A threat assessment method based on hierarchies and modules

Fang Deng, Xinan Liu, Zhihong Peng, Jie Chen

科研成果: 期刊稿件文章同行评审

摘要

With the development of low-level data fusion technology, threat assessment, which is a part of high-level data fusion, is recognized by an increasing numbers of people. However, the method to solve the problem of threat assessment for various kinds of targets and attacks is unknown. Hence, a threat assessment method is proposed in this paper to solve this problem. This method includes tertiary assessments: information classification, reorganization, and summary. In the tertiary assessments model, various threats with multi-class targets and attacks can be comprehensively assessed. A case study with specific algorithms and scenarios is shown to prove the validity and rationality of this method.

源语言英语
页(从-至)93-99
页数7
期刊Journal of Advanced Computational Intelligence and Intelligent Informatics
18
1
DOI
出版状态已出版 - 1月 2014

指纹

探究 'A threat assessment method based on hierarchies and modules' 的科研主题。它们共同构成独一无二的指纹。

引用此

Deng, F., Liu, X., Peng, Z., & Chen, J. (2014). A threat assessment method based on hierarchies and modules. Journal of Advanced Computational Intelligence and Intelligent Informatics, 18(1), 93-99. https://doi.org/10.20965/jaciii.2014.p0093