2007 Winter Simulation Conference 2007
DOI: 10.1109/wsc.2007.4419596
|View full text |Cite
|
Sign up to set email alerts
|

Defense and homeland security applications of multi-agent simulations

Abstract: Department of Defense and Homeland Security analysts are increasingly using multi-agent simulation (MAS) to examine national security issues. This paper summarizes three MAS national security studies conducted at the Naval Postgraduate School. The first example explores equipment and employment options for protecting critical infrastructure. The second case considers non-lethal weapons within the spectrum of force-protection options in a martitime environment. The final application investigates emergency (poli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…For example, three national security studies are summarized in Lucas, Sanchez, Martinez, Sickinger, and Roginski (2007). The first example explores equipment and employment options for protecting critical infrastructure, the second case considers nonlethal weapons within the spectrum of force-protection options in a maritime environment, and the final application investigates emergency (police, fire, and medical) responses to an urban terrorist attack.…”
Section: Other Useful Plotsmentioning
confidence: 99%
“…For example, three national security studies are summarized in Lucas, Sanchez, Martinez, Sickinger, and Roginski (2007). The first example explores equipment and employment options for protecting critical infrastructure, the second case considers nonlethal weapons within the spectrum of force-protection options in a maritime environment, and the final application investigates emergency (police, fire, and medical) responses to an urban terrorist attack.…”
Section: Other Useful Plotsmentioning
confidence: 99%
“…In order to leverage social simulations for attack the network course of action analysis, the use of exploratory designs of experiments is required [25,26]. In particular, the use of large exploratory designs of experiments are called for in order to explore the range of potential futures generated not only by potential courses of actions selected by decision makers, but by the noise created by the unpredictable nature of the VEN and its activity and the unknown variance within the human population being modeled.…”
Section: Designed Experiments For Coa Analysismentioning
confidence: 99%
“…Each agent individually assesses its situation and makes decisions on the basis of a set of rules (Bonabeau, 2002). Agent based models have been used to simulate and analyse interaction-based attack scenarios (Mysore et al, 2006) (Carley et al, 2006) (Bulleit, 2005), by allowing agents to interact with each other and their perceived virtual environment (Lucas et al, 2007). Applications of ABM to counter terrorism include simulating the effect of an attack on a city, focusing on both chemical (Mysore et al, 2006) and biological (Carley et al, 2006) attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Applications of ABM to counter terrorism include simulating the effect of an attack on a city, focusing on both chemical (Mysore et al, 2006) and biological (Carley et al, 2006) attacks. Multi-agent simulations can be used within the security sector as an insight into the execution of high-resolution simulations, such as war-gaming (Lucas et al, 2007). One of the benefits offered by ABM is that it allows "analysts to quickly build, run and analyse many thousands of simulation experiments over a broad range of input variables" (Lucas et al, 2007).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation