"Simulation tools appear the only solution suitable for with the complexity of the actual critical infrastructure scenarios. Indeed, due to interdependency phenomena and the fast innovation of the technologies, our capability to predict the global behavior of such system of systems on the basis of past history and experiences is dramatically reduced, especially in the presence of anomalous or crisis situations. This drives many groups to develop simulation platforms also able to support decisions during crisis. However, a crucial and not adequately investigated aspect in this framework is the qualification of the predictable capabilities of these tools. This paper would start a discussion on how to validate different approaches, and how to asses their predictable capabilities, providing some insights on this strategic and very challenging task."
Farina, A., Graziano, A., Panzieri, S., Pascucci, F., Setola, R. (2013). How to perform verification and validation of critical infrastructure modeling tools. In Proc. of the 6th International Conference on Critical Information Infrastructure Security (CRITIS’11) (pp.116-127). Springer [10.1007/978-3-642-41476-3_10].
How to perform verification and validation of critical infrastructure modeling tools
PANZIERI, Stefano;PASCUCCI, Federica;
2013-01-01
Abstract
"Simulation tools appear the only solution suitable for with the complexity of the actual critical infrastructure scenarios. Indeed, due to interdependency phenomena and the fast innovation of the technologies, our capability to predict the global behavior of such system of systems on the basis of past history and experiences is dramatically reduced, especially in the presence of anomalous or crisis situations. This drives many groups to develop simulation platforms also able to support decisions during crisis. However, a crucial and not adequately investigated aspect in this framework is the qualification of the predictable capabilities of these tools. This paper would start a discussion on how to validate different approaches, and how to asses their predictable capabilities, providing some insights on this strategic and very challenging task."I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.