SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Extended search

Träfflista för sökning "hsv:(NATURVETENSKAP) ;lar1:(fhs);hsvcat:2"

Search: hsv:(NATURVETENSKAP) > Swedish National Defence College > Engineering and Technology

  • Result 1-10 of 14
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Liwång, Hans, 1974, et al. (author)
  • Quantitative risk analysis – Ship security analysis for effective risk control options
  • 2013
  • In: Safety Science. - : Elsevier BV. - 0925-7535 .- 1879-1042. ; 58:1, s. 98-112
  • Journal article (peer-reviewed)abstract
    • This study reviews ship security assessment. The objectives are to explore the possibilities for quantifying and performing a more thorough ship security risk analysis than that described in the International Ship and Port Facility Security code and to evaluate to what extent this more detailed analysis increases ship security and facilitate the effective selection of risk control options.The study focuses on Somali-based maritime piracy, using piracy on the Indian Ocean as a case study. Data are collected using questionnaires and interviews with civilian and military security experts who possess firsthand experience of piracy off the coast of Somalia. The data are collected specifically for this study and describe and quantify the threat’s capability, intent and likelihood of exploiting a ship’s vulnerability. Based on the collected description of the threat, the study analyzes and describes: probability of detection by pirates, probability of successful approach, and probability of successful boarding.The performed work shows good agreement between calculated probabilities and frequencies in the cited incident reports. Also, the developed scenarios describe the most important influences on the analysed areas. The research therefore shows that the proposed risk-based approach, which uses structurally collected and documented information on the threat, can increase ship security by assisting in selecting risk control options. The approach also allows for a better understanding of the causal relationship between threat and risk than that provided in today’s security analysis by ship owners, for example. This understanding is crucial to choosing effective and robust risk control options.
  •  
2.
  • Liwång, Hans, 1974-, et al. (author)
  • Ship security analysis : the effect of ship speed and effective lookout
  • 2013
  • In: Proceedings of the ASME 32nd International Conference on Ocean, Offshore and Arctic Engineering (OMAE 2013). - : ASME Press. - 9780791855324
  • Conference paper (peer-reviewed)abstract
    • The threat of piracy to commercial shipping is a concern for the protection and safeguarding of human lives, property and environment. Therefore, ships under piracy threat should follow security measures suggested by the International Maritime Organization (IMO) and the Contact Group on Piracy off the Coast of Somali. It is, therefore, important to choose the proper security measures for the right situation.This study presents a simulation model that can be used for probabilistic risk assessments regarding the operation of commercial ships. This investigation specifically studies the pirate approach phase and quantifies the effect of ship speed and effective lookout. The purpose of introducing probabilistic risk assessment into the analysis of pirate attacks is to meet safety goals more effectively through a well-balanced combination of proactive and reactive measures whilst keeping focus on the intended over all purpose of the particular ship.The study presents collected and documented knowledge regarding pirate capability, intention and likelihood to perform attacks. The knowledge is collected from experts with experience from the situation off the Horn of Africa. The collected information is input to an influence analysis that identifies the network of influences that govern the skiff approach. The simulation model describes piracy characteristics and decision making on the threatened ship, the characteristics and countermeasures of the ship under attack, as well as weather.Based on a comparison with available statistics the overall conclusion of the work is that the threat analysis and the simulation model can quantify and explain how the studied risk control options affect the probability of a successful approach. The result therefore exemplifies how a quantified ship security analysis can support the recommendations in industry guidelines and also enable recommendations that to a greater extent can facilitate an educated decision by the ship operators.
  •  
3.
  • Huskaj, Gazmend, et al. (author)
  • Designing attack infrastructure for offensive cyberspace operations
  • 2020
  • In: Proceedings of the 19th European Conference on Cyber Warfare and Security. - Reading, UK : Academic Conferences and Publishing International Limited. - 9781912764617 - 9781912764624 ; , s. 473-482
  • Conference paper (peer-reviewed)abstract
    • This article addresses the question ‘what considerations should be taken by cyber commands when designing attack infrastructure for offensive operations?’. Nation-states are investing in equipping units tasked to conduct offensive cyberspace operations. Generating ‘deny, degrade, disrupt, destroy or deceive’ effects on adversary targets requires to move from own (‘green’), through neutral (‘grey’), to adversary (‘red’) cyberspace. The movement is supported by attack infrastructure for offensive cyberspace operations. In this paper, we review the professional and scientific literature identifying the requirements for designing an attack infrastructure. Next, we develop and define the concepts for attack infrastructure. Finally, we explain and describe the considerations for designing attack infrastructure. The research question is answered by proposing a framework for designing attack infrastructure. This framework is vital for military and civilian commands designing attack infrastructure for offensive cyberspace operations. 
  •  
4.
  • Liwång, Hans (author)
  • Risk-based ship security analysis : a decision-support approach
  • 2015
  • Doctoral thesis (other academic/artistic)abstract
    • The protection of shipping does not come without hazards and threats for military forces, individual civilian ship operators and crews. With particular focus on security threats, this thesis is about how to prepare for such operations without introducing unnecessary risks, i.e., supporting conscious risk-taking related to ship security. It examines both civilian and military aspects of maritime security and therefore draws from the experience of both fields.Maritime safety regulations, guidelines and methods have a history and culture of systematic research, development and implementation. In contrast, international security is highly politicised and therefore less transparent. Unfortunately, comprehensive studies of ship security risk are rare. Moreover, applying risk-based approaches to security areas requires special considerations, and the limited research in this field has led to a knowledge gap.To reduce the identified challenges with respect to security risk analysis, the goal of this thesis is to improve security decision support by defining an approach to ship security analysis. To increase