2004
DOI: 10.1109/mp.2004.1341780
|View full text |Cite
|
Sign up to set email alerts
|

Modeling threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(22 citation statements)
references
References 7 publications
0
21
0
1
Order By: Relevance
“…Firstly, Singh et al, discuss how infrastructures worldwide are facing a very real threat from terrorist activity [178]. Their research focuses on the prediction of threat events from occurring using a semi-automated tool to perform analysis.…”
Section: Existing Behavioural Researchmentioning
confidence: 99%
“…Firstly, Singh et al, discuss how infrastructures worldwide are facing a very real threat from terrorist activity [178]. Their research focuses on the prediction of threat events from occurring using a semi-automated tool to perform analysis.…”
Section: Existing Behavioural Researchmentioning
confidence: 99%
“…The applicability of HMMs for terrorist activity modeling and other national security problem situations has been illustrated in previous work, see e.g. [3,4,5,6,7,8].…”
Section: Introductionmentioning
confidence: 99%
“…A number of different terrorist plan HMMs are proposed in [5,6,7,8], including models for a truck bombing, Fig. 1.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations