A Threat Assessment Method Based On Hierarchies And Modules

Fang Deng,Xinan Liu,Zhihong Peng,Jie Chen
DOI: https://doi.org/10.20965/jaciii.2014.p0093
2014-01-01
Journal of Advanced Computational Intelligence and Intelligent Informatics
Abstract:With the development of low-level data fusion technology, threat assessment, which is a part of high-level data fusion, is recognized by an increasing numbers of people. However, the method to solve the problem of threat assessment for various kinds of targets and attacks is unknown. Hence, a threat assessment method is proposed in this paper to solve this problem. This method includes tertiary assessments: information classification, reorganization, and summary. In the tertiary assessments model, various threats with multi-class targets and attacks can be comprehensively assessed. A case study with specific algorithms and scenarios is shown to prove the validity and rationality of this method.
What problem does this paper attempt to address?