Abstract
PC EASI is an IBM personal computer or PC-compatible version of an analytical technique for measuring the effectiveness of physical protection systems. PC EASI utilizes a methodology called Estimate of Adversary Sequence Interruption (EASI) which evaluates the probability of interruption (PI) for a given sequence of adversary tasks. Probability of interruption is defined as the probability that the response force will arrive before the adversary force has completed its task. The EASI methodology is a probabilistic approach that analytically evaluates basic functions of the physical security system (detection, assessment, communications, and delay) with respect to response time along a single adversary path. It is important that the most critical scenarios for each target be identified to ensure that vulnerabilities have not been overlooked. If the facility is not overly complex, this can be accomplished by examining all paths. If the facility is complex, a global model such as Safeguards Automated Facility Evaluation (SAFE) may be used to identify the most vulnerable paths. PC EASI is menu-driven with screen forms for entering and editing the basic scenarios. In addition to evaluating PI for the basic scenario, the sensitivities of many of the parameters chosen in the scenario can be analyzed. These
More>>
- Developers:
- Release Date:
- 1985-11-15
- Project Type:
- Closed Source
- Software Type:
- Scientific
- Sponsoring Org.:
-
DOE/DPPrimary Award/Contract Number:AC04-76DP00789
- Code ID:
- 12353
- Site Accession Number:
- 2121
- Research Org.:
- Sandia National Laboratories (SNL), Albuquerque, NM, and Livermore, CA (United States)
- Country of Origin:
- United States
Citation Formats
Chapman, L., and Harlan, C.
Adversary Sequence Interruption Model.
Computer Software.
DOE/DP.
15 Nov. 1985.
Web.
doi:10.11578/dc.20180621.1.
Chapman, L., & Harlan, C.
(1985, November 15).
Adversary Sequence Interruption Model.
[Computer software].
https://doi.org/10.11578/dc.20180621.1.
Chapman, L., and Harlan, C.
"Adversary Sequence Interruption Model." Computer software.
November 15, 1985.
https://doi.org/10.11578/dc.20180621.1.
@misc{
doecode_12353,
title = {Adversary Sequence Interruption Model},
author = {Chapman, L. and Harlan, C.},
abstractNote = {PC EASI is an IBM personal computer or PC-compatible version of an analytical technique for measuring the effectiveness of physical protection systems. PC EASI utilizes a methodology called Estimate of Adversary Sequence Interruption (EASI) which evaluates the probability of interruption (PI) for a given sequence of adversary tasks. Probability of interruption is defined as the probability that the response force will arrive before the adversary force has completed its task. The EASI methodology is a probabilistic approach that analytically evaluates basic functions of the physical security system (detection, assessment, communications, and delay) with respect to response time along a single adversary path. It is important that the most critical scenarios for each target be identified to ensure that vulnerabilities have not been overlooked. If the facility is not overly complex, this can be accomplished by examining all paths. If the facility is complex, a global model such as Safeguards Automated Facility Evaluation (SAFE) may be used to identify the most vulnerable paths. PC EASI is menu-driven with screen forms for entering and editing the basic scenarios. In addition to evaluating PI for the basic scenario, the sensitivities of many of the parameters chosen in the scenario can be analyzed. These sensitivities provide information to aid the analyst in determining the tradeoffs for reducing the probability of interruption. PC EASI runs under the Micro Data Base Systems'' proprietary database management system Knowledgeman. KMAN provides the user environment and file management for the specified basic scenarios, and KGRAPH the graphical output of the sensitivity calculations. This software is not included. Due to errors in release 2 of KMAN, PC EASI will not execute properly; release 1.07 of KMAN is required.},
doi = {10.11578/dc.20180621.1},
url = {https://doi.org/10.11578/dc.20180621.1},
howpublished = {[Computer Software] \url{https://doi.org/10.11578/dc.20180621.1}},
year = {1985},
month = {nov}
}