메뉴 건너뛰기




Volumn , Issue , 2005, Pages 27-50

Hidden Markov Models and Bayesian Networks for Counter-Terrorism

Author keywords

Bayesian networks (BNs) and hidden Markov models (HMMs); Modeling terrorist activities with HMMs and BNs; Terrorist activity detection and tracking

Indexed keywords


EID: 84889371790     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1002/047178656X.ch2     Document Type: Chapter
Times cited : (3)

References (23)
  • 1
    • 11244253079 scopus 로고    scopus 로고
    • Detecting, tracking, and counteracting terrorist networks via hidden Markov models
    • Proceedings of the IEEE Aerospace Conference, Big Sky, MT
    • Allanach, J., Tu, H., Singh, S., Willett, P., and Pattipati, K. R. (2004). Detecting, tracking, and counteracting terrorist networks via hidden Markov models. Proceedings of the IEEE Aerospace Conference, Big Sky, MT.
    • (2004)
    • Allanach, J.1    Tu, H.2    Singh, S.3    Willett, P.4    Pattipati, K.R.5
  • 3
    • 0003511722 scopus 로고
    • Multitarget-Multisensor Tracking: Principles and Techniques
    • YBS Publications
    • Bar-Shalom, Y., and Li, X. (1995). Multitarget-Multisensor Tracking: Principles and Techniques. YBS Publications.
    • (1995)
    • Bar-Shalom, Y.1    Li, X.2
  • 4
    • 0003937919 scopus 로고
    • Detection of Abrupt Changes
    • Englewood Cliffs, NJ:Prentice Hall
    • Basseville, M., and Nikiforov, L. (1993). Detection of Abrupt Changes, Englewood Cliffs, NJ:Prentice Hall.
    • (1993)
    • Basseville, M.1    Nikiforov, L.2
  • 5
    • 0000353178 scopus 로고
    • A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
    • Baum, L., Petrie, T., Soules, G., and Weiss, N. (1970). A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Annals of Mathematical Statistics 41:164-171.
    • (1970) Annals of Mathematical Statistics , vol.41 , pp. 164-171
    • Baum, L.1    Petrie, T.2    Soules, G.3    Weiss, N.4
  • 7
    • 0003496497 scopus 로고    scopus 로고
    • Design and Analysis of Modern Tracking Systems
    • Boston:Artech House
    • Blackman, S., and Popoli, R. (1999). Design and Analysis of Modern Tracking Systems. Boston:Artech House.
    • (1999)
    • Blackman, S.1    Popoli, R.2
  • 8
    • 0031621837 scopus 로고    scopus 로고
    • Quickest detection of superimposed hidden Markov models using a multiple target tracker
    • In: Proceedings of the IEEE Aerospace Conference, Aspen, CO
    • Chen, B., and Willett, P. (1998). Quickest detection of superimposed hidden Markov models using a multiple target tracker. In: Proceedings of the IEEE Aerospace Conference, Aspen, CO.
    • (1998)
    • Chen, B.1    Willett, P.2
  • 11
    • 84889443412 scopus 로고    scopus 로고
    • Frontline Magazine
    • (India), January-February, Available at
    • Frontline Magazine (India) 17(2), January-February 2000. Available at http://www.frontlineonnet.com/fl1702/17020040.htm.
    • (2000) , vol.17 , Issue.2
  • 14
    • 0001524507 scopus 로고
    • Procedures for reacting to a change in distribution
    • Lorden, G. (1971). Procedures for reacting to a change in distribution. Annals of Mathematical Statistics 42, pp. 1897-1908.
    • (1971) Annals of Mathematical Statistics , vol.42 , pp. 1897-1908
    • Lorden, G.1
  • 15
    • 0030287048 scopus 로고    scopus 로고
    • The expectation-maximization algorithm
    • Moon, T. (1996). The expectation-maximization algorithm, IEEE SP Magazine 13:47-60.
    • (1996) IEEE SP Magazine , vol.13 , pp. 47-60
    • Moon, T.1
  • 16
    • 30444441495 scopus 로고    scopus 로고
    • An introduction to Bayesian networks and their contemporary applications
    • Available
    • Niedermayer, D. (1998). An introduction to Bayesian networks and their contemporary applications. Available: http://www.niedermayer.ca/paper/bayesian/bayes.html.
    • (1998)
    • Niedermayer, D.1
  • 17
    • 0002916530 scopus 로고
    • Continuous inspection schemes
    • Page, E. (1954). Continuous inspection schemes. Biometrical, Volt 41:100-115.
    • (1954) Biometrical, Volt , vol.41 , pp. 100-115
    • Page, E.1
  • 18
    • 1542717782 scopus 로고
    • Jeffrey's rule, passage of experience, and neo-Bayesian
    • In: Knowledge Representation and Defeasible Reasoning, H. E. Kyburg, Jr. (ed.), Boston: Kluwer Academic Publishers
    • Pearl, J. (1990). Jeffrey's rule, passage of experience, and neo-Bayesian. In: Knowledge Representation and Defeasible Reasoning, H. E. Kyburg, Jr. (ed.), pp. 245-265. Boston: Kluwer Academic Publishers.
    • (1990) , pp. 245-265
    • Pearl, J.1
  • 19
    • 0022594196 scopus 로고
    • An introduction to hidden Markov models
    • 4-16. January
    • Rabiner, L., and Juang, B. (1986). An introduction to hidden Markov models. IEEE ASSP Magazine, 4-16. January.
    • (1986) IEEE ASSP Magazine
    • Rabiner, L.1    Juang, B.2
  • 20
    • 84889318678 scopus 로고    scopus 로고
    • A tutorial on inference and learning in Bayesian networks
    • Available
    • Rish, I., and Singh, M. (2000). A tutorial on inference and learning in Bayesian networks. Available:http//www.research.ibm.com/people/r/rish/talks/BN-tutorial.ppt.
    • (2000)
    • Rish, I.1    Singh, M.2
  • 21
    • 0003846920 scopus 로고
    • Sequential Analysis-Tests and Confidence Intervals
    • New York: Springer-Verlag
    • Siegmund, D. (1995). Sequential Analysis-Tests and Confidence Intervals. New York: Springer-Verlag.
    • (1995)
    • Siegmund, D.1
  • 23
    • 0003503387 scopus 로고
    • Sequential Analysis
    • New York: Wiley
    • Wald, A. (1947). Sequential Analysis. New York: Wiley.
    • (1947)
    • Wald, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.