
TLDR
These simulators allowed a team composed mostly of part-time volunteers to construct a complex distributed, multi-robot system and proved essential to the team's success in the MAGIC 2010 challenge.
WAMbot: Team MAGICian's entry to the Multi Autonomous Ground‐robotic International Challenge 2010
TLDR
An autonomous unmanned ground vehicle and the Team MAGICian solution to the 2010 Multi Autonomous Ground‐robotic International Challenge (MAGIC) were specifically designed to address the demands of the large‐scale distributed reconnaissance and surveillance task presented in the challenge.

References

SHOWING 1-10 OF 16 REFERENCES
The Case for ‘Risk Awareness’
TLDR
This paper argues that, in the post-modern world, the intelligence function alone no longer fulfils the security requirement to become risk aware, and suggests that risk awareness should be formally and openly adopted within a corporate security function, and networked with similar processes in other corporate functions.
Risk and Security: Are they Compatible Concepts?
TLDR
There are a number of ontological discrepancies between the concept of security and that of risk which deserve further study and investigation.
Critical Infrastructure: Homeland Security and Emergency Preparedness
TLDR
The Role of Oversight The Effect of Globalization Conventions, Laws, and Regulations Guidance and Best Practices Prescriptive vs Performance Based Impact on Criminal, Administrative, and Civil Law Potential Abuses of Authority and Credibility Government vs Industry Self-Regulation Knowledge Gaps Arising from Performance-Based Regulation Predictability in Prescriptively Vulnerability Information Sharing and Analysis Centers.
Google Earth
TLDR
An environment to browse old maps on Google Earth is built and the map of error distribution over Silk Road region is created, which was revealed by the comparison of old maps with satellite images onGoogle Earth.
Geological Survey
This report was prepared as an account of work sponsored by the United Stales Government Neither the United States nor the Umted States Department of Energy, nor any of their employees, nor any of
THE U. S. GEOLOGICAL SURVEY.
TLDR
This document summarizes current capabilities, research and operational priorities, and plans for further studies that were established at the 2015 USGS workshop on quantitative hazard assessments of earthquake-triggered landsliding and liquefaction in the Czech Republic.
Garage Games: Torque Game Engine
  • Garage Games: Torque Game Engine
  • 2010
Trusted Information Sharing Network for Critical Infrastructure Protection: Critical Infrastructure Protection National Strategy, Canberra: Trusted Information Sharing Network
  • Trusted Information Sharing Network for Critical Infrastructure Protection: Critical Infrastructure Protection National Strategy, Canberra: Trusted Information Sharing Network
  • 2004
Critical infrastructure interdependency modeling: a survey of U.S. and International research
  • Idaho National Laboratory Technical Report
  • 2006
International Atomic Energy Agency Application of simulation techniques for accident management training in nuclear power plants
  • International Atomic Energy Agency Application of simulation techniques for accident management training in nuclear power plants
  • 2003
...
...