Show simple item record

dc.contributor.authorPorter, Stuart
dc.contributor.authorTan, Terence Peng Lian
dc.contributor.authorTan, Tele
dc.contributor.authorWest, Geoff
dc.identifier.citationPorter, S. and Tan, T.P.L. and Tan, T. and West, G. 2014. Breaking into BIM: Performing static and dynamic security analysis with the aid of BIM. Automation in Construction. 40: pp. 84-95.

The design and construction industry is moving towards Building Information Models (BIM) that provide all of the strengths of traditional 3D CAD with an added layer of data allowing new and powerful applications. We investigate the concept of using the data within BIM to better explore security design and considerations. We achieve this by first graphing the physical entities of BIM to capture their relational representation as nodes and links. This graph representation will facilitate the use of graph theory or agent-based simulation to assist in the analysis of the static and dynamic behaviour of the environment around the BIM. We also demonstrate an application of graphing by investigating the use of BIM to explore automated infrastructure security design and consideration via red-teaming. The intent is to make security analysis easier and a process that can be carried out during the design phase of a project, even by non-expert users.

dc.publisherElsevier BV
dc.subjectIntelligent agents
dc.subjectRed team
dc.titleBreaking into BIM: Performing static and dynamic security analysis with the aid of BIM
dc.typeJournal Article
dcterms.source.titleAutomation in Construction

NOTICE: this is the author’s version of a work that was accepted for publication in Automation in Construction. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Automation in Construction, Vol.40, (2014). DOI: 10.1016/j.autcon.2013.12.002

curtin.departmentDepartment of Computing
curtin.accessStatusOpen access

Files in this item


This item appears in the following Collection(s)

Show simple item record