TY - GEN
T1 - Analyzing intelligence on WMD attacks using threaded event-based simulation
AU - Fang, Qi
AU - Liu, Peng
AU - Yen, John
AU - Morgan, Jonathan
AU - Shemanski, Donald
AU - Ritter, Frank
N1 - Publisher Copyright:
© IFIP International Federation for Information Processing 2011.
PY - 2011
Y1 - 2011
N2 - Data available for intelligence analysis is often incomplete, ambiguous and voluminous. Also, the data may be unorganized, the details overwhelming, and considerable analysis may be required to uncover adversarial activities. This paper describes a simulation-based approach that helps analysts understand data and use it to predict future events and possible scenarios. In particular, the approach enables intelligence analysts to find, display and understand data relationships by connecting the dots of data to create network of information. The approach also generates alternative storylines, allowing analysts to view other possible outcomes. It facilitates the automation of reasoning and the detection of inconsistent data, which provides more reliable information for analysis. A case study using data from the TV series, 24, demonstrates the feasibility of approach and its application to intelligence analysis of WMD attacks against the critical infrastructure.
AB - Data available for intelligence analysis is often incomplete, ambiguous and voluminous. Also, the data may be unorganized, the details overwhelming, and considerable analysis may be required to uncover adversarial activities. This paper describes a simulation-based approach that helps analysts understand data and use it to predict future events and possible scenarios. In particular, the approach enables intelligence analysts to find, display and understand data relationships by connecting the dots of data to create network of information. The approach also generates alternative storylines, allowing analysts to view other possible outcomes. It facilitates the automation of reasoning and the detection of inconsistent data, which provides more reliable information for analysis. A case study using data from the TV series, 24, demonstrates the feasibility of approach and its application to intelligence analysis of WMD attacks against the critical infrastructure.
UR - http://www.scopus.com/inward/record.url?scp=84958745523&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84958745523&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-24864-1_14
DO - 10.1007/978-3-642-24864-1_14
M3 - Conference contribution
AN - SCOPUS:84958745523
SN - 9783642248634
T3 - IFIP Advances in Information and Communication Technology
SP - 201
EP - 216
BT - Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Revised Selected Papers
A2 - Butts, Jonathan
A2 - Shenoi, Sujeet
PB - Springer New York LLC
T2 - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011
Y2 - 23 March 2011 through 25 March 2011
ER -