Maritime Threat Detection using Plan Recognition
|
|
|
- Cornelia O’Connor’
- 9 years ago
- Views:
Transcription
1 Maritime Threat Detection using Plan Recognition Bryan Auslander 1, Kalyan Moy Gupta 1, & David W. Aha 2 1 Knexus Research Corp.; 163 Waterfront Street; National Harbor, MD Navy Center for Applied Research in Artificial Intelligence; Naval Research Laboratory, Code 5514; 4555 Overlook Ave. SW; Washington, DC [email protected] [email protected] Abstract. Existing algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and/or rule-based. Unfortunately, they can be limited in their ability to model the subtlety and complexity of multiple vessel types and their spatio-temporal events, yet their representation is needed to accurately detect anomalies in maritime scenarios. To address these limitations, we apply plan recognition algorithms for maritime anomaly detection. In particular, we examine hierarchical task network (HTN) and case-based algorithms for plan recognition, which detect anomalies by generating expected behaviors for use as a basis for threat detection. We compare their performance with a behavior recognition algorithm on simulated riverine maritime traffic. On a set of simulated maritime scenarios, these plan recognition algorithms outperformed the behavior recognition algorithm, except for one reactive behavior task in which the inverse occurred. Furthermore, our case-based plan recognizer outperformed our HTN algorithm. On the short-term reactive planning scenarios, the plan recognition algorithms outperformed the behavior recognition algorithm on routine plan following. However, they are significantly outperformed on the anomalous scenarios. I. INTRODUCTION Early detection and neutralization of threats from small boats is a critical requirement for the US Navy. Detection of small boat threats is particularly challenging in busy ports, harbors and riverine areas because they operate in close proximity to large but much less maneuverable vessels. Various approaches for automated threat and anomaly detection have been developed to address this problem. For example, perimeter breach detection algorithms (e.g., [1][2]) trigger an alarm when a distance threshold is crossed. However, these can lead to numerous false alarms and unacceptable operating requirements in narrow traffic lanes. To address this problem, we recently showed that some behavior-based threat detection algorithms, based on probabilistic graphical models, can outperform perimeter breach algorithms [3]. However, perimeter and behavior-based approaches rely on learning normalcy models that predominately focus on low level activities, but cannot detect anomalies that require knowledge of planned routes and schedules. In this paper, we apply plan recognition algorithms to continuously monitor activities and identify the plans of maritime vessels in advance of any threat occurrence. We assume that, given a plan, we can identify its unique goal, and conjecture that identifying goals could help to detect threatening and anomalous situations earlier and more accurately. Also, the alerts that are generated by plan recognition algorithms are better suited for explaining threats than are opaque and non-intuitive statistical models. Plan recognition algorithms have been used for a variety of tasks, such as detection of anomalous situation in an assisted care facility [4] and detection of terrorist threats [5]. However, they have rarely been applied to maritime threat recognition, and not empirically compared with conventional behavior recognition algorithms for threat detection. We address these issues as follows. We apply two plan recognition algorithms; the first uses hierarchical task networks (HTNs), while the other uses case-based planning. These algorithms apply consistency-based plan recognition techniques [6]. We apply them to four simulated maritime scenarios and compare their performance versus a Markov logic network (MLN) algorithm, a probabilistic behavior recognizer that performed well in our prior studies on maritime threat detection [3]. Our results show that the plan recognition algorithms outperform this probabilistic behavior recognizer for scenarios involving longer-term plans. However, the results on scenarios with reactive plans involving anomaly situations are mixed. We structure the remainder of this paper as follows. We provide an overview of plan recognition approaches followed by a detailed description of HTN and case-based approaches. We then describe our empirical evaluation and results. Finally, we conclude with a discussion and issues for future research. II. PLAN RECOGNITION OVERVIEW Plan recognition is the task of inferring plan(s) of an intelligent agent by observing the agent s actions or the effects of those actions. It involves mapping a temporal sequence of observed actions to some plan representation that identifies the plan s goal and the relation of actions among the plan s components [7]. Plan recognition algorithms can be categorized into consistency-based and probabilistic approaches [8]. The former include hypothesize and revise algorithms, version space techniques, and other closed-world reasoning algorithms, while probabilistic algorithms include those that use stochastic grammars and probabilistic relational models. The maritime environment is a continuous, nondeterministic domain, making it challenging to apply any plan recognition approach. As a first attempt, we consider only consistency-based approaches. III. MARITIME PLAN RECOGNITION We develop consistency-based plan recognition algorithms for the maritime domain as follows (see Figure 1). We assume
2 Report Documentation Page Form Approved OMB No Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE NOV REPORT TYPE 3. DATES COVERED to TITLE AND SUBTITLE Maritime Threat Detection using Plan Recognition 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Knexus Research Corp,163 Waterfront Street,National Harbor,MD, PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 11. SPONSOR/MONITOR S REPORT NUMBER(S) 13. SUPPLEMENTARY NOTES Proceedings of the Twelfth Annual IEEE Conference on Technologies for Homeland Security, Nov 2012, Greater Boston, MA, pp U.S. Government or Federal Rights License 14. ABSTRACT Existing algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and/or rule-based. Unfortunately, they can be limited in their ability to model the subtlety and complexity of multiple vessel types and their spatio-temporal events, yet their representation is needed to accurately detect anomalies in maritime scenarios. To address these limitations, we apply plan recognition algorithms for maritime anomaly detection. In particular, we examine hierarchical task network (HTN) and case-based algorithms for plan recognition, which detect anomalies by generating expected behaviors for use as a basis for threat detection. We compare their performance with a behavior recognition algorithm on simulated riverine maritime traffic. On a set of simulated maritime scenarios, these plan recognition algorithms outperformed the behavior recognition algorithm, except for one reactive behavior task in which the inverse occurred. Furthermore, our case-based plan recognizer outperformed our HTN algorithm. On the short-term reactive planning scenarios the plan recognition algorithms outperformed the behavior recognition algorithm on routine plan following. However, they are significantly outperformed on the anomalous scenarios. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Same as Report (SAR) 18. NUMBER OF PAGES 6 19a. NAME OF RESPONSIBLE PERSON
