عنوان فارسی مقاله: | مدل سازی تهدید نامتقارن با استفاده از HMM ها: فیلترینگ برنولی و آنالیز قابلیت شناسایی |
عنوان انگلیسی مقاله: | Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis |
چکیده
مقدمه
فرمولبندی مسئله و مشارکت ها
مدلسازی تهدید نامتقارن
فیلتر برنولی
آنالیز قابلیت تشخیص
پیش بینی عملکرد قابلیت شناسایی
تقریب زنجیره دیزی HMM پیچیده
تشخیص در سطح آلارم نادرست مورد نظر
راه اندازی شبیه سازی
نتایج شبیه سازی
نتیجه گیری و اثر آتی
کلمات کلیدی :
Emergent Information Technologies and Enabling Policies for ... https://books.google.com/books?isbn=0471786551 Robert L. Popp, John Yen - 2006 - Computers ... 83, 87 application, 87 Asymmetric tactical threats, 331 Attribution knowledge ... 32 with HMMs, 32 hybrid, 32 modeling terrorist activities with HMMs and BNs, ... 1Anomaly Detection via Feature-Aided Tracking and Hidden Markov ... citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.680.7891 by S Singh - Cited by 43 - Related articles In the context of asymmetric threats 1, the detection of an abnormal situation refers to ... In this paper, we illustrate the capabilities of hidden Markov models (HMMs), combined with feature-aided tracking, for the detection of asymmetric threats. 1Anomaly Detection via Feature-Aided Tracking and Hidden Markov ... citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.469.3079 by S Singh - Cited by 43 - Related articles In the context of asymmetric threats1, the detection of an abnormal situation refers to ... the capabilities of hidden Markov models (HMMs), combined with feature-aided ... that our method is able to detect the modeled pattern of an asymmetric threat with ... Performance analysis shows that the detection of HMMs improves with ...