Naval Postgraduate School
Dudley Knox Library
NPS Dudley Knox Library
View Item 
  •   Calhoun Home
  • Theses and Dissertations
  • 1. Thesis and Dissertation Collection, all items
  • View Item
  •   Calhoun Home
  • Theses and Dissertations
  • 1. Thesis and Dissertation Collection, all items
  • View Item
  • How to search in Calhoun
  • My Accounts
  • Ask a Librarian
JavaScript is disabled for your browser. Some features of this site may not work without it.

Browse

All of CalhounCollectionsThis Collection

My Account

LoginRegister

Statistics

Most Popular ItemsStatistics by CountryMost Popular Authors

Optimal employment of port radar and picket ships to detect attacker speedboats a defender-attacker optimization model to enhance maritime domain awareness

Thumbnail
Download
Icon08Jun_Abdul_Ghaffar.pdf (1.286Mb)
Download Record
Download to EndNote/RefMan (RIS)
Download to BibTex
Author
Abdul-Ghaffar, Ahmad M.
Date
2008-06
Advisor
Brown, Gerald G.
Second Reader
Kline, Jeffrey E.
Metadata
Show full item record
Abstract
The U.S. Coast Guard has deployed several hundred port patrol vessels to protect U.S. Navy ships and other high-value assets in ports world-wide. Each vessel has an armed crew of four, is relatively fast, and features a simple surface search radar, radios, and a machine gun. These vessels coordinate surveillance patrols in groups of two or four, perhaps working with shorebased radar. We seek to advantageously position these vessels, and perhaps shore-based radar too, to minimize the probability that an intelligent adversary in one or more speed-boats will evade detection while mounting an attack. Attackers can use elevated obstructions to our radar detection in their attack paths, and ports feature many such restrictions to navigation and observation. We make a key, but realistic assumption that complicates planning: we assume the attackers will see or be told of our defensive positions and capabilities in advance of mounting their attack. We demonstrate our defender-attacker optimization with a fictitious port, and with Los Angeles-Long Beach, Hong Kong, U.S. Navy 5-th Fleet in Bahrain, and the Al Basra oil terminal. In cases we analyze, we can almost certainly detect any attack, even though the attacker, observing our pre-positions, plans clever, evasive attack tracks.
Rights
This publication is a work of the U.S. Government as defined
in Title 17, United States Code, Section 101. As such, it is in the
public domain, and under the provisions of Title 17, United States
Code, Section 105, is not copyrighted in the U.S.
URI
http://hdl.handle.net/10945/4107
Collections
  • 1. Thesis and Dissertation Collection, all items
  • 2. NPS Outstanding Theses and Dissertations

Related items

Showing items related by title, author, creator and subject.

  • Thumbnail

    Using the bootstrap concept to build an adaptable and compact subversion artifice 

    Lack, Lindsey A. (Monterey, California. Naval Postgraduate School, 2003-06);
    The attack of choice for a professional attacker is system subversion: the insertion of a trap door that allows the attacker to bypass an operating system's protection controls. This attack provides significant capabilities ...
  • Thumbnail

    Cube-type algebraic attacks on wireless encryption protocols 

    Petrakos, Nikolaos (Monterey, California. Naval Postgraduate School, 2009-09);
    In this study, we investigated an algebraic-type attack, known as the cube attack, against wireless networks. We implemented the cube attack in a wireless system, namely Bluetooth. We formally modeled the encryption function ...
  • Thumbnail

    Eliminating the lost time interval of law enforcement to active shooter events in schools 

    Ausdemore, Steven E. (Monterey, California: Naval Postgraduate School, 2015-09);
    The Newtown Connecticut school attack at the Sandy Hook elementary school on December 14, 2012, was another example of the tragedy of mass murder. When a targeted attack occurs, the victims must await the arrival of law ...
NPS Dudley Knox LibraryDUDLEY KNOX LIBRARY
Feedback

411 Dyer Rd. Bldg. 339
Monterey, CA 93943
circdesk@nps.edu
(831) 656-2947
DSN 756-2947

    Federal Depository Library      


Start Your Research

Research Guides
Academic Writing
Ask a Librarian
Copyright at NPS
Graduate Writing Center
How to Cite
Library Liaisons
Research Tools
Thesis Processing Office

Find & Download

Databases List
Articles, Books & More
NPS Theses
NPS Faculty Publications: Calhoun
Journal Titles
Course Reserves

Use the Library

My Accounts
Request Article or Book
Borrow, Renew, Return
Tech Help
Remote Access
Workshops & Tours

For Faculty & Researchers
For International Students
For Alumni

Print, Copy, Scan, Fax
Rooms & Study Spaces
Floor Map
Computers & Software
Adapters, Lockers & More

Collections

NPS Archive: Calhoun
Restricted Resources
Special Collections & Archives
Federal Depository
Homeland Security Digital Library

About

Hours
Library Staff
About Us
Special Exhibits
Policies
Our Affiliates
Visit Us

NPS-Licensed Resources—Terms & Conditions
Copyright Notice

Naval Postgraduate School

Naval Postgraduate School
1 University Circle, Monterey, CA 93943
Driving Directions | Campus Map

This is an official U.S. Navy Website |  Please read our Privacy Policy Notice  |  FOIA |  Section 508 |  No FEAR Act |  Whistleblower Protection |  Copyright and Accessibility |  Contact Webmaster

Export search results

The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

A logged-in user can export up to 15000 items. If you're not logged in, you can export no more than 500 items.

To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.