Show simple item record

dc.contributor.authorPorter, Stuart
dc.contributor.authorTan, Terence Peng Lian
dc.contributor.authorTan, Tele
dc.contributor.authorWest, Geoff
dc.date.accessioned2017-01-30T11:24:57Z
dc.date.available2017-01-30T11:24:57Z
dc.date.created2015-03-31T20:00:25Z
dc.date.issued2014
dc.identifier.citationPorter, S. and Tan, T.P.L. and Tan, T. and West, G. 2014. Breaking into BIM: Performing static and dynamic security analysis with the aid of BIM. Automation in Construction. 40: pp. 84-95.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/11469
dc.identifier.doi10.1016/j.autcon.2013.12.002
dc.description.abstract

The design and construction industry is moving towards Building Information Models (BIM) that provide all of the strengths of traditional 3D CAD with an added layer of data allowing new and powerful applications. We investigate the concept of using the data within BIM to better explore security design and considerations. We achieve this by first graphing the physical entities of BIM to capture their relational representation as nodes and links. This graph representation will facilitate the use of graph theory or agent-based simulation to assist in the analysis of the static and dynamic behaviour of the environment around the BIM. We also demonstrate an application of graphing by investigating the use of BIM to explore automated infrastructure security design and consideration via red-teaming. The intent is to make security analysis easier and a process that can be carried out during the design phase of a project, even by non-expert users.

dc.publisherElsevier BV
dc.subjectSecurity
dc.subjectIntelligent agents
dc.subjectDelay
dc.subjectGraph
dc.subjectBIM
dc.subjectSimulation
dc.subjectMulti-agent
dc.subjectRed team
dc.titleBreaking into BIM: Performing static and dynamic security analysis with the aid of BIM
dc.typeJournal Article
dcterms.source.volume40
dcterms.source.startPage84
dcterms.source.endPage95
dcterms.source.issn0926-5805
dcterms.source.titleAutomation in Construction
curtin.note

NOTICE: this is the author’s version of a work that was accepted for publication in Automation in Construction. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Automation in Construction, Vol.40, (2014). DOI: 10.1016/j.autcon.2013.12.002

curtin.departmentDepartment of Computing
curtin.accessStatusOpen access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record