Hidden Markov Models and Bayesian Networks for Counter-Terrorism

نویسندگان

  • Krishna R. Pattipati
  • Peter Willett
  • Jefferey Allanach
  • Haiying Tu
  • Satnam Singh
چکیده

Introduction Information concerning the potential whereabouts and activities of terrorists can be extrapolated from the massive amount of intelligence reported daily to US intelligence agencies. The events encapsulated in these reports, and, in particular, the sequence of these events, can be used to probabilistically infer the activities of terrorists. In this chapter, we are particularly interested in those events which pose a threat to our national security. Our purpose is, therefore, to detect and track likely instances of terrorist activities by analyzing the sources of data, which contain partial and/or imperfect information about the identities of actors involved and their actions. Throughout the chapter, we will refer to these types of data as “transactions.” The most evident example – and likely the greatest source of information – is financial. Say, for example:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Introduction to Hidden Markov Models and Bayesian Networks

We provide a tutorial on learning and inference in hidden Markov models in the context of the recent literature on Bayesian networks. This perspective makes it possible to consider novel generalizations of hidden Markov models with multiple hidden state variables, multiscale representations, and mixed discrete and continuous variables. Although exact inference in these generalizations is usuall...

متن کامل

Inverse Problems in Imaging Systems and the General Bayesian Inversion Frawework

In this paper, first a great number of inverse problems which arise in instrumentation, in computer imaging systems and in computer vision are presented. Then a common general forward modeling for them is given and the corresponding inversion problem is presented. Then, after showing the inadequacy of the classical analytical and least square methods for these ill posed inverse problems, a Baye...

متن کامل

A Bayesian Networks Approach to Reliability Analysis of a Launch Vehicle Liquid Propellant Engine

This paper presents an extension of Bayesian networks (BN) applied to reliability analysis of an open gas generator cycle Liquid propellant engine (OGLE) of launch vehicles. There are several methods for system reliability analysis such as RBD, FTA, FMEA, Markov Chains, and etc. But for complex systems such as LV, they are not all efficiently applicable due to failure dependencies between compo...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006