Target threat assessment using fuzzy sets theory

E Azimirad, J Haddadnia - International Journal of Advances in Intelligent …, 2015 - ijain.org
… a precise description of the threat evaluation process using fuzzy sets theory. A review … threat
value calculation. For the first time in this paper, eleven parameters are introduced for threat

Predictive threat assessment via reachability analysis and set invariance theory

P Falcone, M Ali, J Sjoberg - IEEE Transactions on Intelligent …, 2011 - ieeexplore.ieee.org
… In this paper, instead, we propose two threat assessment methods that explicitly account
for the human driving behavior. The idea underlying the proposed methods is to use vehicle …

Threat assessment and threat management

JR Meloy, SD Hart, J Hoffmann - … handbook of threat assessment, 2014 - books.google.com
… The second part delineates the similarities between threat assess-ment and violence risk
assessment, and the ways in which they differ from each other in both prac-not know exactly …

A statistical threat assessment

SH Huddleston, DE Brown - IEEE Transactions on Systems …, 2009 - ieeexplore.ieee.org
threat assessments and predictive capability for targeting specific criminal groups rather than
the general incidence of crimes by a set of … offer improved threat assessments for distinct …

Dynamic Air Target Threat Assessment Based on Interval‐Valued Intuitionistic Fuzzy Sets, Game Theory, and Evidential Reasoning Methodology

R Zhao, F Yang, L Ji, Y Bai - Mathematical Problems in …, 2021 - Wiley Online Library
… target threat [4]. To solve the target threat assessment problem, air target threat assessment
… These methods mainly include Bayesian networks [5–7], neural networks [8, 9], rough sets […

An approach to threat assessment

AN Steinberg - 2005 7th international conference on …, 2005 - ieeexplore.ieee.org
… Furthermore, we need to recognize threat assessment as part ofthe more general problems
of assessing intentionality and of characterizing, recognizing and predicting intentional acts …

A threat assessment model under uncertain environment

Y Deng - Mathematical Problems in Engineering, 2015 - Wiley Online Library
… Chiadamrong [5] introduces the concept of fuzzy set theory to overcoming the precision-…
of uncertain information, fuzzy set theory [12–15] and evidence theory are also widely used in …

[PDF][PDF] A new model for threat assessment in data fusion based on fuzzy evidence theory

E Azimirad, J Haddadnia - Int. J. Adv. Intell. Informatics, 2016 - pdfs.semanticscholar.org
… In this section we stated the results of simulation for fuzzy sets theory and fuzzy evidence
theory. These theories are not enough used in military applications in literatures. For this reason…

Towards a theory of insider threat assessment

R Chinchani, A Iyer, HQ Ngo… - … Systems and Networks …, 2005 - ieeexplore.ieee.org
… the threat, and hence consider the attacks as unpreventable. In this paper, we present a theory
of insider threat assessment. … of insider threat, and subsequently, show threat assessment

Air multi-target threat assessment method based on improved GGIFSS

Z Qiang, H Junhua, F Jinfu, L An - Journal of Intelligent & …, 2019 - content.iospress.com
… method based on improved group generalized intuitionistic fuzzy soft set (I-… of threat
assessment, a reasonable threat assessment system is established, and the appropriate assessment