Agent-Based Modelling for Security Risk Assessment

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

6 Citations (Scopus)
91 Downloads (Pure)


Security Risk Assessment is commonly performed by using traditional methods based on linear probabilistic tools and informal expert judgements. These methods lack the capability to take the inherent dynamic and intelligent nature of attackers into account. To partially address the limitations, researchers applied game theory to study security risks. However, these methods still rely on traditional methods to determine essential model parameters, such as payoff values. To overcome the limitations of traditional methods, we propose an approach which combines agent-based modelling with Monte Carlo simulations. Agent-based models allow more realistic representation of essential aspects and processes of socio-technical systems at cognitive, social and organisational levels. Such models can be used to estimate risks and parameters related to them. An application of the approach is illustrated by a case study of an airport security checkpoint.
Original languageEnglish
Title of host publicationHighlights of Practical Applications of Cyber-Physical Multi-Agent Systems
Subtitle of host publicationInternational Workshops of PAAMS 2017, Proceedings
EditorsJ. Bajo, Z. Vale, K. Hallenborg, A.P. Rocha, P. Mathieu, P. Pawlewski, E. Del Val, P. Novais, F. Lopes, N.D. Duque Méndez, V. Julián, J. Holmgren
Place of PublicationCham
ISBN (Electronic)978-3-319-60285-1
ISBN (Print)978-3-319-60284-4
Publication statusPublished - 2017
EventPAAMS 2017: 15th International Conference on Practical Applications of Agents and Multi-Agent Systems - Porto, Portugal
Duration: 21 Jun 201723 Jun 2017
Conference number: 15

Publication series

NameCommunications in Computer and Information Science
ISSN (Print)1865-0929


ConferencePAAMS 2017


  • Demand response
  • Distributed generation
  • Green ports
  • Multi-agent systems
  • Reefers


Dive into the research topics of 'Agent-Based Modelling for Security Risk Assessment'. Together they form a unique fingerprint.

Cite this