Skip to main content

An Approach to Threat Assessment

  • Conference paper

Abstract

A concept for characterizing, predicting and recognizing threat situations is developed. The goal is to establish a systematic approach to automating some of these functions. The proposed approach addresses the fundamental problems of (a) sparse and ambiguous indicators of potential or actualized threat activity buried in massive background data; and (b) uncertainty in threat capabilities, intent and opportunities. Attack hypotheses are adaptively generated, evaluated and refined as the understanding of the situation evolves. This effort builds upon advances in Situation, Ontology and Estimation theory. Specific features of the approach include (a) fuzzy definition of situations and relationships; (b) integration of diverse inference bases: logical/semantic, causal, conventional, etc.; and (c) context-conditioned reasoning with uncertain evidence formulated in terms of “probabilistic infons.”

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barwise J, Perry J. 1983. Situations and Attitudes. Cambridge, MA: Bradford Books, MIT Press.

    Google Scholar 

  2. Bowman CL, Steinberg AN. 2001. A systems engineering approach for implementing data fusion systems. In: Handbook of Multisensor Data Fusion, Hall DL, Llinas J, editors. London: CRC Press.

    Google Scholar 

  3. Curry H, Feys R. 1974. Combinatory Logic, Volume 1. Amsterdam: North-Holland.

    Google Scholar 

  4. Devlin K. 1991. Logic and Information. Cambridge: Press Syndicate of the University of Cambridge.

    MATH  Google Scholar 

  5. Khalil A. 2005. Computational Learning and Data-Driven Modeling for Water Resource Management and Hydrology [dissertation]. Utah State University.

    Google Scholar 

  6. Little E, Rogova G, Boury-Brisset AC. 2005. Theoretical Foundations of Threat Ontology for Data Fusion Applications, DRDC, Valcatier TR-2005-269.

    Google Scholar 

  7. Nozawa ET. 2000. Peircean Semeiotic: a new engineering paradigm for automatic and adaptive intelligent systems. In: Proceedings of the FUSION’2003-3th Conference on Multisource-Multisensor Information Fusion, Paris.

    Google Scholar 

  8. Pearl J. 1988. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. San Francisco, CA: Morgan Kaufmann.

    Google Scholar 

  9. Steinberg AN, Bowman CL, White FE. 1998. Revisions to the JDL Model. In: Joint NATO/IRIS Conference Proceedings; 1998 Oct.; Quebec. Reprinted in: Sensor Fusion: Architectures, Algorithms and Applications. Proceedings of the SPIE, Volume 3719; 1999; Quebec.

    Google Scholar 

  10. Steinberg AN, Bowman CL. 2004. Rethinking the JDL data fusion model. In: Proceedings of the 2004 MSS National Symposium on Sensor and Data Fusion, Volume 1; 2004 June; Columbia.

    Google Scholar 

  11. Steinberg AN. 2005. Threat assessment technology development. In: Proceedings of the Fifth International and Interdisciplinary Conference on Modeling and Using Context (CONTEXT’05); 2005 July; Paris.

    Google Scholar 

  12. White FE. 1988. A Model for Data Fusion. In: Proceedings of the First National Symposium on Sensor Fusion, Volume 2. GACIAC, IIT Research Institute; Chicago. p 143–158.

    Google Scholar 

  13. Yedidia JS, Freeman WT, Weiss Y. 2002. Understanding belief propagation and its generalizations. In: Exploring Artificial Intelligence in the New Millennium, Lakemeyer G, Nebel B, editors. San Francisco, CA: Morgan Kaufmann.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science + Business Media B.V.

About this paper

Cite this paper

Steinberg, A.N. (2009). An Approach to Threat Assessment. In: Shahbazian, E., Rogova, G., DeWeert, M.J. (eds) Harbour Protection Through Data Fusion Technologies. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8883-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-8883-4_16

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-8882-7

  • Online ISBN: 978-1-4020-8883-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics