his.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A survivability-based testbed for comparing threat evaluation algorithms
University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre. University of Skövde, Skövde Artificial Intelligence Lab (SAIL).
University of Skövde, The Informatics Research Centre. University of Skövde, Skövde Artificial Intelligence Lab (SAIL). University of Skövde, School of Humanities and Informatics.ORCID iD: 0000-0001-8884-2154
2008 (English)In: Proceedings of the 2nd Skövde Workshop on Information Fusion Topics (SWIFT 2008) / [ed] H. Boström, R. Johansson, Joeri van Laere, Skövde: University of Skövde , 2008, p. 22-24Conference paper, Published paper (Refereed)
Abstract [en]

Threat evaluation is the process in which threat values are assigned to detected targets, based upon the inferred capabilities and intents of the targets to inflict damage to blue force defended assets. This is a high-level information fusion process of high importance, since the calculated threat values are used as input when blue force weapon systems are allocated to the incoming targets, a process often referred to as weapon allocation. Threat values can be calculated from a number of different parameters, such as the position of the closest point of approach (CPA) with respect to blue force defended assets, time required to reach the CPA, the target’s velocity, and its type. A number of algorithms for calculating threat values have been suggested throughout literature, however, criteria to evaluate the performance of such algorithms seem to be lacking. In this paper, we discuss different ways to assess the performance of threat evaluation algorithms. In specific, we describe how threat evaluation algorithms can be compared to each other, using a survivability criterion. Survivability is measured by running the threat evaluation algorithms on simulated scenarios and using the resulting threat values as input to a weapon allocation module. Depending on how well the threat evaluation is performed, the ability of the blue force weapon systems to eliminate the incoming targets will vary (and thereby also the survivability of the defended assets).

 

Place, publisher, year, edition, pages
Skövde: University of Skövde , 2008. p. 22-24
Series
Skövde Studies in Informatics, ISSN 1653-2325 ; 2008:1
National Category
Computer Sciences
Research subject
Technology
Identifiers
URN: urn:nbn:se:his:diva-2420ISBN: 978-91-633-3697-3 OAI: oai:DiVA.org:his-2420DiVA, id: diva2:127260
Conference
The Second Skövde Workshop on Information Fusion Topics, University of Skövde, Sweden, 4−6 November 2008
Available from: 2008-12-03 Created: 2008-12-03 Last updated: 2018-09-26Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

External link to full text

Authority records BETA

Johansson, FredrikFalkman, Göran

Search in DiVA

By author/editor
Johansson, FredrikFalkman, Göran
By organisation
School of Humanities and InformaticsThe Informatics Research CentreSkövde Artificial Intelligence Lab (SAIL)
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 84 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf