A fidelity framework for small arms combat

Modelling and simulation (Mod-Sim) tools are becoming a crucial component in the design and evaluation of cyber and physical security systems. Many Mod-Sim tools exist for the elucidation of attack scenarios, characterization of facility vulnerabilities, and the construction and maintenance of optim...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Proceedings - International Carnahan Conference on Security Technology s. 1 - 7
Hlavní autori: Murton, Mark, Johnston, Paul, Waymire, Russel, Belasich, Deborah
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: IEEE 01.10.2014
Predmet:
ISBN:9781479935307, 1479935301
ISSN:1071-6572
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Modelling and simulation (Mod-Sim) tools are becoming a crucial component in the design and evaluation of cyber and physical security systems. Many Mod-Sim tools exist for the elucidation of attack scenarios, characterization of facility vulnerabilities, and the construction and maintenance of optimal protection systems. The growing use of Mod-Sim tools for assessment of physical and cyber security systems necessitates a consistency in the existence of requirements and in the definitions of use for the models defined within a simulation. There are currently many Mod-Sim software tools available for use in characterizing various combat, physical, and cyber security scenarios. Even with the existence of a glossary distributed by the Modeling and Simulation Information Analysis Center-U.S. Department of Defense, there is a lack of requirement specifications and definitions for many of the terms and processes used in the modelling and simulation field. A more meaningful understanding for the construction of useful analyses is needed. It is critical that requirements, definitions, and processes be clearly identified and agreed upon before undertaking any effort to establish an analysis tool. In so doing, more cost effective model and simulation tools can then be developed that will produce scenarios, environments, and execution models that provide more a meaningful analyses of interest. In this paper, we will define the term fidelity and we will show how to consistently and appropriately apply the term to models that are used in simulation. Our intent is to develop a boundary for the meaning so that it can be used as a definitive basis with which to assess how well a model, and its function within a scenario, satisfies the end goal of answering the appropriate questions for which the scenario and simulation were constructed. Fidelity will be derived from various aspects of a model's purpose within a given simulation including the level of required interactivity amongst entities, the need to be realistic, and the complexity of the model. Many of the concepts from Object-Oriented programming have been leveraged to help identify required characteristics and interaction requirements of a core set of models that are deemed essential as a basis for all small arms combat scenarios. We will also demonstrate how our framework can be applied and extended to other cyber and physical security scenarios in an attempt to provide a fundamental construction methodology for all Mod-Sim efforts.
AbstractList Modelling and simulation (Mod-Sim) tools are becoming a crucial component in the design and evaluation of cyber and physical security systems. Many Mod-Sim tools exist for the elucidation of attack scenarios, characterization of facility vulnerabilities, and the construction and maintenance of optimal protection systems. The growing use of Mod-Sim tools for assessment of physical and cyber security systems necessitates a consistency in the existence of requirements and in the definitions of use for the models defined within a simulation. There are currently many Mod-Sim software tools available for use in characterizing various combat, physical, and cyber security scenarios. Even with the existence of a glossary distributed by the Modeling and Simulation Information Analysis Center-U.S. Department of Defense, there is a lack of requirement specifications and definitions for many of the terms and processes used in the modelling and simulation field. A more meaningful understanding for the construction of useful analyses is needed. It is critical that requirements, definitions, and processes be clearly identified and agreed upon before undertaking any effort to establish an analysis tool. In so doing, more cost effective model and simulation tools can then be developed that will produce scenarios, environments, and execution models that provide more a meaningful analyses of interest. In this paper, we will define the term fidelity and we will show how to consistently and appropriately apply the term to models that are used in simulation. Our intent is to develop a boundary for the meaning so that it can be used as a definitive basis with which to assess how well a model, and its function within a scenario, satisfies the end goal of answering the appropriate questions for which the scenario and simulation were constructed. Fidelity will be derived from various aspects of a model's purpose within a given simulation including the level of required interactivity amongst entities, the need to be realistic, and the complexity of the model. Many of the concepts from Object-Oriented programming have been leveraged to help identify required characteristics and interaction requirements of a core set of models that are deemed essential as a basis for all small arms combat scenarios. We will also demonstrate how our framework can be applied and extended to other cyber and physical security scenarios in an attempt to provide a fundamental construction methodology for all Mod-Sim efforts.
