中图分类
执行
    中文(共0篇) 外文(共435篇)
    排序:
    导出 保存至文件
    [科技报告]   Hulme, B. L.   Morgan, C. A.        共25页
    摘要 : POST is a subroutine which a safeguards analyst may use to find multiple-target sabotage paths through a fixed-site facility. This subroutine accepts the same weighted digraph facility model as does ADPATH, the single-target adver... 展开
    关键词 : Sabotage   Risk   Subroutines  

    [科技报告]   suber, l. a. jr        共23页
    摘要 : Evaluation of security systems effectiveness requires a definition of adversary capabilities,but an objective basis for such a definition has been lacking. A system of adversary attributes is proposed in which any desired adversar... 展开

    [科技报告]   bennett, c. a. murphey, w. m.        共63页
    摘要 : There has been much discussion and public debate concerning the effectiveness of the national system of safeguards against malevolent acts involving nuclear materials. Useful dialogue on this subject has been hampered by the lack ... 展开

    [科技报告]   Philbin, J. S.   Hoover, M. D.   Newton, G. J.        共24页
    摘要 : A technical review is presented of experiment activities and state of knowledge on air-borne, radiation source terms resulting from explosive sabotage attacks on spent reactor fuel subassemblies in shielded casks. Current assumpti... 展开

    [科技报告]   Seger, K. A.        共33页
    摘要 : Left-wing extremism is 'alive and well' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several... 展开

    [科技报告]   Seger, K. A.        共33页
    摘要 : Left-wing extremism is 'alive and well' both in the US and internationally.Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several ... 展开

    [科技报告]   Douthit, H. L.        共142页
    摘要 : The purpose of this research was to determine the effectiveness of sabotage as a means of unconventional warfare by historically analyzing previous conflicts to determine the role and impact sabotage played. In order to accomplish... 展开

    [科技报告]   Hulme, B. L.   Morgan, C. A.        共28页
    摘要 : ADPATH is a subroutine which safeguards analysts can use to find adversary paths in fixed-site facility safeguard studies. It was developed primarily to become a pathfinding module in SAFE, the Safeguards Automated Facility Evalua... 展开

    摘要 : This multinational, multi-phase spent fuel sabotage test program is quantifying the aerosol particles produced when the products of a high energy density device (HEDD) interact with and explosively particulate test rodlets that co... 展开

    [科技报告]   Chisholm, G. H.   Gannon, J. D.   Kemmerer, R. A.   McHugh, J.        共23页
    摘要 : The review and analysis of the Trusted Software Methodology (TSM) by a panel of experts in various areas of computer science, computer security, and engineering are reported. The approach to the conduct of the review is described,... 展开

    研究趋势
    相关热图
    学科分类