skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Systematic Analysis of Vulnerability to Intrusion

Abstract

SAVI models physical protection systems for fixed sites using Adversary Sequence Diagrams (ASDs) and then uses the ASD to find most-vulnerable adversary paths through the ASD. The identified paths have the lowest Probability of Interruption among all the paths through the ASD.

Authors:
 [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [1];  [2];  [2];  [1];  [2];  [2]
  1. Sandia National Laboratories
  2. Vencore
Publication Date:
Research Org.:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Sponsoring Org.:
USDOE
Contributing Org.:
Vencore
OSTI Identifier:
1395465
Report Number(s):
SAVI; 005457IBMPC00
SCR #2218
DOE Contract Number:  
NA0003525
Resource Type:
Software
Software Revision:
00
Software Package Number:
005457
Software CPU:
IBMPC
Source Code Available:
No
Country of Publication:
United States

Citation Formats

Bouchard, Ann MArie, Browitt, Debra, Adams, Douglas G., Mondragon, Junko, Roehrig, Nathaniel, Browitt, Daniel, Shannon, Sharon A, Russ, Denise Trina, Sisneros, Melissa J, Key, Brad, Langerwalter, Kyle, Garrison, Jim, Yazzie, Kathy, and Karasz, Jerry. Systematic Analysis of Vulnerability to Intrusion. Computer software. Vers. 00. USDOE. 17 Aug. 2017. Web.
Bouchard, Ann MArie, Browitt, Debra, Adams, Douglas G., Mondragon, Junko, Roehrig, Nathaniel, Browitt, Daniel, Shannon, Sharon A, Russ, Denise Trina, Sisneros, Melissa J, Key, Brad, Langerwalter, Kyle, Garrison, Jim, Yazzie, Kathy, & Karasz, Jerry. (2017, August 17). Systematic Analysis of Vulnerability to Intrusion (Version 00) [Computer software].
Bouchard, Ann MArie, Browitt, Debra, Adams, Douglas G., Mondragon, Junko, Roehrig, Nathaniel, Browitt, Daniel, Shannon, Sharon A, Russ, Denise Trina, Sisneros, Melissa J, Key, Brad, Langerwalter, Kyle, Garrison, Jim, Yazzie, Kathy, and Karasz, Jerry. Systematic Analysis of Vulnerability to Intrusion. Computer software. Version 00. August 17, 2017.
@misc{osti_1395465,
title = {Systematic Analysis of Vulnerability to Intrusion, Version 00},
author = {Bouchard, Ann MArie and Browitt, Debra and Adams, Douglas G. and Mondragon, Junko and Roehrig, Nathaniel and Browitt, Daniel and Shannon, Sharon A and Russ, Denise Trina and Sisneros, Melissa J and Key, Brad and Langerwalter, Kyle and Garrison, Jim and Yazzie, Kathy and Karasz, Jerry},
abstractNote = {SAVI models physical protection systems for fixed sites using Adversary Sequence Diagrams (ASDs) and then uses the ASD to find most-vulnerable adversary paths through the ASD. The identified paths have the lowest Probability of Interruption among all the paths through the ASD.},
doi = {},
year = {2017},
month = {8},
note =
}

Software:
To order this software, request consultation services, or receive further information, please fill out the following request.

Save / Share:

To receive further information, fill out the request form below. OSTI staff will begin to process an order for scientific and technical software once the signed site license agreement is received. You may also reach us by email at: .

Software Request

(required)
(required)
(required)
(required)
(required)
(required)
(required)
(required)