2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications最新文献

筛选
英文 中文
An optimisation model for airlift load planning: Galahad and the quest for the ‘holy grail’ 空运负荷规划的优化模型:加拉哈德和对“圣杯”的追求
Bohdan L. Kaluzny, R. H. A. D. Shaw, A. Ghanmi, Beomjoon Kim
{"title":"An optimisation model for airlift load planning: Galahad and the quest for the ‘holy grail’","authors":"Bohdan L. Kaluzny, R. H. A. D. Shaw, A. Ghanmi, Beomjoon Kim","doi":"10.1109/CISDA.2009.5356562","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356562","url":null,"abstract":"This paper presents an aircraft load allocation optimisation model, which uses a hybrid of simulated annealing and genetic algorithm methods to solve a multi-objective optimisation problem associated with allocating a set of cargo items across a heterogeneous fleet of available airlift assets. It represents candidate solutions using macrochromosomes comprised of an ordered list of available transport assets followed by an ordered list of cargo items. A bin packing heuristic is used to map each individual to a point in asset-utilization space where a novel convex hull based fitness function is used to evaluate the relative quality of each individual and drive an elitist application of genetic operators on the population-including a novel extinction operation that infrequently culls solutions comprising of aircraft chalks that cannot be load balanced. Proof of concept computational results are presented.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"46 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79117895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Testing harbour patrol and interception policies using particle-swarm-based learning of cooperative behavior 使用基于粒子群的合作行为学习测试港口巡逻和拦截策略
T. Flanagan, C. Thornton, J. Denzinger
{"title":"Testing harbour patrol and interception policies using particle-swarm-based learning of cooperative behavior","authors":"T. Flanagan, C. Thornton, J. Denzinger","doi":"10.1109/CISDA.2009.5356561","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356561","url":null,"abstract":"We present a general scheme for testing multiagent systems, respectively policies used by them, for unwanted emergent behavior using learning of cooperative behavior via particle swarm systems. By using particle swarm systems in this setting, we are able to create agents interacting/attacking the tested agents that can use parameterised high-level actions. We also can evaluate the quality of an attack using several measures that can be prioritised and used in a multi-objective manner in the search. This solves some general problems of other testing approaches using learning. We instantiate this general scheme to test harbour patrol and interception policies for two Canadian harbours, showing that our approach is able to find problems in these policies.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"74 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88955616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Information assurances and threat identification in networked organizations 网络组织中的信息保障与威胁识别
Terrill L. Frantz, Kathleen M. Carley
{"title":"Information assurances and threat identification in networked organizations","authors":"Terrill L. Frantz, Kathleen M. Carley","doi":"10.1109/CISDA.2009.5356532","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356532","url":null,"abstract":"We present a brief report on a controlled experiment that provides valuable statistics to network-oriented defence analysts involved in threat identification. These statistics estimate the accuracy of the top-central actor findings that have been derived from relational data classically found in real-world datasets, such as those collected on distributed, covert organizations. Our experiment involved cellular social-networks with four types of data error: missing links, missing actors, extra links, and extra actors. We provide statistical results for top threat identification from the perspective of four traditional measures of network centrality: degree, betweenness, closeness and eigenvector. The results from our experiment provide a statistical estimate of the accuracy of the top-1 and top-3 actors as indicated by the observed data. Using these statistics a quantitative indication of reliability can be provided along with defence intelligence estimates of covert-organization leadership derived from relational network data. We provide lookup tables for the specific situations created for this experiment, from which other conditions may be loosely estimated. This work has highly practical implications for operational analysts and consumers of such analyses, particularly in the terrorist network and drug-trafficking domains. This work also lays the groundwork for developing more intricate estimates of reliability for other network-related, analytic tasks of analysts — from more extensive key-actor identification tasks to assessing the statistical reliability of the centrality measures in and of themselves.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"24 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77827768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
