skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Systematic Analysis of Vulnerability to Intrusion

Abstract

SAVI models physical protection systems for fixed sites using Adversary Sequence Diagrams (ASDs) and then uses the ASD to find most-vulnerable adversary paths through the ASD. The identified paths have the lowest Probability of Interruption among all the paths through the ASD.

Authors:
 [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [2];  [2];  [1];  [2];  [2]
  1. Sandia National Laboratories
  2. Vencore
Publication Date:
Research Org.:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Sponsoring Org.:
USDOE
Contributing Org.:
Vencore
OSTI Identifier:
1395465
Report Number(s):
SAVI; 005457IBMPC00
SCR #2218
DOE Contract Number:
NA0003525
Resource Type:
Software
Software Revision:
00
Software Package Number:
005457
Software CPU:
IBMPC
Source Code Available:
No
Country of Publication:
United States

Citation Formats

Bouchard, Ann MArie, Browitt, Debra, Adams, Douglas G., Mondragon, Junko, Roehrig, Nathaniel, Browitt, Daniel, Shannon, Sharon A, Russ, Denise Trina, Sisneros, Melissa J, Key, Brad, Langerwalter, Kyle, Garrison, Jim, Yazzie, Kathy, and Karasz, Jerry. Systematic Analysis of Vulnerability to Intrusion. Computer software. Vers. 00. USDOE. 17 Aug. 2017. Web.
Bouchard, Ann MArie, Browitt, Debra, Adams, Douglas G., Mondragon, Junko, Roehrig, Nathaniel, Browitt, Daniel, Shannon, Sharon A, Russ, Denise Trina, Sisneros, Melissa J, Key, Brad, Langerwalter, Kyle, Garrison, Jim, Yazzie, Kathy, & Karasz, Jerry. (2017, August 17). Systematic Analysis of Vulnerability to Intrusion (Version 00) [Computer software].
Bouchard, Ann MArie, Browitt, Debra, Adams, Douglas G., Mondragon, Junko, Roehrig, Nathaniel, Browitt, Daniel, Shannon, Sharon A, Russ, Denise Trina, Sisneros, Melissa J, Key, Brad, Langerwalter, Kyle, Garrison, Jim, Yazzie, Kathy, and Karasz, Jerry. Systematic Analysis of Vulnerability to Intrusion. Computer software. Version 00. August 17, 2017.
@misc{osti_1395465,
title = {Systematic Analysis of Vulnerability to Intrusion, Version 00},
author = {Bouchard, Ann MArie and Browitt, Debra and Adams, Douglas G. and Mondragon, Junko and Roehrig, Nathaniel and Browitt, Daniel and Shannon, Sharon A and Russ, Denise Trina and Sisneros, Melissa J and Key, Brad and Langerwalter, Kyle and Garrison, Jim and Yazzie, Kathy and Karasz, Jerry},
abstractNote = {SAVI models physical protection systems for fixed sites using Adversary Sequence Diagrams (ASDs) and then uses the ASD to find most-vulnerable adversary paths through the ASD. The identified paths have the lowest Probability of Interruption among all the paths through the ASD.},
doi = {},
year = {Thu Aug 17 00:00:00 EDT 2017},
month = {Thu Aug 17 00:00:00 EDT 2017},
note =
}

Software:
To order this software, request consultation services, or receive further information, please fill out the following request.

Save / Share:

To initiate an order for this software, request consultation services, or receive further information, fill out the request form below. You may also reach us by email at: .

OSTI staff will begin to process an order for scientific and technical software once the payment and signed site license agreement are received. If the forms are not in order, OSTI will contact you. No further action will be taken until all required information and/or payment is received. Orders are usually processed within three to five business days.

Software Request

(required)
(required)
(required)
(required)
(required)
(required)
(required)
(required)