Maritime anomaly detection and threat assessment

RO Lane, DA Nevell, SD Hayward… - … on information fusion, 2010 - ieeexplore.ieee.org
Ships involved in commercial activities tend to follow set patterns of behaviour depending on
the business in which they are engaged. If a ship exhibits anomalous behaviour, this could …

A review of data fusion models and systems

O Sidek, SA Quadri - International Journal of Image and Data …, 2012 - Taylor & Francis
Implementation of a data fusion system is a complex task. Several of the most critical issues
related to the implementation are requirements analysis, sensor selection, architecture …

Low-altitude Slow Small Target Threat Assessment Algorithm by Exploiting Sequential Multi-Feature with Long-Short-Term-Memory

X Yu, S Wei, Y Fang, J Sheng, L Zhang - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
For the preservation of low-airspace security, a comprehensive threat assessment of low-
altitude slow small (LSS) flying targets is essential. Threat assessment intrinsically depends …

Multi-attribute decision making method for air target threat evaluation based on intuitionistic fuzzy sets

Y Xu, Y Wang, X Miu - Journal of Systems Engineering and …, 2012 - ieeexplore.ieee.org
The function of the air target threat evaluation (TE) is the foundation for weapons allocation
and senor resources management within the surface air defense. The multi-attribute …

Explaining the impact of source behaviour in evidential reasoning

P Kowalski, M Zocholl, AL Jousselme - Information Fusion, 2022 - Elsevier
Explanation abilities are required for data-driven models, where the high number of
parameters may render its internal reasoning opaque to users. Despite the natural …

Towards automated threat intelligence fusion

A Modi, Z Sun, A Panwar, T Khairnar… - 2016 IEEE 2nd …, 2016 - ieeexplore.ieee.org
The volume and frequency of new cyber attacks have exploded in recent years. Such events
have very complicated workflows and involve multiple criminal actors and organizations …

A Markov multi-phase transferable belief model for cyber situational awareness

G Ioannou, P Louvieris, N Clewley - Ieee Access, 2019 - ieeexplore.ieee.org
eXfiltration Advanced Persistent Threats (XAPTs) increasingly account for incidents
concerned with critical information exfiltration from High Valued Targets (HVTs). Existing …

Mission-driven resource management for reconfigurable sensing systems

TH de Groot, OA Krasnov, AG Yarovoy - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
Modern sensors, such as multifunctional radars, comprise many settings and the number of
controllable settings is increasing due to technological advance. Although having many …

A clustering data fusion method for intrusion detection system

BA Fessi, SB Abdallah, Y Djemaiel… - 2011 IEEE 11th …, 2011 - ieeexplore.ieee.org
The increasing advance in technological systems has several impacts that affect the security
of information systems. The result of such progress leads to an exponential growth in the …

Design for a cloud-based hybrid Android application security assessment framework

H Zhong, J **ao - 2014 10th International Conference on …, 2014 - ieeexplore.ieee.org
Android platforms occupy predominant proportion of mobile market. Billions of Android apps
are held on different public app markets or private repositories which needs an integrated …