A Bayesian network approach to threat evaluation with application to an air defense scenario

In this paper, a precise description of the threat evaluation process is presented. This is followed by a review describing which parameters that have been suggested for threat evaluation in an air surveillance context throughout the literature, together with an overview of different algorithms for threat evaluation. Grounded in the findings from the literature review, a threat evaluation system have been developed. The system is based on a Bayesian network approach, making it possible to handle imperfect observations. The structure of the Bayesian network is described in detail. Finally, an analysis of the systempsilas performance as applied to a synthetic scenario is presented.

[1]  Jh van Vuuren,et al.  Threat evaluation and weapon assignment decision support: A review of the state of the art , 2007 .

[2]  L. C. van der Gaag,et al.  Building probabilistic networks: Where do the numbers come from? - a guide to the literature , 2000 .

[3]  P.R.E. Cutler,et al.  Description of a rule-based model for the automatic allocation of airborne assets , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[4]  A. Steinberg,et al.  An approach to threat assessment , 2005, 2005 7th International Conference on Information Fusion.

[5]  X. T. Nguyen Threat assessment in tactical airborne environments , 2002, Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997).

[6]  Mohamad Khaled Allouche,et al.  Real-time use of Kohonen's self-organizing maps for threat stabilization , 2005, Inf. Fusion.

[7]  Jean Roy,et al.  Threat evaluation for impact assessment in situation analysis systems , 2002, SPIE Defense + Commercial Sensing.

[8]  James Llinas,et al.  Multisensor Data Fusion , 1990 .

[9]  F. Johansson,et al.  Detection of vessel anomalies - a Bayesian network approach , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[10]  Galina L. Rogova,et al.  An Ontological Analysis of Threat and Vulnerability , 2006, 2006 9th International Conference on Information Fusion.

[11]  W. P. Malcolm On the Character and Complexity of Certain Defensive Resource Allocation Problems , 2004 .

[12]  Luigi Chisci,et al.  An approach to threat assessment based on evidential networks , 2007, 2007 10th International Conference on Information Fusion.

[13]  A. Benaskeur,et al.  Threat evaluation and weapons allocation in network-centric warfare , 2005, 2005 7th International Conference on Information Fusion.

[14]  Martin Oxenham,et al.  Accommodating Obstacle Avoidance in the Weapons Allocation Problem for Tactical Air Defence , 2006, 2006 9th International Conference on Information Fusion.

[15]  Marek J. Druzdzel,et al.  Building Probabilistic Networks: "Where Do the Numbers Come From?" Guest Editors Introduction , 2000, IEEE Trans. Knowl. Data Eng..

[16]  Michael J. Liebhaber,et al.  Naval Air Defense Threat Assessment: Cognitive Factors and Model , 2000 .

[17]  N. Okello,et al.  Threat assessment using bayesian networks , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[18]  Martin G. Oxenham Enhancing situation awareness for air defence via automated threat analysis , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[19]  Yawei Liang,et al.  An Approximate Reasoning Model for Situation and Threat Assessment , 2007, Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007).

[20]  Alan N. Steinberg,et al.  Revisions to the JDL data fusion model , 1999, Defense, Security, and Sensing.

[21]  Michael J. Liebhaber,et al.  Air Threat Assessment: Research, Model, and Display Guidelines , 2002 .

[22]  B. A. Feher,et al.  Surface Warfare Threat Assessment: Requirements Definition , 2002 .