Modeling threats
暂无分享,去创建一个
P. Willett | J. Allanach | Krishna Pattipati | Satnam Singh | H. Tu | J. Areta | P. Willett | J. Areta | H. Tu | J. Allanach
[1] F. Jelinek. Fast sequential decoding algorithm using a stack , 1969 .
[2] Krishna R. Pattipati,et al. Stochastic modeling of a terrorist event via the ASAM system , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[3] Krishna R. Pattipati,et al. The adaptive safety analysis and monitoring system , 2004, SPIE Defense + Commercial Sensing.
[4] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[5] L. Baum,et al. Statistical Inference for Probabilistic Functions of Finite State Markov Chains , 1966 .
[6] Haiying Tu,et al. Detecting, tracking, and counteracting terrorist networks via hidden Markov models , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).
[7] Donald Reid. An algorithm for tracking multiple targets , 1978 .