SJ

S.A.M. Janssen

15 records found

Designing agent-based models is a difficult task. Some guidelines exist to aid modelers in designing their models, but they generally do not include specific details on how the behavior of agents can be defined. This paper therefore proposes the AbCDe methodology, which uses caus ...
Airport security checkpoints are the most important bottleneck in airport operations, but few studies aim to empirically understand them better. In this work we address this lack of data-driven quantitative analysis and insights about the security checkpoint process. To this end, ...
Despite enormous investments in airport security, terrorists have been able to find and exploit vulnerabilities at security checkpoints. Existing vulnerability assessment methodologies struggle with accounting for human behavior, and agent-based modelling forms a promising techni ...

Capturing Agents in Security Models

Agent-based Security Risk Management using Causal Discovery

Airports are important transportation hubs that reside in the heart of modern civilizations.They are of major economic and symbolic value for countries but are thereforealso attractive targets for adversaries. Over the years we have observed successful andunsuccessful terrorist a ...
Airports are attractive targets for terrorists, as they are designed to accommodate and process large amounts of people, resulting in a high concentration of potential victims. A popular method to mitigate the risk of terrorist attacks is through security patrols, but resources a ...

AbSRiM

An Agent-Based Security Risk Management Approach for Airport Operations

Security risk management is essential for ensuring effective airport operations. This article introduces AbSRiM, a novel agent-based modeling and simulation approach to perform security risk management for airport operations that uses formal sociotechnical models that include tem ...
Analyzing agent-based models is a complex task. Agent-based models typically contain complex non-linear interactions between agents and generate emergent properties that cannot easily be explained. They are most commonly analyzed using sensitivity analysis techniques. While these ...
Both security and efficiency are important performance areas of air transport systems. Several methods have been proposed to assess security risks and estimate efficiency independently, but only few of these methods identify relationships between security risks and efficiency per ...
Modern airports operate under high demands and pressures, and strive to satisfy many diverse, interrelated, sometimes conflicting performance goals. Airport performance areas, such as security, safety, and efficiency are usually studied separately from each other. However, operat ...

Aatom

An agent­based airport terminal operations model simulator

AATOM, the Agent-based Airport Terminal Operations Model simulator is open-source, agent-based at its core, and contains several calibrated presets and templates of basic airport terminal components that can readily be used. Agents in this simulator follow the AATOM architecture, ...
AATOM, the Agent-based Airport Terminal Operations Model simulator is open-source, agent-based at its core, and contains several calibrated presets and templates of basic airport terminal components that can readily be used. Agents in this simulator follow the AATOM architecture, ...
In this work, AATOM, a microscopic agent-based model that simulates movement and operations in the airport terminal is presented. Specifcally, the model includes the main handling processes required for outbound passengers namely, check-in, security and border control. Furthermor ...
We investigate the use of an Agent-based framework to identify and quantify the relationship between security and efficiency within airport terminals. In this framework, we define a novel Security Risk Assessment methodology that explicitly models attacker and defender behavior i ...
Security Risk Assessment is commonly performed by using traditional methods based on linear probabilistic tools and informal expert judgements. These methods lack the capability to take the inherent dynamic and intelligent nature of attackers into account. To partially address th ...