A fidelity framework for small arms combat
Modelling and simulation (Mod-Sim) tools are becoming a crucial component in the design and evaluation of cyber and physical security systems. Many Mod-Sim tools exist for the elucidation of attack scenarios, characterization of facility vulnerabilities, and the construction and maintenance of optim...
Uložené v:
| Vydané v: | Proceedings - International Carnahan Conference on Security Technology s. 1 - 7 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Konferenčný príspevok.. |
| Jazyk: | English |
| Vydavateľské údaje: |
IEEE
01.10.2014
|
| Predmet: | |
| ISBN: | 9781479935307, 1479935301 |
| ISSN: | 1071-6572 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Modelling and simulation (Mod-Sim) tools are becoming a crucial component in the design and evaluation of cyber and physical security systems. Many Mod-Sim tools exist for the elucidation of attack scenarios, characterization of facility vulnerabilities, and the construction and maintenance of optimal protection systems. The growing use of Mod-Sim tools for assessment of physical and cyber security systems necessitates a consistency in the existence of requirements and in the definitions of use for the models defined within a simulation. There are currently many Mod-Sim software tools available for use in characterizing various combat, physical, and cyber security scenarios. Even with the existence of a glossary distributed by the Modeling and Simulation Information Analysis Center-U.S. Department of Defense, there is a lack of requirement specifications and definitions for many of the terms and processes used in the modelling and simulation field. A more meaningful understanding for the construction of useful analyses is needed. It is critical that requirements, definitions, and processes be clearly identified and agreed upon before undertaking any effort to establish an analysis tool. In so doing, more cost effective model and simulation tools can then be developed that will produce scenarios, environments, and execution models that provide more a meaningful analyses of interest. In this paper, we will define the term fidelity and we will show how to consistently and appropriately apply the term to models that are used in simulation. Our intent is to develop a boundary for the meaning so that it can be used as a definitive basis with which to assess how well a model, and its function within a scenario, satisfies the end goal of answering the appropriate questions for which the scenario and simulation were constructed. Fidelity will be derived from various aspects of a model's purpose within a given simulation including the level of required interactivity amongst entities, the need to be realistic, and the complexity of the model. Many of the concepts from Object-Oriented programming have been leveraged to help identify required characteristics and interaction requirements of a core set of models that are deemed essential as a basis for all small arms combat scenarios. We will also demonstrate how our framework can be applied and extended to other cyber and physical security scenarios in an attempt to provide a fundamental construction methodology for all Mod-Sim efforts. |
|---|---|
| AbstractList | Modelling and simulation (Mod-Sim) tools are becoming a crucial component in the design and evaluation of cyber and physical security systems. Many Mod-Sim tools exist for the elucidation of attack scenarios, characterization of facility vulnerabilities, and the construction and maintenance of optimal protection systems. The growing use of Mod-Sim tools for assessment of physical and cyber security systems necessitates a consistency in the existence of requirements and in the definitions of use for the models defined within a simulation. There are currently many Mod-Sim software tools available for use in characterizing various combat, physical, and cyber security scenarios. Even with the existence of a glossary distributed by the Modeling and Simulation Information Analysis Center-U.S. Department of Defense, there is a lack of requirement specifications and definitions for many of the terms and processes used in the modelling and simulation field. A more meaningful understanding for the construction of useful analyses is needed. It is critical that requirements, definitions, and processes be clearly identified and agreed upon before undertaking any effort to establish an analysis tool. In so doing, more cost effective model and simulation tools can then be developed that will produce scenarios, environments, and execution models that provide more a meaningful analyses of interest. In this paper, we will define the term fidelity and we will show how to consistently and appropriately apply the term to models that are used in simulation. Our intent is to develop a boundary for the meaning so that it can be used as a definitive basis with which to assess how well a model, and its function within a scenario, satisfies the end goal of answering the appropriate questions for which the scenario and simulation were constructed. Fidelity will be derived from various aspects of a model's purpose within a given simulation including the level of required interactivity amongst entities, the need to be realistic, and the complexity of the model. Many of the concepts from Object-Oriented programming have been leveraged to help identify required characteristics and interaction requirements of a core set of models that are deemed essential as a basis for all small arms combat scenarios. We will also demonstrate how our framework can be applied and extended to other cyber and physical security scenarios in an attempt to provide a fundamental construction methodology for all Mod-Sim efforts. |
