2 Th Iccrts " Adapting C2 to the 21st Century " Applying Spatial-temporal Model and Game Theory to Asymmetric Threat Prediction

Abstract : Accurate predictions of enemy course of actions "ECOA" are important to the command and control optimization strategies in long-lasting battles. In most Command and Control "C2" applications, the existing techniques, such as spatial-temporal point models for ECOA prediction or Discrete Choice Model "DCM", assume that insurgent attack features/patterns, or at least the trends of behavior patterns, are static. However, this static assumption is no longer true for intelligent and organized insurgents in recent antiterrorism war. These insurgents sometimes deliberately violate probability theory predictions so they can apply surprise attacks to create more casualties and spread terror. In this paper, a new game theoretic framework is proposed for modeling dynamic changes of enemy behavior features and predicting future threats. This framework semantically combines several different approaches; namely, a feature prediction game, higher level hybrid data fusion, techniques to provide concrete spatial-temporal modeling and prediction, emotion analysis of adversary rationality and non-rationality, deception identification and modeling, hierarchical knowledge representation, and a non-zero sum stochastic adversarial Markov game. We mainly describe the modification of existing spatial-temporal point models, the fusion of dynamic game feature selection technique and dynamic cohesiveness feature selection technique, the ontology about selected/unselected features, and construction of probability predictions.

[1]  Jose B. Cruz,et al.  Optimal and Near-Optimal Incentive Strategies in the Hierarchical Control of Markov Chains , 1983, 1983 American Control Conference.

[2]  Thomas Fiksel Simple Spatial-Temporal Models for Sequences of Geological Events , 1984, J. Inf. Process. Cybern..

[3]  J. B. CruzJr. Survey of leader-follower concepts in hierarchical decision-making , 1980 .

[4]  R. Mojena,et al.  Hierarchical Grouping Methods and Stopping Rules: An Evaluation , 1977, Comput. J..

[5]  Monica A. Walker,et al.  The urban criminal: A study in Sheffield , 1976 .

[6]  Dongxu Li,et al.  Team dynamics and tactics for mission planning , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[7]  J. Cruz,et al.  An approach to decentralized control of large scale systems using aggregation methods , 1984, The 23rd IEEE Conference on Decision and Control.

[8]  Jose B. Cruz,et al.  Game Theoretic Approach to Threat Prediction and Situation Awareness , 2006, 2006 9th International Conference on Information Fusion.

[9]  Jose B. Cruz,et al.  GENETIC ALGORITHM FOR TASK ALLOCATION IN UAV COOPERATIVE CONTROL , 2003 .

[10]  Heidi Hoyle,et al.  Spatial Forecast Methods for Terrorist Events in Urban Environments , 2004, ISI.

[11]  André Hardy,et al.  An examination of procedures for determining the number of clusters in a data set , 1994 .

[12]  Carolyn Rebecca Block,et al.  STAC HOT SPOT AREAS: A STATISTICAL TOOL FOR LAW ENFORCEMENT DECISIONS 1 , 1993 .

[13]  Menachem Amir Patterns in Forcible Rape , 1971 .

[14]  Donald E. Brown,et al.  Criminal incident prediction using a point-pattern-based density model , 2003 .