Nuclear Smuggling and Threats to Lithuanian Security

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Nuclear Power and Security Threats

Nuclear facilities have not been designed to withstand a deliberate crash by a jumbo jet full of fuel or many other types of attack. A successful attack could have widespread and catastrophic consequences for both the environment and public health. The extent of damage caused will depend on the type of nuclear facility, the nature of the attack, weather conditions and the success of mitigation ...

متن کامل

Using Sensors to Interdict Nuclear Material Smuggling

We describe a stochastic network interdiction model for locating sensors that detect nuclear material. A nuclear material smuggler selects a path through a transportation network that maximizes the probability of avoiding detection. An interdictor installs sensors to minimize that maximum probability. We formulate this problem as a bi-level stochastic mixed-integer program, and then focus on a ...

متن کامل

Models for nuclear smuggling interdiction

We describe two stochastic network interdiction models for thwarting nuclear smuggling. In the first model, the smuggler travels through a transportation network on a path that maximizes the probability of evading detection, and the interdictor installs radiation sensors to minimize that evasion probability. The problem is stochastic because the smuggler’s origin-destination pair is known only ...

متن کامل

asean and new security threats

association of southeast asia nations (asean) was created in 1967 in order to prevent the threat of communism in southeast asia. but, over time, new states joined it and goals and activities of this organization expanded to other areas such as economic, commercial, political and cultural ones. thus, over time, cooperation between members expanded in a way today this regional organization is con...

متن کامل

Threats to TCP/IP Security

Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration. New tools that probe for system vulnerabilities, such as IIS (Internet Security Scanner) assist in these efforts, but these tools only point out areas of weakness instead of providing a means to protect networks. Thus, as ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lithuanian Annual Strategic Review

سال: 2016

ISSN: 1648-8024,2335-870X

DOI: 10.1515/lasr-2016-0008