mTRACK - Monitoring time-varying relations in approximately categorised knowledge 监测近似分类知识的时变关系
T. Martin, Yun Shen
{"title":"mTRACK - Monitoring time-varying relations in approximately categorised knowledge","authors":"T. Martin, Yun Shen","doi":"10.1109/CISDA.2009.5356563","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356563","url":null,"abstract":"Recent initiatives in defence related information systems have emphasised the need to bring together information from multiple sources and fuse it into a form suitable for decision makers. This paper outlines a four stage system for fusing unstructured and semi-structured text and numerical data by extraction of entities and relations, identification of duplicate entities, organisation into the most appropriate hierarchical categories and determination of relations between fuzzy categories. The novel contribution of this paper is in the final stage of the process, where we determine associations between fuzzy categories and identify strong and/or unusual levels of association as well as changes over time. A demonstrator application shows how information on terrorist incidents from multiple sources can be integrated and monitored.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"3 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89045655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multisensor-multitarget tracking testbed 多传感器-多目标跟踪试验台
D. Akselrod, R. Tharmarasa, T. Kirubarajan, Z. Ding, T. Ponsford
{"title":"Multisensor-multitarget tracking testbed","authors":"D. Akselrod, R. Tharmarasa, T. Kirubarajan, Z. Ding, T. Ponsford","doi":"10.1109/CISDA.2009.5356526","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356526","url":null,"abstract":"In this paper we present a multisensor-multitarget tracking testbed for large-scale distributed scenarios. The objective is to develop a testbed capable of handling multiple, heterogeneous sensors in a hierarchical architecture for maritime surveillance. The testbed consists of a scenario generator that can generate simulated data from multiple sensors including radar, sonar, IR and ESM as well as a tracker framework into which different tracking algorithms can be integrated. In the current stage of the project, the IMM/Assignment tracker, and the Particle Filter (PF) tracker are implemented in a distributed architecture and some preliminary results are obtained. Other trackers like the Multiple Hypothesis Tracker (MHT) are also planned for the future.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86589504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Passive multitarget tracking using transmitters of opportunity 利用机会发射器进行被动多目标跟踪
R. Tharmarasa, T. Kirubarajan, M. McDonald
{"title":"Passive multitarget tracking using transmitters of opportunity","authors":"R. Tharmarasa, T. Kirubarajan, M. McDonald","doi":"10.1109/CISDA.2009.5356536","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356536","url":null,"abstract":"Passive Coherent Location (PCL), which uses commercial signals (e.g., FM broadcast, digital TV) as illuminators of opportunity, is an emerging technology in air defense systems. The advantages of PCL are low cost, low vulnerability to electronic counter measures, early detection of stealthy targets and low-altitude detection. However, limitations of PCL include lack of control over illuminators, limited observability and poor detection due to low Signal-to-Noise Ratio (SNR). This leads to high clutter with low probability of detection of target of interest. In this paper, multiple target tracking algorithms for PCL systems are analyzed to handle low probability of detection and high nonlinearity in the measurement model due to high measurement error. The converted measurement Kalman filter, unscented Kalman filter and particle filter based PHD filter are implemented and compared for PCL radar systems. The feasibility of using transmitters of opportunity for tracking airborne targets is shown on simulated and real data sets.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"91 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74207011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Bio-inspired computing for launch vehicle design and trajectory optimization 运载火箭设计与轨迹优化的仿生计算
S. Sundaram, Hai-Jun Rong, N. Sundararajan
{"title":"Bio-inspired computing for launch vehicle design and trajectory optimization","authors":"S. Sundaram, Hai-Jun Rong, N. Sundararajan","doi":"10.1109/CISDA.2009.5356548","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356548","url":null,"abstract":"This paper presents an optimization tool for launch vehicle design and trajectory optimization using bio-inspired computing algorithms and nonlinear programming. The objective is to size a launch vehicle such that the payload to lift-of-weight ratio is maximized (i.e the lift off weight is a minimum). Here, the staging problem is solved using Particle Swarm Optimization (PSO) method. With the above vehicle, an optimal trajectory is arrived at using a Real-Coded Genetic Algorithm (RCGA) and solving a nonlinear programming (NLP) by the direct shooting method. The solutions from PSO and RCGA are used for initialization of NLP variables. A case study is carried out that establishes the advantage of the proposed approach.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"30 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85645536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection 异常检测中HMM参数在线增量学习技术的比较