overall safety, this approach must facilitate compromises between traditional maritime safety and maritime security. Accordingly, the objective is to develop an approach that is both systematic and gives the decision maker an appropriate picture of the security risks. To examine the requirements for a security decision-support approach, the work in the appended papers studies both threats to naval vessels and the security threat posed to commercial vessels by pirates. The results of the studies can be used to further develop military doctrines and civilian guidelines.This study shows that the description and quantification of the (concept of) operation in the risk analysis is central for implementing both security and naval ship survivability. In addition, the crew’s risk perception, procedural safeguards and how the implemented risk controls are perceived have an important role not only in risk analysis but also in deciding the effectiveness of implemented controls. It is also concluded that only using expected values—not collecting and using uncertainties—in the analysis can lead to misleading results. Therefore, the uncertainty treatment offered by a quantitative approach is crucial for risk understanding, especially if the aim is to find robust control options or to support the development of a resilient culture.
  •  
5.
  • Persson, Anders, et al. (author)
  • Optogalvanic spectroscopy with microplasma sources – Current status and development towards lab on a chip
  • 2016
  • In: Journal of Micromechanics and Microengineering. - : IOP Publishing. - 0960-1317 .- 1361-6439. ; 26:10
  • Journal article (peer-reviewed)abstract
    • Miniaturized optogalvanic spectroscopy (OGS) shows excellent prospects of becoming ahighly sensitive method for gas analysis in micro total analysis systems. Here, a status reporton the current development of microwave induced microplasma sources for OGS is presented,together with the first comparison of the sensitivity of the method to conventional single-passabsorption spectroscopy. The studied microplasma sources are stripline split-ring resonators(SSRRs), with typical ring radii between 3.5 and 6 mm and operation frequencies around2.6 GHz. A linear response (R2 = 0.9999), and a stability of more than 100 s are demonstratedwhen using the microplasma source as an optogalvanic detector. Additionally, saturationeffects at laser powers higher than 100 mW are observed, and the temporal response of theplasma to periodic laser perturbation with repletion rates between 20 Hz and 200 Hz arestudied. Finally, the potential of integrating additional functionality with the detector isdiscussed, with the particular focus on a pressure sensor and a miniaturized combustor toallow for studies of solid samples.
  •  
6.
  • Trimintzios, Panagiotis, et al. (author)
  • Report on Cyber Crisis Cooperation and Management : Comparative study on the cyber crisis management and the general crisis management
  • 2015
  • Reports (pop. science, debate, etc.)abstract
    • The goal of this study is to provide an analysis of cyber crisis management by identifying relations between this emerging field and the better established subject of general crisis management. This includes terminology and key concepts in these fields. This study further seeks to gain knowledge and understanding of the involved actors’ perspectives on the challenges for Cyber Crisis management within the European context.The purpose of the study is twofold: to compare concepts from the general crisis management systems with the corresponding systems related to cyber crisis management, and to conduct a conceptual analysis of the language and terminology within these two fields. The primary aim is to analyse the similarities and differences between general and cyber crisis management, employing examples from countries and organizations within the EU.Based on interviews with members of key national and EU institutions, and on an analysis of the differences between their practitioner perspectives and the theories of general crisis management, the study arrives at six key areas of recommendations for future activities in the cyber security realm.
  •  
7.
  •  
8.
  • Berglund, Martin, 1985-, et al. (author)
  • Manufacturing Miniature Langmuir probes by Fusing Platinum Bond Wires
  • 2015
  • In: Journal of Micromechanics and Microengineering. - Bristol : Institute of Physics Publishing (IOPP). - 0960-1317 .- 1361-6439. ; 25:10
  • Journal article (peer-reviewed)abstract
    • This paper reports on a novel method for manufacturing microscopic Langmuir probes with spherical tips from platinum bond wires by fusing for plasma characterization in microplasma sources. Here, the resulting endpoints, formed by droplets on the ends of a fused wire, are intended to act as spherical Langmuir probes. For studying the fusing behavior, bond wires were wedge bonded over a 2 mm wide slit, to emulate the final application, and fused with different voltages and currents. For electrical isolation, a set of wires were coated with a 4 μm thick layer of Parylene before they were fused. After fusing, the gap size, as well as the shape and area of the ends of the remaining stubs were measured. The yield of the process was also investigated, and the fusing event was studied using a high-speed camera for analyzing its dynamics. Four characteristic tip shapes were observed: spherical, folded, serpentine shaped and semi-spherical. The stub length leveled out at  ~400 μm as the fusing power increased. The fusing of the coated wires required a higher power to yield a spherical shape. Finally, a Parylene coated bond wire was integrated into a stripline split-ring resonator (SSRR) microplasma source, and was fused to form two Langmuir probes with spherical endpoints. These probes were used for measuring the I–V characteristics of a plasma generated by the SSRR. In a voltage range between  −60 V and 60 V, the fused stubs exhibited the expected behavior of spherical Langmuir probes, and will be considered for further integration.
  •  
9.
  •  
10.
  • Brynielsson, Joel (author)
  • Using AI and games for decision support in command and control
  • 2007
  • In: Decision Support Systems. - : Elsevier BV. - 0167-9236 .- 1873-5797. ; 43:4, s. 1454-1463
  • Journal article (peer-reviewed)abstract
    • Developers of tomorrow's command and control centers are facing numerous problems related to the vast amount of available information obtained from various sources. On a lower level, huge amounts of uncertain reports from different sensors need to be fused into comprehensible information. On a higher level, representation and management of the aggregated information will be the main task, with prediction of future course of events being the uttermost goal. Unfortunately, traditional agent modeling techniques do not capture situations where commanders make decisions based on other commanders' reasoning about one's own reasoning. To cope with this problem, we propose a decision support tool for command and control situation awareness enhancements based on game theory for inference and coupled with traditional AI methods for uncertainty modeling.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 14

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view