Maritime anomaly detection and threat assessment
RO Lane, DA Nevell, SD Hayward… - … on information fusion, 2010 - ieeexplore.ieee.org
Ships involved in commercial activities tend to follow set patterns of behaviour depending on
the business in which they are engaged. If a ship exhibits anomalous behaviour, this could …
the business in which they are engaged. If a ship exhibits anomalous behaviour, this could …
A review of data fusion models and systems
O Sidek, SA Quadri - International Journal of Image and Data …, 2012 - Taylor & Francis
Implementation of a data fusion system is a complex task. Several of the most critical issues
related to the implementation are requirements analysis, sensor selection, architecture …
related to the implementation are requirements analysis, sensor selection, architecture …
Low-altitude Slow Small Target Threat Assessment Algorithm by Exploiting Sequential Multi-Feature with Long-Short-Term-Memory
X Yu, S Wei, Y Fang, J Sheng, L Zhang - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
For the preservation of low-airspace security, a comprehensive threat assessment of low-
altitude slow small (LSS) flying targets is essential. Threat assessment intrinsically depends …
altitude slow small (LSS) flying targets is essential. Threat assessment intrinsically depends …
Multi-attribute decision making method for air target threat evaluation based on intuitionistic fuzzy sets
Y Xu, Y Wang, X Miu - Journal of Systems Engineering and …, 2012 - ieeexplore.ieee.org
The function of the air target threat evaluation (TE) is the foundation for weapons allocation
and senor resources management within the surface air defense. The multi-attribute …
and senor resources management within the surface air defense. The multi-attribute …
Explaining the impact of source behaviour in evidential reasoning
Explanation abilities are required for data-driven models, where the high number of
parameters may render its internal reasoning opaque to users. Despite the natural …
parameters may render its internal reasoning opaque to users. Despite the natural …
Towards automated threat intelligence fusion
The volume and frequency of new cyber attacks have exploded in recent years. Such events
have very complicated workflows and involve multiple criminal actors and organizations …
have very complicated workflows and involve multiple criminal actors and organizations …
A Markov multi-phase transferable belief model for cyber situational awareness
eXfiltration Advanced Persistent Threats (XAPTs) increasingly account for incidents
concerned with critical information exfiltration from High Valued Targets (HVTs). Existing …
concerned with critical information exfiltration from High Valued Targets (HVTs). Existing …
Mission-driven resource management for reconfigurable sensing systems
Modern sensors, such as multifunctional radars, comprise many settings and the number of
controllable settings is increasing due to technological advance. Although having many …
controllable settings is increasing due to technological advance. Although having many …
A clustering data fusion method for intrusion detection system
BA Fessi, SB Abdallah, Y Djemaiel… - 2011 IEEE 11th …, 2011 - ieeexplore.ieee.org
The increasing advance in technological systems has several impacts that affect the security
of information systems. The result of such progress leads to an exponential growth in the …
of information systems. The result of such progress leads to an exponential growth in the …
Design for a cloud-based hybrid Android application security assessment framework
H Zhong, J **ao - 2014 10th International Conference on …, 2014 - ieeexplore.ieee.org
Android platforms occupy predominant proportion of mobile market. Billions of Android apps
are held on different public app markets or private repositories which needs an integrated …
are held on different public app markets or private repositories which needs an integrated …