Wael Khreich, Eric Granger, A. Miri, R. Sabourin
{"title":"A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection","authors":"Wael Khreich, Eric Granger, A. Miri, R. Sabourin","doi":"10.1109/CISDA.2009.5356542","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356542","url":null,"abstract":"Hidden Markov Models (HMMs) have been shown to provide a high level performance for detecting anomalies in intrusion detection systems. Since incomplete training data is always employed in practice, and environments being monitored are susceptible to changes, a system for anomaly detection should update its HMM parameters in response to new training data from the environment. Several techniques have been proposed in literature for on-line learning of HMM parameters. However, the theoretical convergence of these algorithms is based on an infinite stream of data for optimal performances. When learning sequences with a finite length, on-line incremental versions of these algorithms can improve discrimination by allowing for convergence over several training iterations. In this paper, the performance of these techniques is compared for learning new sequences of training data in host-based intrusion detection. The discrimination of HMMs trained with different techniques is assessed from data corresponding to sequences of system calls to the operating system kernel. In addition, the resource requirements are assessed through an analysis of time and memory complexity. Results suggest that the techniques for online incremental learning of HMM parameters can provide a higher level of discrimination than those for on-line learning, yet require significantly fewer resources than with batch training. On-line incremental learning techniques may provide a promising solution for adaptive intrusion detection systems.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"4 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79547493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Joint path planning and sensor subset selection for multistatic sensor networks 多静态传感器网络的联合路径规划与传感器子集选择
R. Tharmarasa, T. Kirubarajan, T. Lang
{"title":"Joint path planning and sensor subset selection for multistatic sensor networks","authors":"R. Tharmarasa, T. Kirubarajan, T. Lang","doi":"10.1117/12.779217","DOIUrl":"https://doi.org/10.1117/12.779217","url":null,"abstract":"Since inexpensive passive sensors have become available, it is possible to deploy a large number of them for tracking purposes in Anti-Submarine Warfare (ASW). However, modern submarines are quiet and difficult to track with passive sensors alone. Multistatic sensor networks, which have few transmitters (e.g., dipping sonars) in addition to passive receivers (e.g., sonobouys), have the potential to improve the tracking performance. The performance can be improved further by moving the transmitters according to existing target states and any possible new target states. Even though a large number of passive sensors are available, due to frequency, processing power and other physical limitations, only a few of them can be used at any one time. Then the problems are to decide the path of the transmitters and select a subset from the available passive sensors in order to optimize the tracking performance. In this paper, the Posterior Crame´r-Rao Lower Bound (PCRLB), which gives a lower bound on estimation uncertainty, is used as the performance measure. An algorithm is presented to decide jointly the optimal path of the movable transmitters, by considering transmitters' operational constraints, and the optimal subset of passive sensors that should be used at each time steps for tracking multiple, possibly time-varying, number of targets. The effect of sensor location uncertainties, due to deployment error and possible sensor drifting, on the tracking performance is addressed in the sensor management algorithm. Simulation results illustrating the performance of the proposed algorithm are presented.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"3 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2008-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80859280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Template-based Method for Force Group Classification in Situation Assessment 态势评估中基于模板的部队群分类方法
Huimin Chai, Baoshu Wang
{"title":"A Template-based Method for Force Group Classification in Situation Assessment","authors":"Huimin Chai, Baoshu Wang","doi":"10.1109/CISDA.2007.368139","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368139","url":null,"abstract":"","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"61 1","pages":"85-91"},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81123198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信