The ASSESS Neutralization Analysis module
The ASSESS Neutralization Analysis module (Neutralization) is part of Analytic System and Software for Evaluation of Safeguards and Security, ASSESS, a vulnerability assessment tool. Neutralization models a fire fight engagement security inspectors (SIs) and adversaries. Results are based on probability of neutralization, P(N), which estimates the likelihood that SIs will win, given that SIs interrupt the attackers and begin an armed engagement. The calculating engine of the module is the Brief Adversary Threat Loss Estimator, BATLE. Engagements can have as many as thirty combatants on a side. Reinforcements may be introduced or combatant characteristics may be changed as many as ten times in one engagement. Inputs may be made with or without programmed guidance to the user. Combatant characteristics come from a modifiable library. Seven different characteristics can be independently specified for each combatant. Graphs of time distributions and studies of the sensitivity of P(N) to any combatant characteristic of either SIs or adversaries can be requested. Output files from Neutralization are used by Outsider Analysis to produce probability of security system win. 4 refs., 12 figs., 2 tabs.
- Research Organization:
- Sandia National Labs., Albuquerque, NM (USA)
- DOE Contract Number:
- AC04-76DP00789
- OSTI ID:
- 5915853
- Report Number(s):
- SAND-89-1603C; CONF-890736-12; ON: DE89014801
- Country of Publication:
- United States
- Language:
- English
Similar Records
Neutralization and system effectiveness
Comparison of ASSESS neutralization module results with actual small force engagement outcomes
Related Subjects
Inspection
& Accountability
98 NUCLEAR DISARMAMENT, SAFEGUARDS, AND PHYSICAL PROTECTION
99 GENERAL AND MISCELLANEOUS
990000 -- General & Miscellaneous
990220 -- Computers
Computerized Models
& Computer Programs-- (1987-1989)
ADVERSARIES
COMPUTER ARCHITECTURE
COMPUTERIZED SIMULATION
INTERCEPTION
PERSONNEL
PHYSICAL PROTECTION
SABOTAGE
SECURITY
SECURITY PERSONNEL
SIMULATION
VULNERABILITY