A threat assessment method based on hierarchies and modules

Fang Deng, Xinan Liu, Zhihong Peng, Jie Chen

Research output: Contribution to journalArticlepeer-review

Abstract

With the development of low-level data fusion technology, threat assessment, which is a part of high-level data fusion, is recognized by an increasing numbers of people. However, the method to solve the problem of threat assessment for various kinds of targets and attacks is unknown. Hence, a threat assessment method is proposed in this paper to solve this problem. This method includes tertiary assessments: information classification, reorganization, and summary. In the tertiary assessments model, various threats with multi-class targets and attacks can be comprehensively assessed. A case study with specific algorithms and scenarios is shown to prove the validity and rationality of this method.

Original languageEnglish
Pages (from-to)93-99
Number of pages7
JournalJournal of Advanced Computational Intelligence and Intelligent Informatics
Volume18
Issue number1
DOIs
Publication statusPublished - Jan 2014

Keywords

  • Dynamic bayesian network
  • Membership cloud
  • Particle swarm
  • Threat assessment

Fingerprint

Dive into the research topics of 'A threat assessment method based on hierarchies and modules'. Together they form a unique fingerprint.

Cite this