Benefit-cost analysis of security systems for multiple protected assets based on information entropy

9Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

This article proposes a quantitative risk assessment for security systems which have multiple protected assets and a risk-based benefit-cost analysis for decision makers. The proposed methodology consists of five phases: identification of assets, security unit and intrusion path, security unit effectiveness estimation, intrusion path effectiveness estimation, security system risk assessment and benefit-cost estimation. Key innovations in this methodology include its use of effectiveness entropy to measure the degree of uncertainty of a security system to complete a protection task, and the fact it measures risk like information theory measures the amount of information. A notional example is provided to demonstrate an application of the proposed methodology. © 2012 by the authors.

Cite

CITATION STYLE

APA

Dai, J., Hu, R., Chen, J., & Cai, Q. (2012). Benefit-cost analysis of security systems for multiple protected assets based on information entropy. Entropy, 14(3), 571–580. https://doi.org/10.3390/e14030571

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free