### Skapa referens, olika format (klipp och klistra)

**Harvard**

Granström, K., Willett, P. och Bar-Shalom, Y. (2016) *Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis*.

** BibTeX **

@article{

Granström2016,

author={Granström, Karl and Willett, P. and Bar-Shalom, Y.},

title={Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis},

journal={Ieee Transactions on Signal Processing},

issn={1053-587X},

volume={64},

issue={10},

pages={2587-2601},

abstract={There is good reason to model an asymmetric threat (a structured action such as a terrorist attack) as an HMM whose observations are cluttered. Within this context, this paper presents two important contributions. The first is a Bernoulli filter that can process cluttered observations and is capable of detecting whether there is an HMM present, and if so, estimate the state of the HMM. The second is an analysis of the problem that, for a given HMM model, is able to make statements regarding the minimum complexity that an HMM would need to involve in order that it be detectable with reasonable fidelity, as well as upper bounds on the level of clutter (expected number of false measurements) and probability of miss of a relevant observation. In a simulation study, the Bernoulli filter is shown to give good performance provided that the probability of observation is larger than the probability of an irrelevant clutter observation. Further, the results show that the longer the delays are between the HMM state transitions, the larger the probability margin must be. The feasibility prediction shows that it is possible to predict the boundary between poor performance and good performance for the Bernoulli filter, i.e., it is possible to predict when the Bernoulli filter will be useful, and when it will not be.},

year={2016},

keywords={Target tracking, asymmetric threat, Bernoulli filter, hidden Markov model},

}

** RefWorks **

RT Journal Article

SR Electronic

ID 237862

A1 Granström, Karl

A1 Willett, P.

A1 Bar-Shalom, Y.

T1 Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis

YR 2016

JF Ieee Transactions on Signal Processing

SN 1053-587X

VO 64

IS 10

SP 2587

OP 2601

AB There is good reason to model an asymmetric threat (a structured action such as a terrorist attack) as an HMM whose observations are cluttered. Within this context, this paper presents two important contributions. The first is a Bernoulli filter that can process cluttered observations and is capable of detecting whether there is an HMM present, and if so, estimate the state of the HMM. The second is an analysis of the problem that, for a given HMM model, is able to make statements regarding the minimum complexity that an HMM would need to involve in order that it be detectable with reasonable fidelity, as well as upper bounds on the level of clutter (expected number of false measurements) and probability of miss of a relevant observation. In a simulation study, the Bernoulli filter is shown to give good performance provided that the probability of observation is larger than the probability of an irrelevant clutter observation. Further, the results show that the longer the delays are between the HMM state transitions, the larger the probability margin must be. The feasibility prediction shows that it is possible to predict the boundary between poor performance and good performance for the Bernoulli filter, i.e., it is possible to predict when the Bernoulli filter will be useful, and when it will not be.

LA eng

DO 10.1109/tsp.2016.2529584

LK http://dx.doi.org/10.1109/tsp.2016.2529584

LK http://publications.lib.chalmers.se/records/fulltext/237862/local_237862.pdf

OL 30