• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于隐马尔可夫模型的实时威胁评估。

Real-time threat assessment based on hidden Markov models.

作者信息

Theodosiadou Ourania, Chatzakou Despoina, Tsikrika Theodora, Vrochidis Stefanos, Kompatsiaris Ioannis

机构信息

Information Technologies Institute, Centre for Research and Technology Hellas, Thessaloniki, Greece.

出版信息

Risk Anal. 2023 Oct;43(10):2069-2081. doi: 10.1111/risa.14105. Epub 2023 Feb 1.

DOI:10.1111/risa.14105
PMID:36724896
Abstract

An essential factor toward ensuring the security of individuals and critical infrastructures is the timely detection of potentially threatening situations. To this end, especially in the law enforcement context, the availability of effective and efficient threat assessment mechanisms for identifying and eventually preventing crime- and terrorism-related threatening situations is of utmost importance. Toward this direction, this work proposes a hidden Markov model-based threat assessment framework for effectively and efficiently assessing threats in specific situations, such as public events. Specifically, a probabilistic approach is adopted to estimate the threat level of a situation at each point in time. The proposed approach also permits the reflection of the dynamic evolution of a threat over time by considering that the estimation of the threat level at a given time is affected by past observations. This estimation of the dynamic evolution of the threat is very useful, since it can support the decisions by security personnel regarding the taking of precautionary measures in case the threat level seems to adopt an upward trajectory, even before it reaches the highest level. In addition, its probabilistic basis allows for taking into account noisy data. The applicability of the proposed framework is showcased in a use case that focuses on the identification of potential threats in public events on the basis of evidence obtained from the automatic visual analysis of the footage of surveillance cameras.

摘要

确保个人和关键基础设施安全的一个关键因素是及时发现潜在威胁情况。为此,特别是在执法背景下,拥有有效且高效的威胁评估机制以识别并最终预防与犯罪和恐怖主义相关的威胁情况至关重要。朝着这个方向,这项工作提出了一个基于隐马尔可夫模型的威胁评估框架,用于在诸如公共活动等特定情况下有效且高效地评估威胁。具体而言,采用概率方法来估计每个时间点的情况威胁级别。所提出的方法还通过考虑给定时间的威胁级别估计受过去观察结果的影响,允许反映威胁随时间的动态演变。这种对威胁动态演变的估计非常有用,因为即使在威胁级别尚未达到最高水平之前,当威胁级别似乎呈上升趋势时,它可以支持安全人员做出关于采取预防措施的决策。此外,其概率基础允许考虑有噪声的数据。在所提出的框架的适用性在一个用例中得到了展示,该用例基于从监控摄像机画面的自动视觉分析中获得的证据,专注于识别公共活动中的潜在威胁。

相似文献

1
Real-time threat assessment based on hidden Markov models.基于隐马尔可夫模型的实时威胁评估。
Risk Anal. 2023 Oct;43(10):2069-2081. doi: 10.1111/risa.14105. Epub 2023 Feb 1.
2
An Adaptive, Situation-Based Risk Assessment and Security Enforcement Framework for the Maritime Sector.基于自适应情景的海上领域风险评估与安全实施框架
Sensors (Basel). 2021 Dec 29;22(1):238. doi: 10.3390/s22010238.
3
Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas.在流行地区,服用抗叶酸抗疟药物的人群中,叶酸补充剂与疟疾易感性和严重程度的关系。
Cochrane Database Syst Rev. 2022 Feb 1;2(2022):CD014217. doi: 10.1002/14651858.CD014217.
4
On the Effectiveness of Security Countermeasures for Critical Infrastructures.论关键基础设施安全对策的有效性
Risk Anal. 2016 Apr;36(4):711-26. doi: 10.1111/risa.12318. Epub 2014 Dec 9.
5
Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems.基于数据驱动的威胁分析,确保云环境系统的安全。
Sensors (Basel). 2022 Jul 30;22(15):5726. doi: 10.3390/s22155726.
6
Trajectory classification using switched dynamical hidden Markov models.基于切换动态隐马尔可夫模型的轨迹分类。
IEEE Trans Image Process. 2010 May;19(5):1338-48. doi: 10.1109/TIP.2009.2039664. Epub 2009 Dec 31.
7
Security threat assessment of an Internet security system using attack tree and vague sets.基于攻击树和模糊集的互联网安全系统安全威胁评估
ScientificWorldJournal. 2014;2014:506714. doi: 10.1155/2014/506714. Epub 2014 Oct 21.
8
A data-driven approach for a class of stochastic dynamic optimization problems.一种针对一类随机动态优化问题的数据驱动方法。
Comput Optim Appl. 2021;80(3):687-729. doi: 10.1007/s10589-021-00320-4. Epub 2021 Sep 28.
9
Fighting trafficking of falsified and substandard medicinal products in Russia.打击俄罗斯假药和劣药的非法交易。
Int J Risk Saf Med. 2015;27 Suppl 1:S37-40. doi: 10.3233/JRS-150681.
10
The effectiveness of mindfulness based programs in reducing stress experienced by nurses in adult hospital settings: a systematic review of quantitative evidence protocol.基于正念的项目在减轻成人医院环境中护士所经历压力方面的有效性:定量证据协议的系统评价
JBI Database System Rev Implement Rep. 2015 Oct;13(10):21-9. doi: 10.11124/jbisrir-2015-2380.