3 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18
4 that an agent controlling a small boat or ferry can sense the environment, maintain beliefs about the world state, and derive a plan (i.e., a series of actions, such as turn, cruise, and ram) to accomplish a given goal (e.g., destroy a Navy vessel). We assume the recognizer has access to a library of plans (e.g., create a terrorist event, catch fish, or ferry passengers). It observes the world state and the actions of the agent to predict the next or some future activity. The recognizer compares the observations resulting from those actions with the observations expected from executing its predicted activity. If these observations are consistent with one or more of the plans from the library, it repeats its inference process. Otherwise, it flags the vessel as a potential threat or anomaly and presents the information to a decision-maker along with an explanation. In the following subsections we describe plan recognition algorithms that use hierarchical task networks (HTN) or case- based reasoning (CBR) methods to implement these steps. Figure 1. Consistency based approach to maritime plan recognition A. HTN Plan Recognition HTN planners operate by recursively decomposing high-level tasks into lower level components. This decomposition process results in a series of low-level actions or primitive tasks, constituting a plan [9]. We adapted an HTN planner for consistency-based plan recognition. We begin by providing the HTN Recognizer with access to all the routine goals or intents that an agent could follow. For each intention, the Recognizer generates a plan comprising a set of activities that the agent would perform if it tried to pursue it. Each plan is a travel path comprising a list of waypoints (i.e., locations the vessel would travel through) together with its expected behavior on the travel segments (i.e., the path between two consecutive waypoints). We characterize an agent s behavior on a travel segment by its speed and the activity label (e.g., cruising, debarking, docking, or ramming). As shown in Figure 1, the Recognizer continuously observes the agent vessel s actions and compares them with the expected actions in all the active (still valid) plans for consistency (see Table 1 for criteria) ). It retains all the consistent plans and discards all inconsistent plans. TABLE 1. CONSISTENCY CHECK CRITERIA Feature Value constraint Vessel-speed Within specified threshold Vessel-track Within specified boundary Bearing-to-waypoint Within specified threshold Bearing-changes Within specified threshold Distance-to-Waypoint Select next waypoint In a dynamic maritime environment, it is necessary to account for plan deviations in the face of unexpected situations. For example, a vessel may temporarily change its course to avoid a collision with another oncoming vessel. To account for such local variations, when the observed and expected activities deviate, the Recognizer replans in an attempt to explain the deviation. First, it updates the active plan based on the current state and evaluates it for consistency. If the consistency check fails, it reattempts to find a consistent plan using a preset number of historical states. If the updated plan remains inconsistent, it is removed from future consistency evaluations. Therefore, at the start of a plan recognition process, the Recognizer experiences its largest computational load as all the plans must be evaluated for consistency. Its search load reduces as inconsistent plans are discarded. By default, if no plan remains consistent then the situation is deemed anomalous. B. Case-Based Planning Case-based reasoning (CBR) is a process for solving problems by retrieving and reusing solutions from problems that are similar to the problem at hand [10]. A CBR system relies on a memory of problem-solution pairs called cases. These cases can be automatically learned from observations or hand- The CBR process engineered, depending on the application. includes an algorithm for case retrieval, which involves case similarity assessment. We adopt CBR for consistency-basefollows. We manually engineered two case bases that cover plan recognition as selected scenarios of interest. The first case base, called the Primary Case Base (PCB), covers the entire travel path of an agent. The second case base, called the Secondary Case Base (SCB), only covers the local variations (e.g., path deviations) to account for collision avoidance among two vessels. The reason for using two case bases is that, unlike the HTN algorithm, which uses a single representation for plans, the CBR algorithm cannot effectively account for unforeseen local deviations from the plan using a single case representation. TABLE 2. PRIMARY CASE REPRESENTATION Feature Description Vessel-Type Type of vessel performing an activity Travel-Path Travel path comprising waypoints. <[location, <Map Each travel segment points to a [speed, activity]>]> hashmap of speed to activity label TABLE 3. SECONDARY CASE REPRESENTATION Feature Description Vessels-(Ref, Approaching) The reference and approaching vessel types Relative-bearing Their relative bearing Primary-case-pointer Pointer to a primary case Speed (Ref, Approaching) The speeds of the two vessels Avoidance-Actions Orderedd list of actions that the reference vessel will execute Tables 2 and 3 display case representations for the PCB and SCB. The vessel type and its travel path features, as defined above for our HTN plan recognizer, are used to represent the PCB cases. In addition to the vessel s speed and its activity
5 label, the case-based algorithm also uses a Boolean feature (not shown in Table 2) to indicate whether the travel segment is the last one of the entire path. The SCB cases are represented by the two vessel types, their relative bearing, a pointer to the primary case, the speeds of the reference and the approaching vessels, and the avoidance actions that the reference vessel executes. The relative bearing feature measures how the two vessels bearings relate, and is calculated as follows: rb x,y =rb x +rb y where rb x is the angle between the velocity vector of vessel x and the vector pointing from vessel x to vessel y. The value of rb x,y ranges from 0 to 360. A value of 0 implies the vessels are moving directly at each other and a value of 360 implies they are moving directly away from each other. because the former leverage additional domain knowledge (i.e., expected paths). 2. Compare the lead-time to recognize a change in activity of the three algorithms. We conjecture that the plan recognizers will outperform the behavior recognizer because they can detect more subtle anomalies (e.g., moving to an unexpected dock). B. Test Scenarios We developed four simulated test scenarios that take place on a model of the Potomac River in Washington, DC. Besides the real docks of National Harbor (NH) and Old Town (OT), we introduce a fictitious dock called Reagan Airport Dock (RAD) to evaluate the impact of long-term goals and intentions. We developed the first two scenarios to examine the performance on long-term intent following, while the others allow us to explore performance on short-term reactive events. The descriptions of these scenarios (see Figure 3) are as follows: 1: NH 3: RAD 2: OT Figure 2. Case-based plan recognition algorithm Plan recognition using the case bases involves two concurrent CBR tasks: waypoint intent recognitionn and collision avoidance recognition (see Figure 2). Waypoint intent recognition proceeds as follows. Given the current state involving an agent vessel v, the best matching case c pcb is retrieved from the PCB and the criteria shown in Table 1 are used to check consistency with c pcb. This is repeated until a consistent case is found or the loop terminates, whereupon v is marked as an anomalous situation (e.g., to report to a user). For the collision avoidance recognition task, if a case c scb matching the current situation is found in the SCB, then the waypoint recognition task is suspended and the collision avoidance task becomes active. This latter task ends when v s behavior becomes inconsistent with c scb s expected avoidance actions or it reaches the next waypoint in c pc cb, at which time control passes back to the waypoint intent recognition task. IV. EVALUATION A. Objectives Our objectives were as follows: 1. Compare the activity labeling performancee of the two plan recognition algorithms against each other and versus a selected behavior recognition algorithm ( see Section 4.D) on simulated long-term and reactive scenarios. Our two plan recognition algorithms should outperform the behavior recognition algorithm on the long-term activities Figure 3. Scenario of two motorboats avoiding a head on collision 1. Routine Ferry (between NH to RAD): In this scenario the ferry travels between NH and RAD each hour. The paths between the two docks are similar until they reach the dock near OT, where they diverge. 2. Non-Routine Ferry (to OT from RAD while ferrying between NH and RAD): This is an anomalous counterpart to scenario #1. When the ferry reaches RAD, instead of returning to NH, it ferries to OT and back. 3. Collision Avoidance: This is a head-on collision avoidance scenario among two motorboats. They follow collision avoidance regulations, turning to starboard to avoid a head-on collision when they approach each other. 4. Traffic Violation: This is an anomalous counterpart to scenario #3, where one of the motorboats intentionally disobeys collision regulations and continues on its path, thereby simulating a potentially dangerous and threatening situation to the other motorboat. We encoded these scenarios in a maritime traffic simulation environment, which we present next. C. Test Environment for Maritime Traffic Simulations We modified a Navy simulation tool, named the Tactical Actions Officer (TAO) Sandbox, to conduct our evaluation. The TAO Sandbox is used to train Tactical Action Officers on deployment and management of Navy assets for anti- [11]. We modified submarine warfare and related missions it
6 as follows: (1) its agents are controlled by our HTN algorithm, and (2) it visually displays the behavior of our plan and behavior recognition algorithms in the Potomac River map. First, we used an HTN planner, namely SHOP2 PDDL+ [12] to generate the plans used by all the simulated agents controlling the vessels in our scenarios (i.e., motorboats and ferries). Among HTN planners, we selected SHOP2 PDDL+ because it can be used to generate behaviors in our continuous planning domain. It uses a wait action to represent durative activities. For our scenarios, we encoded a set of SHOP2 PDDL+ methods (e.g., for ferrying from one dock to another) that allows it to generates plans such that, given a scenario s start state and goal state, the resulting plan can be given to and executed by the TAO Sandbox. To respond to a dynamic situation (e.g., collision avoidance situations), we added an action that can be used to perform conditional planning; it allows an agent to monitor the TAO Sandbox environment for any specified situations and, if matched, triggers a replan. The revised plan s actions are then sent to the TAO Sandbox simulator for execution. Second, we used Google Earth to accurately scale (from pixels to nautical miles) and depict the Potomac River area, including the NH, OT, and RAD ports (see Figure 3). We modeled the waypoints for the four scenarios, their associated ferry schedules, and boat transit speeds by observing actual maritime traffic on the Potomac River. We specified the waypoints by considering the upstream and downstream traffic lanes that are marked with buoys. We added random variations to the scenario instances to simulate realistic maritime conditions and path variations. We included up to four concurrent agent-controlled vessels in a scenario to control for extraneous vessel interactions. Finally, we ran ten instances of each scenario and collected our observations. D. Threat Detection Algorithms We implemented two plan recognition algorithms for comparison with the best-performing behavior recognition algorithm from our previous studies [3]. 1. HTN Plan Recognizer (HTN-PR): This implements the HTN plan recognition algorithm described in Section 3. The Recognizer is connected to and observes the TAO Sandbox environment (e.g., the vessels activities). It uses the same planning model given to SHOP2 PDDL+ (see Section 4.C). Also, for each of the four scenarios, we provide this planner with the set of possible goal states (e.g., ferry passengers to a particular dock). For dynamic situations, the Recognizer periodically replans to mimic the conditional replans that the agent might execute. It uses these to detect anomalies by noticing when the actual and expected actions deviate during a specified time frame (e.g., as in scenario #4, where the agent-controlled motorboat deliberately disregards collision avoidance regulations). 