Abstract — The paper develops an information fusion system that aims at supporting a commander’s decision making by providing an assessment of threat, that is an estimate of the extent to which an enemy platform poses a threat based on evidence about its intent and capability. Threat is modelled in the framework of the valuation-based system (VBS), by a network of entities and relationships between them. The uncertainties in the relationships are represented by belief functions as defined in the theory of evidence. Hence the resulting network for reasoning is referred to as an evidential network. Local computations in the evidential network are carried out by inward propagation on the underlying joint binary tree. This allows the dynamic na...
AbstractThreat evaluation is an uncertainty process to protect the assets against the various enemy ...
This paper aims to develop a hierarchical risk assessment model using the newly-developed evidential...
We present two methods to provide explanations for reasoning with belief functions. One approach, in...
The chapter is devoted to the development of an automatic knowledge-based information fusion system ...
Cyber-physical systems (CPSs) have dependability requirements that are associated with controlling a...
Information Technology ManagementAn Information Warrior faces a complex and dynamic operating enviro...
Threat modeling plays an important role in the deployment of optimal security controls and a number ...
Natech is a technological accident which is triggered by a natural disaster. Increasing frequency of...
This research addresses two intensive computational problems of reasoning under uncertainty in artif...
The increasing exploitation of the internet leads to new uncertainties, due to interdependencies and...
We exploit Decision Networks (DN) for the analysis of attack/defense scenarios. DN extend both the m...
The current transformation processes aim at robustly networked forces in order to enable them to exe...
A central focus of intelligence is the identification, analysis and assessment of threat. However, a...
The current transformation processes aim at robustly networked forces in order to enable them to exe...
This paper briefly reviews a series of studies [Liebhaber, 1999; Liebhaber, 2000) that were undertak...
AbstractThreat evaluation is an uncertainty process to protect the assets against the various enemy ...
This paper aims to develop a hierarchical risk assessment model using the newly-developed evidential...
We present two methods to provide explanations for reasoning with belief functions. One approach, in...
The chapter is devoted to the development of an automatic knowledge-based information fusion system ...
Cyber-physical systems (CPSs) have dependability requirements that are associated with controlling a...
Information Technology ManagementAn Information Warrior faces a complex and dynamic operating enviro...
Threat modeling plays an important role in the deployment of optimal security controls and a number ...
Natech is a technological accident which is triggered by a natural disaster. Increasing frequency of...
This research addresses two intensive computational problems of reasoning under uncertainty in artif...
The increasing exploitation of the internet leads to new uncertainties, due to interdependencies and...
We exploit Decision Networks (DN) for the analysis of attack/defense scenarios. DN extend both the m...
The current transformation processes aim at robustly networked forces in order to enable them to exe...
A central focus of intelligence is the identification, analysis and assessment of threat. However, a...
The current transformation processes aim at robustly networked forces in order to enable them to exe...
This paper briefly reviews a series of studies [Liebhaber, 1999; Liebhaber, 2000) that were undertak...
AbstractThreat evaluation is an uncertainty process to protect the assets against the various enemy ...
This paper aims to develop a hierarchical risk assessment model using the newly-developed evidential...
We present two methods to provide explanations for reasoning with belief functions. One approach, in...