TY - JOUR
T1 - Sampling procedure to estimate risk probabilities in access-control security systems
AU - Jacobson, Sheldon H.
AU - Kobza, John E.
AU - Nakayama, Marvin K.
N1 - Funding Information:
This research is done as part of the FAA National Center for Excellence in Aviation Operations Research (NEXTOR). This research is supported in part by the Air Force Office of Scientific Research (F49620-98-1-0111). The computational results were obtained with support from the Simulation and Optimization Laboratory in the Department of Industrial and Systems Engineering at Virginia Tech. The third author completed part of this work while visiting the Management Science Division of the Columbia Business School. Also, he was partially supported by the National Science Foundation (Grant Number DMI 96-24469).
PY - 2000/4/1
Y1 - 2000/4/1
N2 - Access-control security systems found in airports typically involve sophisticated technologies and procedures, and their associated sensitivity settings. These settings are often calibrated by the level of threat believed to be present in the environment. Determining this threat level can be quite challenging, but is essential to optimize system security. This paper presents a non-intrusive sampling procedure based on the observed number of alarms and clears that occur during security-system operations. The procedure can be used to estimate the threat probability, the probability that a given alarm is false and the probability that a given clear is false in access-control security systems. An illustrative example is presented to demonstrate the utility of these estimators.
AB - Access-control security systems found in airports typically involve sophisticated technologies and procedures, and their associated sensitivity settings. These settings are often calibrated by the level of threat believed to be present in the environment. Determining this threat level can be quite challenging, but is essential to optimize system security. This paper presents a non-intrusive sampling procedure based on the observed number of alarms and clears that occur during security-system operations. The procedure can be used to estimate the threat probability, the probability that a given alarm is false and the probability that a given clear is false in access-control security systems. An illustrative example is presented to demonstrate the utility of these estimators.
UR - http://www.scopus.com/inward/record.url?scp=0033907969&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0033907969&partnerID=8YFLogxK
U2 - 10.1016/S0377-2217(99)00047-8
DO - 10.1016/S0377-2217(99)00047-8
M3 - Article
AN - SCOPUS:0033907969
SN - 0377-2217
VL - 122
SP - 123
EP - 132
JO - European Journal of Operational Research
JF - European Journal of Operational Research
IS - 1
ER -