Counter terrorism functions to enhance critical infrastructure resilience against CBRNe terrorism

conference paper
Current approaches in critical infrastructure protection use long lists of items that fail to give its user a structured answer to the state of protection of its object. The functionality approach uses different terrorist functions to structure the threat (which are to have intent, to scout, to transport, to attack and to have an effect). It uses four different counter terrorist functions (to deter, to detect, to mitigate and to respond) to disturb and counter these terrorist functions. © 2009 IEEE.
TNO Identifier
248216
ISBN
9781424441785
Article nr.
5168062
Source title
2009 IEEE Conference on Technologies for Homeland Security, HST 2009, Waltham, MA, USA, 11-12 May 2009
Pages
381-384
Files
To receive the publication files, please send an e-mail request to TNO Repository.