2. CB Plan Recognizer (CB-PR): This implements the casebased plan recognition algorithm described in Section 3. We manually populated the PCB with 4 cases (one per vessel instance) and the SCB with 2 cases (one per motorboat). Also, for dynamic replanning situations, like HTN-PR, if the SCB retrieves a case c scb and the agent does not take any of c scb s actions within a prespecified time, then the activity is marked as anomalous. 3. MLN Behavior Recognizer (MLN-BR): This algorithm is based on our recent work on probabilistic graphical models [3], where we showed that MLNs performed well on maritime threat detection tasks. MLNs combine firstorder logic with a probabilistic interpretation to represent expert domain knowledge [13]. We used Alchemy [14] to implement MLN-BR. It interfaces with the TAO Sandbox to obtain a representation of the world state as a set of first-order logic clauses. MLN-BR performs MAP inference for each agent to recognize its behavior. We encoded knowledge for MLN-BR to identify the following activities: Debarking, Cruising, Docking, and Docked. This knowledge includes five rules that encode discretized values of a vessel s speed, proximity to a dock, and its bearing relative to docks. In addition, to handle the collision avoidance scenarios, we encoded seven more logic rules. These rules involve additional features such as the possibility of head-on collision, and whether the agent is on its intended path to its next waypoint. Finally, the MLN is given a series of rules regarding the vessel type (i.e., motorboat or ferry). For example, the rule: 5!Speed(v,0,t) =>!Action(Docked,v,t) specifies that, if the speed of a vessel v is not 0 at time t, then v is not Docked at time t, and this rule has a weight of 5. Here a weight is a measure of the strength of a constraint for a given world. A world s likelihood is lower if it violates a constraint with a high weight. E. Metrics We used the following measures to compare the algorithms: 1. Activity Labeling Accuracy: This is the number of correctly predicted labels for an event type divided by the total number of that type of event. Our scenarios included the following event labels: Avoiding Collision, Cruising, Debarking, Docked, Docking, and Anomaly. We computed the accuracy for each label type and the accuracy over all the label types. 2. Anomaly Labeling Latency: Each time step during the course of an activity represents an event, which the algorithms label. The ability to label an anomalous activity as soon as it starts is desirable for the algorithms. Therefore, we measure the time elapsed between the onset of an anomaly and the time it takes for an algorithm to correctly detect it. Smaller time lags imply a better performing algorithm. F. Results Table 4 displays the accuracy of three algorithms on our four scenarios. In Scenarios 1 and 2, which pertain to longer-term behaviors, the plan recognition algorithms significantly outperform MLN-BR. For instance, in the Routine Ferry Scenario (#1), HTN-PR and CB-PR recorded higher
7 accuracies than MLN-BR (0.859, vs ). However, the performance difference among the two plan recognition algorithms is small. In Scenario #2, concerning non-routine ferries, HTN-PR and CB-PR again significantly outperform MLN-BR (0.928, vs ), which cannot detect anomalies because it has no knowledge of the intended routes. Furthermore, CB-PR outperforms HTN-PR overall and on anomaly detection for this scenario (0.984 vs ). Performance on the reactive scenarios is mixed. In particular, in Scenario #3, one of the plan recognition algorithms (CB-PR) significantly outperforms the behavior recognizer (MLN-PR) on the avoidance activity (1.0 vs ). However, in Scenario #4, MLN-BR outperforms both the plan recognition algorithms on anomaly detection (0.881, vs ), although the differences were not significant. We believe this occurred because MLN rules generalize better in a reactive situation, a conjecture that we will explore in our future work. CB-PR outperforms HTN-PR in Scenario 4, and predicts all avoidance actions correctly on Scenario 3. TABLE 4. AVERAGE ACCURACY PER ACTIVITY (10 RUNS) Therefore, this supports our first conjecture that these plan recognizers can recognize some longer-term behaviors more accurately than this behavior recognition algorithm. Table 5 displays average anomaly labeling latencies for the anomaly recognition scenarios (i.e., #2, and #4). For longerterm intent violations (Scenario 2), CB-PR substantially outperforms HTN-PR (27 vs. 118 seconds). Thus, CB-PR is a more accurate activity labeler and is also faster at detecting an anomalous situation. In contrast, MLN-BR s time is infinite since it does not detect any anomaly in this scenario. However, it performs much better in the reactive Scenario 4. For instance, it detects collision avoidance anomalies after an average of 10.7 seconds after its onset compared to at least a minute (i.e., 64.7 seconds) for the other algorithms. TABLE 5. ANOMALY LABELING LATENCY (SECONDS) Scenario #2 #4 HTN-PR CB-PR MLN-BR * 10.7 V. DISCUSSION Many methods have been investigated for plan and behavior recognition (e.g., [15][16][17]). They differ along many dimensions, such as their agent relation (e.g., keyhole, intention, adversarial), what they infer (e.g., action, plan, goal), model representation type (e.g., decision theoretic, probabilistic), whether they are generative or discriminative, their model family (e.g., Bayesian, MDP, random field), and how they detect anomalies. These have been applied to a plethora of tasks, such as adversarial strategy detection, user modeling, human activity recognition, and threat detection, which is our focus. However, little published research exists on applying plan recognition techniques for maritime threat recognition, although Nicolescu and her colleagues have studied this topic in recent years, including the application of hidden Markov models (HMMs) and spreading activation techniques for detecting potentially deceptive behavior [18]. Our own related work has most recently focused on applying probabilistic graphical models to synthetic and realworld threat recognition scenarios [3]. We found that Markov logic networks possess some advantages in comparison with HMMs and conditional random fields, though they require substantial care to design and time to train. Our experience with these and simpler approaches for threat recognition [19] led us to consider knowledge-intensive plan recognition approaches that can provide additional constraints to the prediction task. From our prior work and this investigation, our observation is that plan recognition algorithms can be preferable to behavior recognition algorithms in scenarios with longer-term anomalies that are detectable using background knowledge, though the inverse can be true for reactive scenarios. This suggests that a hybrid approach may be useful for maritime threat detection, which we will investigate as part of our future research. VI. CONCLUSION Existing algorithms for anomaly and threat detection predominantly use statistical normalcy models. Although these are somewhat successful in thwarting short-term reactive changes, they cannot detect subtle but critical violations in routine plans. To address this issue, we developed plan recognition algorithms to detect longer-term and reactive violations of expected vessel behaviors in a simulated maritime environment. In particular, we developed two consistency-based plan recognition algorithms based on HTN and case-based techniques. We evaluated them on a set of four scenarios and found evidence that they significantly outperform a behavior recognition algorithm on longer-term plan recognition tasks. To our knowledge, this is the first published evaluation of plan recognition algorithms for maritime threat detection
8 tasks. This is an initial study; further research is needed to better understand the pros and cons of these algorithms. For example, our evaluation was limited in the types of scenarios and the number of concurrent agents active in a scenario. In our future work, we will extend our evaluation to scenarios of coordinated small boat attacks, denser traffic conditions, and schedule violations to investigate the generality of our approach. Also, although we considered stochastic variations in our scenarios, they were limited and our consistency-based approaches were not stochastic. Therefore, we will examine probabilistic approaches to plan recognition in our future research. Finally, we assumed that a library of HTN plans is available to our system at the outset. However, in practice, they will need to be acquired from subject matter experts or learned from observations. We plan to explore other hierarchical and case-based learning algorithms to automatically acquire such models (e.g., [20][21]). ACKNOWLEDGMENT We thank the Office of Naval Research for funding this research. REFERENCES [1] Lipton, A.J., Heartwell, C.H., Haering, N., & Madden, D. (2002). Critical asset protection, perimeter monitoring, and threat detection using automated video surveillance. In Proceedings of the Thirty-Sixth Annual International Carnahan Conference on Security Technology. Atlantic City, NJ: IEEE Press. [2] RemoteReality (2011). OmniAlert360. Retrieved on 20 November 2011 from [ [3] Auslander, B., Gupta, K.M., & Aha, D.W. (2012). Maritime threat detection using probabilistic graphical models. In Proceedings of the Twenty-Fifth International FLAIRS Conference. Marco Island, FL: AAAI Press. [4] Cook, D.J., Augusto, J.C., & Jakkula, V.R. (2009). Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing, 5, [5] Jarvis, P.A., Lunt, T.F., & Myers, K.L. (2004). Identifying terrorist activity with AI recognition technology. Proceedings of the Nineteenth National Conference on Artificial Intelligence (pp ). San Jose, CA: AAAI Press. [6] Genesereth, M.R. (1984). The use of design descriptions in automated diagnosis. Artificial Intelligence, 24, [7] Schmidt, C.F., Sridharan, N.S., & Goodson, J.L. (1979). The plan recognition problem: An intersection of artificial intelligence and psychology, Artificial Intelligence, 10(1), [8] Kautz, H. (1987). A formal theory of plan recognition. Doctoral Dissertation: Department of Computer Science, University of Rochester, NY. [9] Nau, D., Au, T.-C., Ilghami, O., Kuter, U., Murdock, J.W., Wu, D., & Yaman, F. (2003). SHOP2: An HTN planning system. Journal of Artificial Intelligence Research, 20, [10] Aamodt, A., & Plaza, E. (1994). Case-based reasoning: Foundational issues, methodological variations, and system approaches. AI Communications, 7, [11] Auslander, B., Molineaux, M., Aha, D.W., Munro, A., & Pizzini, Q. (2009). Towards research on goal reasoning with the TAO Sandbox. (Technical Note AIC ). Washington, DC: Naval Research Laboratory, Navy Center for Applied Research on Artificial Intelligence. [12] Molineaux, M., Klenk, M., & Aha, D.W. (2010). Planning in dynamic environments: Extending HTNs with nonlinear continuous effects. In Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence. Atlanta, GA: AAAI Press. [13] Domingos, P., & Lowd, D. (2009). Markov logic: An interface layer for AI. Morgan & Claypool. [14] Alchemy (2011). Alchemy Open source AI. [ [15] Kautz, H., & Allen, J.F. (1986). Generalized plan recognition. Proceedings of the Fifth National Conference on Artificial Intelligence (pp ). Philadelphia, PA: AAAI Press. [16] Ramirez, M., & Geffner, H. (2009). Plan recognition as planning. Proceedings Twenty First International Conference on Artificial Intelligence (pp ). Pasadena, CA: AAAI Press. [17] Goldman, R.P., Geib, C.W., Kautz, H., & Asfour, T. (Eds.) (2011). Plan recognition (Report from Dagstuhl Seminar 11141). [drops.dagstuhl.de/opus/volltexte/2011/3195/pdf/dagrep_v001_i004_p0 01_s11141.pdf] [18] Nicolescu, M., Nicolescu, M., & Louis, S. (2012). Context-based intent understanding for autonomous systems in naval and collaborative robotics applications. Presentation at the ONR Cognitive Science and Human Robot Interaction Program Review, June [19] Auslander, B., Gupta, K.M., & Aha, D.W. (2011). Comparative evaluation of anomaly detection algorithms for local maritime video surveillance. In Proceedings of the Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X. Orlando, FL: SPIE. [20] Geib, C.W., & Goldman, R.P. (2009). A probabilistic plan recognition algorithm based on plan tree grammars. Artificial Intelligence, 173(11), [21] Kerkez, B. & Cox, M T Incremental case-based plan recognition with local predictions. International Journal on Artificial Intelligence Tools: Architectures, languages, algorithms, 12(4),
Asset Management- Acquisitions
Indefinite Delivery, Indefinite Quantity (IDIQ) contracts used for these services: al, Activity & Master Plans; Land Use Analysis; Anti- Terrorism, Circulation & Space Management Studies; Encroachment
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation 21-23 June 2005, at US Military Academy, West Point, NY 712CD For office use only 41205 Please complete this form 712CD as your cover
Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett
Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President
DEFENSE CONTRACT AUDIT AGENCY
DEFENSE CONTRACT AUDIT AGENCY Fundamental Building Blocks for an Acceptable Accounting System Presented by Sue Reynaga DCAA Branch Manager San Diego Branch Office August 24, 2011 Report Documentation Page
Report Documentation Page
(c)2002 American Institute Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the
Driver of Innovation Through Intelligent Systems Research CONTACT
Driver of Innovation Through Intelligent Systems Research CONTACT Kalyan Moy Gupta, PhD, President 163 Waterfront St., Suite 440, National Harbor, MD 20745 855.569.7373 x700 [email protected]
Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management
Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management James W. Bilbro JB Consulting International Huntsville, AL Multi-dimensional Assessment of Technology Maturity Technology
Overview Presented by: Boyd L. Summers
Overview Presented by: Boyd L. Summers Systems & Software Technology Conference SSTC May 19 th, 2011 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
Mr. Steve Mayer, PMP, P.E. McClellan Remediation Program Manger Air Force Real Property Agency. May 11, 2011
Mr. Steve Mayer, PMP, P.E. McClellan Remediation Program Manger Air Force Real Property Agency May 11, 2011 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
Multiple Network Marketing coordination Model
REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216 A Consistent Approach for Security Risk Assessments of Dams and Related Critical Infrastructure J. Darrell Morgeson Jason A. Dechant Yev Kirpichevsky
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
In June 1998 the Joint Military Intelligence. Intelligence Education for Joint Warfighting A. DENIS CLIFT
Defense Intelligence Analysis Center, home of JMIC. Intelligence Education for Joint Warfighting Courtesy Joint Military Intelligence College By A. DENIS CLIFT In June 1998 the Joint Military Intelligence
Service Adaptation Recommender in the Event Marketplace: Conceptual View
6th International Workshop on Semantic Business Process Management Service Adaptation Recommender in the Event Marketplace: Conceptual View Yiannis Verginadis Ioannis Patiniotakis Nikos Papageorgiou Roland
MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS
MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS E. E. Eilertson*, L. Ertoz, and V. Kumar Army High Performance Computing Research Center Minneapolis, MN 55414 K. S. Long U.S. Army Research Laboratory
A Cognitive Approach to Vision for a Mobile Robot
A Cognitive Approach to Vision for a Mobile Robot D. Paul Benjamin Christopher Funk Pace University, 1 Pace Plaza, New York, New York 10038, 212-346-1012 [email protected] Damian Lyons Fordham University,
RT 24 - Architecture, Modeling & Simulation, and Software Design
RT 24 - Architecture, Modeling & Simulation, and Software Design Dennis Barnabe, Department of Defense Michael zur Muehlen & Anne Carrigy, Stevens Institute of Technology Drew Hamilton, Auburn University
EAD Expected Annual Flood Damage Computation
US Army Corps of Engineers Hydrologic Engineering Center Generalized Computer Program EAD Expected Annual Flood Damage Computation User's Manual March 1989 Original: June 1977 Revised: August 1979, February
Addressing the Real-World Challenges in the Development of Propulsion IVHM Technology Experiment (PITEX)
NASA/CR 2005-213422 AIAA 2004 6361 Addressing the Real-World Challenges in the Development of Propulsion IVHM Technology Experiment (PITEX) William A. Maul, Amy Chicatelli, and Christopher E. Fulton Analex
FIRST IMPRESSION EXPERIMENT REPORT (FIER)
THE MNE7 OBJECTIVE 3.4 CYBER SITUATIONAL AWARENESS LOE FIRST IMPRESSION EXPERIMENT REPORT (FIER) 1. Introduction The Finnish Defence Forces Concept Development & Experimentation Centre (FDF CD&E Centre)
Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center
Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center Technical Report - Final Award Number N00014-03-1-0844 Mod.
DCAA and the Small Business Innovative Research (SBIR) Program
Defense Contract Audit Agency (DCAA) DCAA and the Small Business Innovative Research (SBIR) Program Judice Smith and Chang Ford DCAA/Financial Liaison Advisors NAVAIR 2010 Small Business Aviation Technology
Integrated Force Method Solution to Indeterminate Structural Mechanics Problems
NASA/TP 2004-207430 Integrated Force Method Solution to Indeterminate Structural Mechanics Problems Surya N. Patnaik Ohio Aerospace Institute, Brook Park, Ohio Dale A. Hopkins and Gary R. Halford Glenn
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Dr. Gary S. E. Lagerloef Earth and Space Research, 1910 Fairview Ave E
Establishing a NOAA Operational Data Center for Surface Currents Derived from Satellite Altimeters and Scatterometers; Pilot Study for the Tropical Pacific Including the Hawaiian Islands and US Territorial
An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation
NASA/TM 2005-213568 An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation Steve Bauman Glenn Research Center, Cleveland, Ohio March 2005 The NASA STI Program Office... in Profile
THE FLATWORLD SIMULATION CONTROL ARCHITECTURE (FSCA): A FRAMEWORK FOR SCALABLE IMMERSIVE VISUALIZATION SYSTEMS
THE FLATWORLD SIMULATION CONTROL ARCHITECTURE (FSCA): A FRAMEWORK FOR SCALABLE IMMERSIVE VISUALIZATION SYSTEMS Anton Treskunov, Jarrell Pair*, and Bill Swartout Institute for Creative Technologies University
Learning is a very general term denoting the way in which agents:
What is learning? Learning is a very general term denoting the way in which agents: Acquire and organize knowledge (by building, modifying and organizing internal representations of some external reality);
ELECTRONIC HEALTH RECORDS. Fiscal Year 2013 Expenditure Plan Lacks Key Information Needed to Inform Future Funding Decisions
United States Government Accountability Office Report to Congressional July 2014 ELECTRONIC HEALTH RECORDS Fiscal Year 2013 Expenditure Plan Lacks Key Information Needed to Inform Future Funding Decisions
Cognitive and Organizational Challenges of Big Data in Cyber Defense
Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory [email protected], [email protected] The cognitive and organizational
John Mathieson US Air Force (WR ALC) Systems & Software Technology Conference Salt Lake City, Utah 19 May 2011
John Mathieson US Air Force (WR ALC) Systems & Software Technology Conference Salt Lake City, Utah 19 May 2011 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the
Microstructural Evaluation of KM4 and SR3 Samples Subjected to Various Heat Treatments
NASA/TM 2004-213140 Microstructural Evaluation of KM4 and SR3 Samples Subjected to Various Heat Treatments David Ellis and Timothy Gabb Glenn Research Center, Cleveland, Ohio Anita Garg University of Toledo,
PROBLEM STATEMENT: Will reducing the ASD for Kadena AB F-15 C/Ds increase the CPFH for this Mission Design Series (MDS)?
CONSULTING REPORT Kadena F-15 C/D Cost per Flying Hour Analysis PROJECT MANAGERS: Capt Jeremy Howe and Capt Kevin Dawson AFLMA PROJECT NUMBER: LM200520700 16 August 2005 BACKGROUND: Kadena AB is currently
THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP
THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP By Dr. Carl M. Powe, Jr. 2-3 March 2005 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
Guide to Using DoD PKI Certificates in Outlook 2000
Report Number: C4-017R-01 Guide to Using DoD PKI Certificates in Outlook 2000 Security Evaluation Group Author: Margaret Salter Updated: April 6, 2001 Version 1.0 National Security Agency 9800 Savage Rd.
Simulation of Air Flow Through a Test Chamber
Simulation of Air Flow Through a Test Chamber by Gregory K. Ovrebo ARL-MR- 0680 December 2007 Approved for public release; distribution unlimited. NOTICES Disclaimers The findings in this report are not
Doctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
Graduate Level Credit for Resident EWS Students. Natasha McEachin CG 1
Graduate Level Credit for Resident EWS Students Natasha McEachin CG 1 February 20, 2009 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
An Application of an Iterative Approach to DoD Software Migration Planning
An Application of an Iterative Approach to DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith September 2002 Product Line Practice Initiative Unlimited distribution subject to the copyright.
NAVSUP FLC NORFOLK PHILADELPHIA OFFICE
NAVSUP FLC NORFOLK PHILADELPHIA OFFICE Gerald Furey Deputy for Small Business Ready. Resourceful. Responsive! 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the
MODELING AND PREDICTION OF HUMAN DRIVER BEHAVIOR
MODELING AND PREDICTION OF HUMAN DRIVER BEHAVIOR Andrew Liu and Dario Salvucci* MIT Man Vehicle Laboratory, Rm 37-219, 77 Massachusetts Ave., Cambridge, MA 02139 *Nissan Cambridge Basic Research, 4 Cambridge
A GPS Digital Phased Array Antenna and Receiver
A GPS Digital Phased Array Antenna and Receiver Dr. Alison Brown, Randy Silva; NAVSYS Corporation ABSTRACT NAVSYS High Gain Advanced GPS Receiver (HAGR) uses a digital beam-steering antenna array to enable
Headquarters U.S. Air Force
Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Air Force Technology Readiness Assessment (TRA) Process for Major Defense Acquisition Programs LtCol Ed Masterson Mr
A STAB at Making Sense of VAST Data
Adams, S. & Goel, A. (2007) A STAB at Making Sense of VAST Data. In Proc. AAAI-2007 Workshop on Plan, Activity, and Intent Recognition, Vancouver, Canada, July 23, 2007, pp. 1-8. A STAB at Making Sense
THE NATIONAL SHIPBUILDING RESEARCH PROGRAM
SHIP PRODUCTION COMMITTEE FACILITIES AND ENVIRONMENTAL EFFECTS SURFACE PREPARATION AND COATINGS DESIGN/PRODUCTION INTEGRATION HUMAN RESOURCE INNOVATION MARINE INDUSTRY STANDARDS WELDING INDUSTRIAL ENGINEERING
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Cyber Security Training and Awareness Through Game Play
Cyber Security Training and Awareness Through Game Play Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, and Thuy D. Nguyen Naval Postgraduate School, Monterey, CA 93943, USA {bdcone,mfthomps,irvine,tdnguyen}@nps.edu
AFRL-RX-WP-TP-2008-4023
AFRL-RX-WP-TP-2008-4023 HOW KILLDEER MOUNTAIN MANUFACTURING IS OPTIMIZING AEROSPACE SUPPLY CHAIN VISIBILITY USING RFID (Postprint) Jeanne Duckett Killdeer Mountain Manufacturing, Inc. FEBRUARY 2008 Final
UMass at TREC 2008 Blog Distillation Task
UMass at TREC 2008 Blog Distillation Task Jangwon Seo and W. Bruce Croft Center for Intelligent Information Retrieval University of Massachusetts, Amherst Abstract This paper presents the work done for
IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND. Ready. Resourceful. Responsive!
~ IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND Ready. Resourceful. Responsive! Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated
A STRATEGIC PLANNER FOR ROBOT EXCAVATION' by Humberto Romero-Lois, Research Assistant, Department of Civil Engineering
A STRATEGIC PLANNER FOR ROBOT EXCAVATION' by Humberto Romero-Lois, Research Assistant, Department of Civil Engineering Chris Hendrickson, Professor, Department of Civil Engineering, and Irving Oppenheim,
ADVANCED NETWORK SECURITY PROJECT
AFRL-IF-RS-TR-2005-395 Final Technical Report December 2005 ADVANCED NETWORK SECURITY PROJECT Indiana University APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AIR FORCE RESEARCH LABORATORY INFORMATION
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: [email protected]
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Procedure for Marine Traffic Simulation with AIS Data
http://www.transnav.eu the International Journal on Marine Navigation and Safety of Sea Transportation Volume 9 Number 1 March 2015 DOI: 10.12716/1001.09.01.07 Procedure for Marine Traffic Simulation with
Cell Phone based Activity Detection using Markov Logic Network
Cell Phone based Activity Detection using Markov Logic Network Somdeb Sarkhel [email protected] 1 Introduction Mobile devices are becoming increasingly sophisticated and the latest generation of smart
REPORT DOCUMENTATION PAGE *
REPORT DOCUMENTATION PAGE * Form Approved OMBNo. 07040188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
CNFSAT: Predictive Models, Dimensional Reduction, and Phase Transition
CNFSAT: Predictive Models, Dimensional Reduction, and Phase Transition Neil P. Slagle College of Computing Georgia Institute of Technology Atlanta, GA [email protected] Abstract CNFSAT embodies the P
A Limited Objective Experiment on Wireless Peer-To-Peer Collaborative Networking
A Limited Objective Experiment on Wireless Peer-To-Peer Collaborative Networking Dr. Alex Bordetsky LCDR Glenn R. Cook Dr. Bill Kemple LCDR Timothy Thate Naval Postgraduate School Department of Information
Goal-Driven Adaptable Software Architecture for UAVs
SEAS DTC Annual Technical Conference 2008 Goal-Driven Adaptable Software Architecture for UAVs William Heaven, Daniel Sykes, Jeff Magee, Jeff Kramer SER001 Imperial College London The Challenge Autonomous
CERT Virtual Flow Collection and Analysis
CERT Virtual Flow Collection and Analysis For Training and Simulation George Warnagiris 2011 Carnegie Mellon University Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
An Architecture for Autonomic Web Service Process Planning
An Architecture for Autonomic Web Service Process Planning Colm Moore and Ming Xue Wang and Claus Pahl Dublin City University, School of Computing, Dublin 9, Ireland [email protected], [mwang
California PATH, University of California at Berkeley, Building 452, Richmond Field Station 1357 South 46 th Street, Richmond, CA 94804
1. Report No. CA14-2146B 2. Government Accession No. 3. Recipient s Catalog No. 4. Title and Subtitle Executive Summary for the UC Berkeley, California PATH s Augmented Speed Enforcement Project 5. Report
Technology WHITE PAPER
Technology WHITE PAPER What We Do Neota Logic builds software with which the knowledge of experts can be delivered in an operationally useful form as applications embedded in business systems or consulted
DEFENSE BUSINESS PRACTICE IMPLEMENTATION BOARD
Defense Business Practice Implementation Board DEFENSE BUSINESS PRACTICE IMPLEMENTATION BOARD Report to the Senior Executive Council, Department of Defense MANAGEMENT INFORMATION TASK GROUP Report FY02-3
Interagency National Security Knowledge and Skills in the Department of Defense
INSTITUTE FOR DEFENSE ANALYSES Interagency National Security Knowledge and Skills in the Department of Defense June 2014 Approved for public release; distribution is unlimited. IDA Document D-5204 Log:
A Framework of Context-Sensitive Visualization for User-Centered Interactive Systems
Proceedings of 10 th International Conference on User Modeling, pp423-427 Edinburgh, UK, July 24-29, 2005. Springer-Verlag Berlin Heidelberg 2005 A Framework of Context-Sensitive Visualization for User-Centered
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Master of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina
Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures
PREPARED FOR: U.S. Army Medical Research and Materiel Command Fort Detrick, Maryland 21702-5012
AD Award Number: W81XWH-10-1-0957 TITLE: PRINCIPAL INVESTIGATOR: Andrea L. Behrman, Ph.D., P.T. CONTRACTING ORGANIZATION: University of Florida Gainesville, FL 32611 REPORT DATE: October 2011 TYPE OF REPORT:
Non-Autoclave (Prepreg) Manufacturing Technology
Non-Autoclave (Prepreg) Manufacturing Technology Gary G. Bond, John M. Griffith, Gail L. Hahn The Boeing Company Chris Bongiovanni, Jack Boyd Cytec Engineered Materials 9 September 2008 Report Documentation
DRIVER ATTRIBUTES AND REAR-END CRASH INVOLVEMENT PROPENSITY
U.S. Department of Transportation National Highway Traffic Safety Administration DOT HS 809 540 March 2003 Technical Report DRIVER ATTRIBUTES AND REAR-END CRASH INVOLVEMENT PROPENSITY Published By: National
CCTV - Video Analytics for Traffic Management
CCTV - Video Analytics for Traffic Management Index Purpose Description Relevance for Large Scale Events Technologies Impacts Integration potential Implementation Best Cases and Examples 1 of 12 Purpose
Cancellation of Nongroup Health Insurance Policies
Cancellation of Nongroup Health Insurance Policies Bernadette Fernandez Specialist in Health Care Financing Annie L. Mach Analyst in Health Care Financing November 19, 2013 Congressional Research Service
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
TITLE: The Impact Of Prostate Cancer Treatment-Related Symptoms On Low-Income Latino Couples
AD Award Number: W81WH-07-1-0069 TITLE: The Impact Of Prostate Cancer Treatment-Related Symptoms On Low-Income Latino Couples PRINCIPAL INVESTIGATOR: Sally L. Maliski, Ph.D., R.N. CONTRACTING ORGANIZATION:
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
Agenda. Interface Agents. Interface Agents
Agenda Marcelo G. Armentano Problem Overview Interface Agents Probabilistic approach Monitoring user actions Model of the application Model of user intentions Example Summary ISISTAN Research Institute
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Data Integration Alternatives Managing Value and Quality
Solutions for Customer Intelligence, Communications and Care. Data Integration Alternatives Managing Value and Quality Using a Governed Approach to Incorporating Data Quality Services Within the Data Integration
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