| Author | Waymire, Russel Belasich, Deborah Murton, Mark Johnston, Paul |
| Author_xml | – sequence: 1 givenname: Mark surname: Murton fullname: Murton, Mark email: mmurton@sandia.gov organization: Sandia National Laboratories, Albuquerque, New Mexico U.S.A – sequence: 2 givenname: Paul surname: Johnston fullname: Johnston, Paul email: pljohn@sandia.gov organization: Sandia National Laboratories, Albuquerque, New Mexico U.S.A – sequence: 3 givenname: Russel surname: Waymire fullname: Waymire, Russel email: rlwaymi@sandia.gov organization: Sandia National Laboratories, Albuquerque, New Mexico U.S.A – sequence: 4 givenname: Deborah surname: Belasich fullname: Belasich, Deborah email: dkbelas@sandia.gov organization: Sandia National Laboratories, Albuquerque, New Mexico U.S.A |
| BookMark | eNpVj0tLw0AUhUesYFv7A8TNrIWk985kXssSfEHBReu63ElmYDRpZBKQ_nsVu5GzOHyL88FZsNlxOAbGbhFKRHDrut7tSwFYldpZA2Av2MoZi5VxTiop8PIfg5mxOYLBQisjrtliHN8BhDRo5-x-w2NqQ5emE4-Z-vA15A8eh8zHnrqOU-5H3gy9p-mGXUXqxrA695K9PT7s6-di-_r0Um-2RRJop0IICxVBS6Q9EDSN1U1E9NLJimzrAFrwGqUWJsjfKCRPPyMFylgt5ZLd_XlTCOHwmVNP-XQ4X5XfIl1E6w |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/CCST.2014.6987008 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781479935321 1479935328 |
| EndPage | 7 |
| ExternalDocumentID | 6987008 |
| Genre | orig-research |
| GroupedDBID | 29O 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO RNS ~02 |
| ID | FETCH-LOGICAL-i218t-22804a0daa6b0a0cc86cf11b3934a8d900d0b613627e3e3e351aba28050578633 |
| IEDL.DBID | RIE |
| ISBN | 9781479935307 1479935301 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000369865000042&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1071-6572 |
| IngestDate | Wed Aug 27 02:20:52 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i218t-22804a0daa6b0a0cc86cf11b3934a8d900d0b613627e3e3e351aba28050578633 |
| OpenAccessLink | https://www.osti.gov/biblio/1315134 |
| PageCount | 7 |
| ParticipantIDs | ieee_primary_6987008 |
| PublicationCentury | 2000 |
| PublicationDate | 2014-Oct. |
| PublicationDateYYYYMMDD | 2014-10-01 |
| PublicationDate_xml | – month: 10 year: 2014 text: 2014-Oct. |
| PublicationDecade | 2010 |
| PublicationTitle | Proceedings - International Carnahan Conference on Security Technology |
| PublicationTitleAbbrev | CCST |
| PublicationYear | 2014 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0023718 |
| Score | 1.9016334 |
| Snippet | Modelling and simulation (Mod-Sim) tools are becoming a crucial component in the design and evaluation of cyber and physical security systems. Many Mod-Sim... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Accuracy Complexity theory cyber security systems Data models fidelity modeling Object oriented modeling object oriented programming physical security systems Security simulation Vehicles Weapons |
| Title | A fidelity framework for small arms combat |
| URI | https://ieeexplore.ieee.org/document/6987008 |
| WOSCitedRecordID | wos000369865000042&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1dS8MwFA1z-KAvfmziN3nwSeyWNG3SPMpw-DQGTtjbuElTGOxD1s7f703aTQVfpBDaQEuTBs69zTnnEvKQeY87Y9Mo0YXBxsnIJJBFubFCpw4Bs6iLTajRKJtO9bhFnvZaGOdcIJ-5nj8Ne_n52m79r7K-xAQ5KHsPlJK1VmufXAnFa9mb4p7OEQcRl0L0TXEJ77ydmmvVbG9ypvuDwdvEM7ySXvP0X2VWAsoMT_73fqek-y3Xo-M9EJ2Rlludk-MfToMd8vhMC29ohTE3LXZ8LIoBKy2XsFhQ2CxLiovPQNUl78OXyeA1asokRHPE5yryhjYJsBxAGgbM2kzagnMjtMBZzzVjOTOI2jJWTvgj5WAAb_K5SSaFuCDt1XrlLgkFE2seBKWJtz7D7NXwGBRgGACWgbkiHT_q2UfthDFrBnz9d_cNOfITW1Pfbkm72mzdHTm0n9W83NyHz_cFNKSS9A |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD6MKagvXjbxbh58ErslvaV5lOGYOMfACXsbJ2kKg12k6_z9Jmk3FXyRQmgDLU0a-M5pvu87AHeJ9biTKvJCkUnT6NiTISZeKlUgIm0AMyuLTfDBIBmPxbAGD1stjNbakc90y566vfx0qdb2V1k7NgmyU_bu2MpZlVprm14FnJXCN84socN3Mi5u8Dcyi3jj7lRd82qDk1HR7nTeRpbjFbaq5_8qtOJwpnv4vzc8gua3YI8Mt1B0DDW9OIGDH16DDbh_JJm1tDJRN8k2jCxiQlaymuNsRjCfr4hZfhKLJrx3n0adnlcVSvCmBqELz1rahEhTxFhSpEolscoYk4EIzLyngtKUSoPbsc91YI-IoURzk81OkjgITqG-WC70GRCUvmBOUhpa8zOTv0rmI0cTCKCiKM-hYUc9-Si9MCbVgC_-7r6Fvd7otT_pPw9eLmHfTnJJhLuCepGv9TXsqs9iuspv3Kf8Ahk6lj0 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+-+International+Carnahan+Conference+on+Security+Technology&rft.atitle=A+fidelity+framework+for+small+arms+combat&rft.au=Murton%2C+Mark&rft.au=Johnston%2C+Paul&rft.au=Waymire%2C+Russel&rft.au=Belasich%2C+Deborah&rft.date=2014-10-01&rft.pub=IEEE&rft.isbn=9781479935307&rft.issn=1071-6572&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FCCST.2014.6987008&rft.externalDocID=6987008 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1071-6572&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1071-6572&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1071-6572&client=summon |

