Topic
Threat assessment
About: Threat assessment is a research topic. Over the lifetime, 1449 publications have been published within this topic receiving 18727 citations.
Papers published on a yearly basis
Papers
More filters
•
01 Jan 1997
TL;DR: This volume is intended to be both an update on research progress on data fusion and an introduction to potentially powerful new techniques: fuzzy logic, random set theory, and conditional and relational event algebra.
Abstract: Data fusion or information fusion are names which have been primarily assigned to military-oriented problems. In military applications, typical data fusion problems are: multisensor, multitarget detection, object identification, tracking, threat assessment, mission assessment and mission planning, among many others. However, it is clear that the basic underlying concepts underlying such fusion procedures can often be used in nonmilitary applications as well. The purpose of this book is twofold: First, to point out present gaps in the way data fusion problems are conceptually treated. Second, to address this issue by exhibiting mathematical tools which treat combination of evidence in the presence of uncertainty in a more systematic and comprehensive way. These techniques are based essentially on two novel ideas relating to probability theory: the newly developed fields of random set theory and conditional and relational event algebra. This volume is intended to be both an update on research progress on data fusion and an introduction to potentially powerful new techniques: fuzzy logic, random set theory, and conditional and relational event algebra. Audience: This volume can be used as a reference book for researchers and practitioners in data fusion or expert systems theory, or for graduate students as text for a research seminar or graduate level course.
438 citations
•
20 Aug 1989TL;DR: Some of the features of a Procedural Reasoning System (PRS) that enables it to operate effectively in such environments and how this architecture supports both goal-directed reasoning and the ability to react rapidly to unanticipated changes in the environment is described.
Abstract: The development of reasoning systems that can reason and plan in a continuously changing environment is emerging as an important area of research in Artificial Intelligence. This paper describes some of the features of a Procedural Reasoning System (PRS) that enables it to operate effectively in such environments. The basic system design is first described and it is shown how this architecture supports both goal-directed reasoning and the ability to react rapidly to unanticipated changes in the environment. The decision-making capabilities of the system are then discussed and it is indicated how the system integrates these components in a manner that takes account of the bounds on both resources and knowledge that typify most real-time operations. The system has been applied to handling malfunctions on the space shuttle, threat assessment, and the control of an autonomous robot.
425 citations
•
31 Dec 2000
TL;DR: In this article, the authors propose a method to solve the problem of gender discrimination in the workplace, and propose an approach based on self-defense and self-representation, respectively.
Abstract: DOCUMENT RESUME
366 citations
••
TL;DR: A survey of systems and control methods proposed for the security of Cyber-Physical Systems, a field that has recently garnered increased attention, classifies these methods into three categories based on the type of defense proposed against the cyberattacks: prevention, resilience, and detection & isolation.
312 citations
•
11 Jul 2002TL;DR: In this article, a collision avoidance system for use in a vehicle is described, where a sensor subsystem is used to capture sensor data relating to one or more areas outside the vehicle, and a threat assessment is sent to a feedback subsystem so that if appropriate, a response is generated by the system.
Abstract: A collision avoidance system for use in a vehicle. The system facilitates the avoidance of other vehicles and other potential hazards or obstacles. A sensor subsystem is used to capture sensor data relating to one or more areas outside the vehicle. Sensor data is sent from the sensor subsystem to a threat assessment subsystem for generating a threat assessment from the sensor data. The threat assessment is then sent to a feedback subsystem so that if appropriate, a response is generated by the system. The response can take the form of a visual, audio, and/or haptic warning. The response can also take the form of changes with respect to the vehicle itself, such as an automatic reduction in speed. The system can incorporate user-based attributes, vehicle-based attributes, and environment-based attributes in evaluating potential threats and contemplating system responses to those threats. A wide variety of different heuristics can be applied by the system. The system can be configured to minimize nuisance alarms and accommodate distinctions between users based on user preferences, user history, and other factors.
283 citations