1 |
A. Steinberg, "An Approach to Threat Assessment," In Proc. of the International Conference on Information Fusion, Vol.2, pp.1256-1263, 2005.
|
2 |
X. Nguyen, "Threat Assessment in Tactical Airborne Environments," In Proc. of the International Conference on Information Fusion, Vol.2, pp.1300-1307, 2002.
|
3 |
E. Waltz, Multisensor Data Fusion, Artech House, 1990.
|
4 |
J. Roy, S. Paradis, and M. Allouche, "Threat Evaluation for Impact Assessment in Situation Analysis Systems," In Proc. of the Signal Processing, Sensor Fusion, and Target Recognition XI, Vol.4729, pp.329-341, 2002.
|
5 |
G. Wang, L. Guo, and H. Duan, "Wavelet Neural Network using Multiple Wavelet Functions in Target Threat Assessment," The Scientific World Journal, Vol.2013, Article ID.632437, pp.1-7, 2013.
|
6 |
F. Johansson and G. Falkman, "A Bayesian Network Approach to Threat Evaluation with Application to an Air Defense Scenario," In Proc. of the International Conference on Information Fusion, pp.1-7, 2008.
|
7 |
N. Okello and G. Thoms, "Threat Assessment using Bayesian Networks," In Proc. of the International Conference on Information Fusion, pp.1102-1109, 2003.
|
8 |
Y. Hou, W. Guo, and Z. Zhu, "Threat Assessment based on Variable Parameter Dynamic Bayesian Network," In Proc. of the Chinese Control Conference, pp.1230-1235, 2010.
|
9 |
Y. Liang, "A Fuzzy Knowledge based System in Situation and Threat Assessment," Journal of Systems Science & Information, Vol.4, No.4, pp.791-802, 2006.
|
10 |
E. Azimirad and J. Haddadnia, "Target Threat Assessment using Fuzzy Sets Theory," International Journal of Advances in Intelligent Informatics, Vol.1, No.2, pp.57-74, 2015.
DOI
|
11 |
E. Azimirad and J. Haddadnia, "A New Data Fusion Instrument for Threat Evaluation Using of Fuzzy Sets Theory," International Journal of Computer Science and Information Security, Vol.13, No.4, pp.19-32, 2015.
|
12 |
http://www.mathworks.com, 2018.6.27.
|
13 |
S. Paradis, A. Benaskeur, M. Oxenham, and P. Cutler, "Threat Evaluation and Weapons Allocation in Network-Centric Warfare," In Proc. of the International Conference on Information Fusion, Vol.2, pp.1078-1085, 2005.
|
14 |
J. Roux and J. Vuuren, "Threat Evaluation and Weapon Assignment Decision Support: A Review of the State of the Art," ORiON, Vol.23, No.2, pp.151-187, 2007.
|
15 |
M. Azak and A. Bayrak, "A New Approach for Threat Evaluation and Weapon Assignment Problem, Hybrid Learning with Multi-Agent Coordination," In Proc. of the International Symposium on Computer and Information Sciences, pp.1-6, 2008.
|
16 |
E. Azimirad and J. Haddadnia, "A Modified Model for Threat Assessment by Fuzzy Logic Approach," International Journal of Computer Science and Information Security, Vol.13, No.4, pp.12-18, 2015.
|
17 |
M. Riveiro, T. Helldin, M. Lebram, and G. Falkman, "Towards Future Threat Evaluation Systems: User Study, Proposal and Precepts for Design," In Proc. of the International Conference on Fusion, pp.1863-1870, 2013.
|
18 |
T. Jan, "Neural Network Based Threat Assessment for Automated Visual Surveillance," In Proc. of the International Joint Conference on Neural Network, pp.1309-1312, 2004.
|