A concept for characterizing, predicting and recognizing threat situations is developed. The goal is to establish a systematic approach to automation of some of these functions. Approaches are discussed to address the fundamental problems of (a) sparse and ambiguous indicators of potential or actualized threat activity buried in massive background data; and (b) uncertainty in threat capabilities, intent and opportunities.


  1. Bennett M, Waltz E (2007) Counterdeception principles and applications for national security. Artech House, Boston, MAGoogle Scholar
  2. Boyd JR (1976) Destruction and creation. U.S. Army Command and General Staff College, 3 Sept 1976Google Scholar
  3. de Becker G (1997) The gift of fear (and other survival signals that protect us from violence). Dell Publishing, New YorkGoogle Scholar
  4. Endsley MR (2000) Theoretical underpinnings of Situation Awareness: a critical review. In: Situation awareness analysis and measurement. Lawrence Erlbaum Associates Inc., Mahwah, NJGoogle Scholar
  5. Garcia J, Snidaro L, Visentini I (2012) Exploiting context as binding element for multi-level data fusion. Proc., Fifteenth international conference on informationGoogle Scholar
  6. Kahneman D (2011) Thinking, fast and slow. Farrar, Straus and Giroux, New YorkGoogle Scholar
  7. Kschischang FR, Frey BJ, Loeliger HA (2001) Factor graph and the sum-product algorithm. IEEE Trans Inf Theory 47:498–519CrossRefMathSciNetMATHGoogle Scholar
  8. Lambert DA (2006) A unification of sensor and higher-level fusion. Proc. 9th international conference on information fusionGoogle Scholar
  9. Little EG, Rogova GL (2006) An ontological analysis of threat and vulnerability. Proc. Ninth international conference on information fusion, FlorenceGoogle Scholar
  10. McMichael D, Jarrad G (2005). Grammatical methods for situation and threat analysis. Proc. Eighth international conference on information fusion, Philadelphia, June 2005Google Scholar
  11. Moore KE (2005) Predictive Analysis for Naval Deployment Activities (PANDA), briefing to industry: PANDA Overview, 16 Sept 2005Google Scholar
  12. Nolte WL, Kennedy BC, Dziegiel Jr RJ (2003) Technology readiness level calculator. NDIA Systems Engineering Conf., 20 Oct 2003Google Scholar
  13. Rogova G, Nimier V (2004) Reliability in information fusion: literature survey. Proc. Seventh international conference on information fusion, StockholmGoogle Scholar
  14. Rogova GL, Steinberg AN (2015) Formalization of ‘Context’ for information fusion. Context Enhanced Information Fusion. SpringerGoogle Scholar
  15. Salerno JJ (2007) Where’s level 2/3 fusion—a look back over the past 10 years. Proc. Tenth International Conference on Information Fusion, QuebecGoogle Scholar
  16. Snidaro L, Garcia J, Llinas J (2015) Context-based information fusion: a survey and discussion. Inf Fusion 25:16–31CrossRefGoogle Scholar
  17. Steinberg AN (2005) An approach to threat assessment. Proc., Eighth international conference on information fusion, PhiladelphiaGoogle Scholar
  18. Steinberg AN (2009) Foundations of situation and threat assessment. In: Liggins ME, Hall DL, Llinas J (eds) Chapter 18 of Handbook of multisensor data fusion. CRC Press, LondonGoogle Scholar
  19. Steinberg AN (2013) Situation management for counter-piracy. In: Prediction and recognition of piracy efforts using collaborative human-centric information systems. Ios Press, AmsterdamGoogle Scholar
  20. Steinberg AN (2014) Threat assessment with technical intelligence applications. Proc. CogSIMA, San Antonio, TX, Mar 2014Google Scholar
  21. Steinberg AN (2015) Levels? Proc. 18th international conference on information fusion, WashingtonGoogle Scholar
  22. Steinberg AN (2015) Situations and contexts. ISIF Perspectives on Information Fusion (Perspectives), Vol 1(1)Google Scholar
  23. Steinberg AN, Bowman CL (2009) Revisions to the JDL data fusion model. In: Liggins ME, Hall DL, Llinas J (eds) Chapter 3 of Handbook of multisensor data fusion. CRC Press, LondonGoogle Scholar
  24. Steinberg AN, Bowman CL, Blasch E, Morefield C, Morefield M, Haith G (2014) Adaptive context assessment and context management, Proc., Seventeenth International Conference on Information Fusion, Salamanca, Spain, 2014Google Scholar
  25. Steinberg AN, Rogova GL (2015) System-level use of contextual information. In: Snidaro L, Garcia J, Llinas J, Blasch E (eds) Context-enhanced information fusion. Springer, BerlinGoogle Scholar
  26. Waltz E (2003) Knowledge management in the intelligence enterprise. Artech House, Boston, MAGoogle Scholar
  27. Wessen RR, Adler M, Leising CJ, Sherwood B (2010) Measuring the maturity of robotic planetary mission concepts II. SpaceOps 2010 Conference, Hosted by NASA Mars, Huntsville, Alabama, 25–30 Apr 2010Google Scholar
  28. Whaley B (1969) Strategem: deception and surprise in war. Center for International Studies, MIT, Cambridge, MAGoogle Scholar
  29. White FE (1988) A model for data fusion. Proc. First national symposium on sensor fusion, GACIAC, IIT Research Institute, ChicagoGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Independent ConsultantLake RidgeUSA

Personalised recommendations