000 03158nam  2200337zi 4500
0019.881594
003CaOODSP
00520240219183525
006m     o  d f      
007cr cn|||||||||
008191104t20132013quca    ob   f000 0 eng d
040 |aCaOODSP|beng|erda|cCaOODSP
0410 |aeng|beng|bfre
0861 |aD68-4/409-2013E-PDF
1001 |aLéchevin, N., |eauthor.
24510|aPattern recognition of socio-technical network vulnerabilities : |bmodeling and preliminary results / |cNicolas Léchevin, Anne-Laure Jousselme, Patrick Maupin, DRDC Valcartier.
264 1|aQuebec (Quebec) : |bDefence R&D Canada - Valcartier, |c2013.
264 4|c©2013
300 |a1 online resource (x, 60 pages, 2 unnumbered pages) : |billustrations (chiefly colour).
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
4901 |aTechnical report ; |vDRDC Valcartier TR 2013-409
500 |a"December 2013."
504 |aIncludes bibliographical references (pages 49-52).
5203 |a"When faced with potentially disruptive events, the state of a network may unexpectedly evolve to regions of the state space where safe operating conditions are no longer ensured. It is thus highly desirable to relate the network characteristics and operating conditions to its vulnerabilities, if any, in order to mitigate risk expressed as a function of network inoperability and loss of quality of service. A pattern recognition approach is adopted to relate the structural features of the network to the loss of operating nodes and edges. Two types of networks are considered for analysis and simulation in this document. A network characterized by flow conservation and capacity constraints is adapted from a fuse model, which may lead, in some instances, to cascading events. A tactical swarm of robots is deployed either to achieve terrain surveillance coverage or to maintain client connectivity so that every client can communicate in remote area. In both cases, the swarm of robots should maintain its connectivity at each time instant. The swarm deployment adapts to the loss of a robot caused by such factors as hardware/software failure, enemy action, or the presence of malware. The motion strategy prioritizes the client coverage, which may entail possible losses of connectivity. Given the motion strategy at hand, the swarm presents vulnerabilities related to the loss of some nodes. The classifier, instrumental in performing pattern recognition, is trained from a sample of networks obtained by some probabilistic generator. The classifier is shown to model, and to some extent, predict quickly the vulnerabilities of a class of networks as a function of their structural properties"--Abstract, page i.
546 |aIncludes abstracts and summaries in English and French.
7102 |aDefence R&D Canada.
7102 |aDefence R&D Canada - Valcartier.
830#0|aTechnical report (Defence R&D Canada)|vDRDC Valcartier TR 2013-409.|w(CaOODSP)9.820558
85640|qPDF|s3.49 MB|uhttps://publications.gc.ca/collections/collection_2019/rddc-drdc/D68-4-409-2013-eng.pdf