[PDF][PDF] Threat assessment using Bayesian networks

N Okello, G Thoms - … of the 6th International Conference on …, 2003 - academia.edu
While threat assessment for air defence can be implemented using several methods, Bayes
nets have advantages over other methods (eg, logical or fuzzy) because they employ …

A Bayesian network approach to threat evaluation with application to an air defense scenario

F Johansson, G Falkman - 2008 11th International conference …, 2008 - ieeexplore.ieee.org
In this paper, a precise description of the threat evaluation process is presented. This is
followed by a review describing which parameters that have been suggested for threat …

A comparison between two approaches to threat evaluation in an air defense scenario

F Johansson, G Falkman - Modeling Decisions for Artificial Intelligence: 5th …, 2008 - Springer
Threat evaluation is a high-level information fusion problem of high importance within the
military domain. This task is the foundation for weapons allocation, where assignment of …

TANDI: Threat assessment of network data and information

J Holsopple, SJ Yang, M Sudit - … Architectures, Algorithms, and …, 2006 - spiedigitallibrary.org
Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs)
to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that …

Some computational approaches for situation assessment and impact assessment

ML Hinman - Proceedings of the Fifth International Conference …, 2002 - ieeexplore.ieee.org
This paper will provide an overview of several research efforts in the area of Information
Fusion being conducted at the Fusion Technology Branch, Air Force Research Laboratory. It …

Situation assessment via Bayesian belief networks

S Das, R Grey, P Gonsalves - Proceedings of the Fifth …, 2002 - ieeexplore.ieee.org
We present here an approach to battlefield situation assessment based on a level 2 fusion
processing of incoming information via probabilistic Bayesian Belief Network technology. A …

Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs

A Kazeminajafabadi, M Imani - Cybersecurity, 2023 - Springer
Early attack detection is essential to ensure the security of complex networks, especially
those in critical infrastructures. This is particularly crucial in networks with multi-stage …

Exploitation of a priori knowledge for information fusion

É Bossé, P Valin, AC Boury-Brisset, D Grenier - Information Fusion, 2006 - Elsevier
The Information Fusion (IF) process is becoming increasingly more sophisticated,
particularly through the incorporation of methods for high-level reasoning when applied to …

Multi-entity Bayesian networks for situation assessment

E Wright, S Mahoney, K Laskey… - Proceedings of the …, 2002 - ieeexplore.ieee.org
Reasoning about military situations requires a scientifically sound and computationally
robust uncertainty calculus, a supporting inference engine that procedurally encodes the …

Modelling of threat evaluation for dynamic targets using Bayesian network approach

S Kumar, BK Tripathi - Procedia technology, 2016 - Elsevier
Threat evaluation is an uncertainty process to protect the assets against the various enemy
targets such as aircrafts, missiles, helicopters etcetera. There is one critical thing in threat …