References
- S. Paradis, A. Benaskeur, M. Oxenham and P. Cutler, "Threat Evaluation and Weapons Allocation in Network-Centric Warfare," Proc. 8th International Conference on Information Fusion, 2005.
- F. Johansson and G. Falkman, "A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario," Proc. 5th International Conference on Information Fusion, 2002.
- J. N. Roux and J. H. Van Vuuren, "Threat Evaluation and Weapon Assignment Decision Support: A Review of the State of the Art," ORiON: The Journal of ORRSA, Vol. 23, No. 2, pp. 151-187, 2007.
- D. H. Hong, J. H. Yoo, S. C. Shin, S. H. Kim and Y. W. Park, "A Threat Evaluation Method on the Air Track in Short Range Air Defense Systems," Proc. Fall Conference on Korean Institute of Communication and Information Sciences, pp. 414-415, 2011.
- Y. Liang, "An Approximate Reasoning Model for Situation and Threat Assessment," Proc. 4th International Conference on Fuzzy Systems and Knowledge Discovery, Vol. 4, pp. 246-250, 2007.
- A. X. Dong and L. G. Qing, "Application of Neural Network in the Field of Target Threat Evaluation," Proc. International Joint Conference on Neural Network, Vol. 6, pp. 4237-4240, 1999.
- M. Azak and A. E. Bayrak, "A New Approach for Threat Evaluation and Weapon Assignment Problem, Hybrid Learning with Multi-Agent Coordination," Proc. 23rd International Symposium on Computer and Information Sciences, pp. 1-6, 2008.
- N. Okello, & G. Thoms, "Threat Assessment using Bayesian Networks," Proc. 6th International Conference on Information Fusion, pp. 1102-1109, 2003.
- M. J. Liebhaber and B. Feher, "Air Threat Assessment: Research, Model, and Display Guidelines," Space and Naval Warfare Systems Command, San Diego, CA, 2002.
- X. T. Nguyen, "Threat Assessment in Tactical Airborne Environments," Proc. 15th International Conference on Information Fusion, Vol. 2, pp. 1300-1307, 2002.
- J. Roy, S. Paradis and M. Allouche, "Threat Evaluation for Impact Assessment in Situation Analysis Systems," Proc. SPIE: Signal Processing, Sensor Fusion, and Target Recognition XI, Vol. 4729, pp. 329-341, 2002.
- L. A. Zadeh, "Fuzzy Sets," Information and Control, Vol. 8, No. 3, pp. 338-353, 1965. https://doi.org/10.1016/S0019-9958(65)90241-X
- Andries P. Engelbrecht, "Computational Intelligence: an Introduction," John Wiley & Sons, Inc. England, pp. 211-238, 2007.
- B. J. Choi, J. E. Kim, J. K. Jung and C. O. Kim, "Non-centroid Clustering using Flights Adjacent Distances for Efficient Threat Evaluation," Proc. Spring Conference on Korean Institute of Industrial Engineers, pp. 175-181, 2015.