The Threat Ensemble Vulnerability Assessment and Sensor Placement Optimization Tool (TEVA-SPOT) has been developed by the U. S. Environmental Protection Agency, Sandia National Laboratories, Argonne National Laboratory, and the University of Cincinnati to support the design of contamination warning systems. The TEVA-SPOT Toolkit provides command-line interfaces to computational tools that compute impacts for contamination incidents and optimize sensor locations in a water distribution system. The TEVA-SPOT Toolkit supports a flexible decision framework for sensor placement that involves two major steps: a modeling process and a decision-making process. The modeling process includes (1) describing sensor characteristics, (2) defining the design basis threat, (3) selecting impact measures for design, (4) planning utility response to sensor detection, and (5) identifying feasible sensor locations.
Tags
No tags have been added
In a Nutshell, TEVA-SPOT Toolkit...
Code analysis has not completed
The Open Hub computes statistics on FOSS projects by examining source code and commit history in source code management systems. The source code for this project has been located, but the analysis isn't complete. Feel free to check its progress.
This Project has No vulnerabilities Reported Against it
Did You Know...
...
use of OSS increased in 65% of companies in 2016
...
you can subscribe to e-mail newsletters to receive update from the Open Hub blog
...
nearly 1 in 3 companies have no process for identifying, tracking,
or remediating known open source vulnerabilities
...
learn about Open Hub updates and features on the
Open Hub blog
Code analysis has not completed
The Open Hub computes statistics on FOSS projects by examining source code and commit history in source code management systems. The source code for this project has been located, but the analysis isn't complete. Feel free to check its progress.
This site uses cookies to give you the best possible experience.
By using the site, you consent to our use of cookies.
For more information, please see our
Privacy Policy