his.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A survivability-based testbed for comparing threat evaluation algorithms
University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre. University of Skövde, Skövde Artificial Intelligence Lab (SAIL).
University of Skövde, The Informatics Research Centre. University of Skövde, Skövde Artificial Intelligence Lab (SAIL). University of Skövde, School of Humanities and Informatics.ORCID iD: 0000-0001-8884-2154
2008 (English)In: Proceedings of the 2nd Skövde Workshop on Information Fusion Topics (SWIFT 2008), Skövde: University of Skövde , 2008, 22-24 p.Conference paper, (Refereed)
Abstract [en]

Threat evaluation is the process in which threat values are assigned to detected targets, based upon the inferred capabilities and intents of the targets to inflict damage to blue force defended assets. This is a high-level information fusion process of high importance, since the calculated threat values are used as input when blue force weapon systems are allocated to the incoming targets, a process often referred to as weapon allocation. Threat values can be calculated from a number of different parameters, such as the position of the closest point of approach (CPA) with respect to blue force defended assets, time required to reach the CPA, the target’s velocity, and its type. A number of algorithms for calculating threat values have been suggested throughout literature, however, criteria to evaluate the performance of such algorithms seem to be lacking. In this paper, we discuss different ways to assess the performance of threat evaluation algorithms. In specific, we describe how threat evaluation algorithms can be compared to each other, using a survivability criterion. Survivability is measured by running the threat evaluation algorithms on simulated scenarios and using the resulting threat values as input to a weapon allocation module. Depending on how well the threat evaluation is performed, the ability of the blue force weapon systems to eliminate the incoming targets will vary (and thereby also the survivability of the defended assets).

 

Place, publisher, year, edition, pages
Skövde: University of Skövde , 2008. 22-24 p.
National Category
Computer Science
Research subject
Technology
Identifiers
URN: urn:nbn:se:his:diva-2420ISBN: 978-91-633-3697-3 OAI: oai:DiVA.org:his-2420DiVA: diva2:127260
Conference
SWIFT 2008
Available from: 2008-12-03 Created: 2008-12-03 Last updated: 2014-05-16Bibliographically approved

Open Access in DiVA

No full text

Other links

External link to full text

Search in DiVA

By author/editor
Johansson, FredrikFalkman, Göran
By organisation
School of Humanities and InformaticsThe Informatics Research CentreSkövde Artificial Intelligence Lab (SAIL)
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

Total: 70 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf