By Topic

Swarming Pattern Analysis to Identify IED Threat

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Brueckner, S. ; Div. of TTGSI, Vector Res. Center, Ann Arbor, MI, USA ; Brophy, S. ; Downs, E.

At a tactical level, insurgents planning attacks with Improvised Explosive Devices (IEDs) are constrained in their choice of target by the specific location of their safe house or weapons cache, the geographic context in which they operate, and the pattern of potential targets as it presents itself at a given time. Geographic profiling in law-enforcement already takes advantage of similar constraints to identify possible origin locations of serial offenders. We show how geographic profiling of past IED events can significantly enhance our ability to identify areas at risk for future attacks. Specifically, we introduce three tightly coupled swarming pattern analysis models (profiling, clustering, forecasting) that refine each others' conclusions dynamically and point to systematic evaluation experiments that confirm the research hypothesis.

Published in:

Self-Adaptive and Self-Organizing Systems (SASO), 2010 4th IEEE International Conference on

Date of Conference:

Sept. 27 2010-Oct. 1 2010