Analyzing intelligence on WMD attacks using threaded event-based simulation

Qi Fang, Peng Liu, John Yen, Jonathan Morgan, Donald Shemanski, Frank Ritter

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Data available for intelligence analysis is often incomplete, ambiguous and voluminous. Also, the data may be unorganized, the details overwhelming, and considerable analysis may be required to uncover adversarial activities. This paper describes a simulation-based approach that helps analysts understand data and use it to predict future events and possible scenarios. In particular, the approach enables intelligence analysts to find, display and understand data relationships by connecting the dots of data to create network of information. The approach also generates alternative storylines, allowing analysts to view other possible outcomes. It facilitates the automation of reasoning and the detection of inconsistent data, which provides more reliable information for analysis. A case study using data from the TV series, 24, demonstrates the feasibility of approach and its application to intelligence analysis of WMD attacks against the critical infrastructure.

Original languageEnglish (US)
Title of host publicationCritical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Revised Selected Papers
EditorsSujeet Shenoi, Jonathan Butts
PublisherSpringer New York LLC
Pages201-216
Number of pages16
ISBN (Print)9783642248634
StatePublished - Jan 1 2011
Event5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011 - Hanover, United States
Duration: Mar 23 2011Mar 25 2011

Publication series

NameIFIP Advances in Information and Communication Technology
Volume367
ISSN (Print)1868-4238

Other

Other5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011
CountryUnited States
CityHanover
Period3/23/113/25/11

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint Dive into the research topics of 'Analyzing intelligence on WMD attacks using threaded event-based simulation'. Together they form a unique fingerprint.

  • Cite this

    Fang, Q., Liu, P., Yen, J., Morgan, J., Shemanski, D., & Ritter, F. (2011). Analyzing intelligence on WMD attacks using threaded event-based simulation. In S. Shenoi, & J. Butts (Eds.), Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Revised Selected Papers (pp. 201-216). (IFIP Advances in Information and Communication Technology; Vol. 367). Springer New York LLC.