z-logo
open-access-imgOpen Access
Protection Model of Security Systems Based on Neyman-Person Criterion
Author(s) -
Haitao Lv,
Ruimin Hu,
Jun Chen,
Zheng He
Publication year - 2013
Publication title -
communications and network
Language(s) - English
Resource type - Journals
eISSN - 1949-2421
pISSN - 1947-3826
DOI - 10.4236/cn.2013.53b2104
Subject(s) - computer science , guard (computer science) , dijkstra's algorithm , computer security , network security , computer security model , path (computing) , security analysis , security guard , shortest path problem , theoretical computer science , computer network , graph , programming language
In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the protection probability of a security system and find the weakest breach path of a security network. We present the weakest breach path problem formulation, which is defined by the breach protection probability of an unauthorized target passing through a guard field, and provide a solution for this problem by using the Dijkstra’s shortest path algorithm. Finally we study the variation of the breach protection probability with the change of the parameters of the model.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom