%0 Conference Proceedings %T Analyzing Intelligence on WMD Attacks Using Threaded Event-Based Simulation %+ Pennsylvania State University (Penn State) %A Fang, Qi %A Liu, Peng %A Yen, John %A Morgan, Jonathan %A Shemanski, Donald %A Ritter, Frank %Z Part 4: INFRASTRUCTURE MODELING AND SIMULATION %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 5th International Conference Critical Infrastructure Protection (ICCIP) %C Hanover, NH, United States %Y Jonathan Butts %Y Sujeet Shenoi %I Springer %3 Critical Infrastructure Protection V %V AICT-367 %P 201-216 %8 2011-03-23 %D 2011 %R 10.1007/978-3-642-24864-1_14 %K Intelligence analysis %K threaded event-driven simulation %Z Computer Science [cs]Conference papers %X Data available for intelligence analysis is often incomplete, ambiguous and voluminous. Also, the data may be unorganized, the details overwhelming, and considerable analysis may be required to uncover adversarial activities. This paper describes a simulation-based approach that helps analysts understand data and use it to predict future events and possible scenarios. In particular, the approach enables intelligence analysts to find, display and understand data relationships by connecting the dots of data to create network of information. The approach also generates alternative storylines, allowing analysts to view other possible outcomes. It facilitates the automation of reasoning and the detection of inconsistent data, which provides more reliable information for analysis. A case study using data from the TV series, 24, demonstrates the feasibility of approach and its application to intelligence analysis of WMD attacks against the critical infrastructure. %G English %Z TC 11 %Z WG 11.10 %2 https://inria.hal.science/hal-01571773/document %2 https://inria.hal.science/hal-01571773/file/978-3-642-24864-1_14_Chapter.pdf %L hal-01571773 %U https://inria.hal.science/hal-01571773 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-ICCIP %~ IFIP-WG11-10 %~ IFIP-AICT-367