Author Waymire, Russel
Belasich, Deborah
Murton, Mark
Johnston, Paul
Author_xml – sequence: 1
  givenname: Mark
  surname: Murton
  fullname: Murton, Mark
  email: mmurton@sandia.gov
  organization: Sandia National Laboratories, Albuquerque, New Mexico U.S.A
– sequence: 2
  givenname: Paul
  surname: Johnston
  fullname: Johnston, Paul
  email: pljohn@sandia.gov
  organization: Sandia National Laboratories, Albuquerque, New Mexico U.S.A
– sequence: 3
  givenname: Russel
  surname: Waymire
  fullname: Waymire, Russel
  email: rlwaymi@sandia.gov
  organization: Sandia National Laboratories, Albuquerque, New Mexico U.S.A
– sequence: 4
  givenname: Deborah
  surname: Belasich
  fullname: Belasich, Deborah
  email: dkbelas@sandia.gov
  organization: Sandia National Laboratories, Albuquerque, New Mexico U.S.A
BookMark eNpVj0tLw0AUhUesYFv7A8TNrIWk985kXssSfEHBReu63ElmYDRpZBKQ_nsVu5GzOHyL88FZsNlxOAbGbhFKRHDrut7tSwFYldpZA2Av2MoZi5VxTiop8PIfg5mxOYLBQisjrtliHN8BhDRo5-x-w2NqQ5emE4-Z-vA15A8eh8zHnrqOU-5H3gy9p-mGXUXqxrA695K9PT7s6-di-_r0Um-2RRJop0IICxVBS6Q9EDSN1U1E9NLJimzrAFrwGqUWJsjfKCRPPyMFylgt5ZLd_XlTCOHwmVNP-XQ4X5XfIl1E6w
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/CCST.2014.6987008
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781479935321
1479935328
EndPage 7
ExternalDocumentID 6987008
Genre orig-research
GroupedDBID 29O
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
~02
ID FETCH-LOGICAL-i218t-22804a0daa6b0a0cc86cf11b3934a8d900d0b613627e3e3e351aba28050578633
IEDL.DBID RIE
ISBN 9781479935307
1479935301
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000369865000042&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1071-6572
IngestDate Wed Aug 27 02:20:52 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i218t-22804a0daa6b0a0cc86cf11b3934a8d900d0b613627e3e3e351aba28050578633
OpenAccessLink https://www.osti.gov/biblio/1315134
PageCount 7
ParticipantIDs ieee_primary_6987008
PublicationCentury 2000
PublicationDate 2014-Oct.
PublicationDateYYYYMMDD 2014-10-01
PublicationDate_xml – month: 10
  year: 2014
  text: 2014-Oct.
PublicationDecade 2010
PublicationTitle Proceedings - International Carnahan Conference on Security Technology
PublicationTitleAbbrev CCST
PublicationYear 2014
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0023718
Score 1.9016334
Snippet Modelling and simulation (Mod-Sim) tools are becoming a crucial component in the design and evaluation of cyber and physical security systems. Many Mod-Sim...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Accuracy
Complexity theory
cyber security systems
Data models
fidelity
modeling
Object oriented modeling
object oriented programming
physical security systems
Security
simulation
Vehicles
Weapons
Title A fidelity framework for small arms combat
URI https://ieeexplore.ieee.org/document/6987008
WOSCitedRecordID wos000369865000042&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1dS8MwFA1z-KAvfmziN3nwSeyWNG3SPMpw-DQGTtjbuElTGOxD1s7f703aTQVfpBDaQEuTBs69zTnnEvKQeY87Y9Mo0YXBxsnIJJBFubFCpw4Bs6iLTajRKJtO9bhFnvZaGOdcIJ-5nj8Ne_n52m79r7K-xAQ5KHsPlJK1VmufXAnFa9mb4p7OEQcRl0L0TXEJ77ydmmvVbG9ypvuDwdvEM7ySXvP0X2VWAsoMT_73fqek-y3Xo-M9EJ2Rlludk-MfToMd8vhMC29ohTE3LXZ8LIoBKy2XsFhQ2CxLiovPQNUl78OXyeA1asokRHPE5yryhjYJsBxAGgbM2kzagnMjtMBZzzVjOTOI2jJWTvgj5WAAb_K5SSaFuCDt1XrlLgkFE2seBKWJtz7D7NXwGBRgGACWgbkiHT_q2UfthDFrBnz9d_cNOfITW1Pfbkm72mzdHTm0n9W83NyHz_cFNKSS9A
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD6MKagvXjbxbh58ErslvaV5lOGYOMfACXsbJ2kKg12k6_z9Jmk3FXyRQmgDLU0a-M5pvu87AHeJ9biTKvJCkUnT6NiTISZeKlUgIm0AMyuLTfDBIBmPxbAGD1stjNbakc90y566vfx0qdb2V1k7NgmyU_bu2MpZlVprm14FnJXCN84socN3Mi5u8Dcyi3jj7lRd82qDk1HR7nTeRpbjFbaq5_8qtOJwpnv4vzc8gua3YI8Mt1B0DDW9OIGDH16DDbh_JJm1tDJRN8k2jCxiQlaymuNsRjCfr4hZfhKLJrx3n0adnlcVSvCmBqELz1rahEhTxFhSpEolscoYk4EIzLyngtKUSoPbsc91YI-IoURzk81OkjgITqG-WC70GRCUvmBOUhpa8zOTv0rmI0cTCKCiKM-hYUc9-Si9MCbVgC_-7r6Fvd7otT_pPw9eLmHfTnJJhLuCepGv9TXsqs9iuspv3Kf8Ahk6lj0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+-+International+Carnahan+Conference+on+Security+Technology&rft.atitle=A+fidelity+framework+for+small+arms+combat&rft.au=Murton%2C+Mark&rft.au=Johnston%2C+Paul&rft.au=Waymire%2C+Russel&rft.au=Belasich%2C+Deborah&rft.date=2014-10-01&rft.pub=IEEE&rft.isbn=9781479935307&rft.issn=1071-6572&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FCCST.2014.6987008&rft.externalDocID=6987008
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1071-6572&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1071-6572&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1071-6572&client=summon