Journal article Open Access

Automatic threat evaluation for border security and surveillance

Bert van den Broek; Jos van der Velde; Michiel van den Baar; Loek Nijsten; Rob van Heijster


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">treat evaluation</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">automation</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">uncertainty</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">border security</subfield>
  </datafield>
  <controlfield tag="005">20200120170731.0</controlfield>
  <controlfield tag="001">3460244</controlfield>
  <datafield tag="711" ind1=" " ind2=" ">
    <subfield code="d">9-12 September</subfield>
    <subfield code="g">SPIE</subfield>
    <subfield code="a">SPIE Defense &amp; Security 2019</subfield>
    <subfield code="c">Strasbourg, France</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">TNO</subfield>
    <subfield code="a">Jos van der Velde</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">TNO</subfield>
    <subfield code="a">Michiel van den Baar</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">TNO</subfield>
    <subfield code="a">Loek Nijsten</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">TNO</subfield>
    <subfield code="a">Rob van Heijster</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">1056510</subfield>
    <subfield code="z">md5:e1c8c396b352efb370bc5d5b42e0c316</subfield>
    <subfield code="u">https://zenodo.org/record/3460244/files/Automatic-threat-evaluation-for-border-security-and-surveillance_SPIE_11166-15.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="y">Conference website</subfield>
    <subfield code="u">https://spie.org/conferences-and-exhibitions/security-and-defence?SSO=1</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2019-09-25</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="p">user-alfa</subfield>
    <subfield code="o">oai:zenodo.org:3460244</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="c">10</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">TNO</subfield>
    <subfield code="a">Bert van den Broek</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Automatic threat evaluation for border security and surveillance</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-alfa</subfield>
  </datafield>
  <datafield tag="536" ind1=" " ind2=" ">
    <subfield code="c">700002</subfield>
    <subfield code="a">Advanced Low Flying Aircrafts Detection and Tracking</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;We present a study of border surveillance systems for automatic threat estimation. The surveillance systems should allow border control operators to be triggered in time so that adequate responses are possible. Examples of threats are smuggling, possibly by using small vessels, cars or drones, and threats caused by unwanted persons (e.g. terrorists) crossing the border. These threats are revealed by indicators which are often not exact and evidence for these indicators incorporates significant amounts of uncertainty. This study is linked to the European Horizon 2020 project ALFA, which focuses on the detection and threat evaluation of low flying objects near the strait of Gibraltar. Several methods are discussed to fuse the indicators while taking the uncertainty into account, including Fuzzy Reasoning, Bayesian Reasoning, and Dempster-Shafer Theory. In particular the Dempster-Shafer Theory is elaborated since this approach incorporates evaluation of unknown information next to uncertainty. The method is based on belief functions representing the indicators. These functions show a gradual increase or decrease of the suspiciousness depending on input parameters such as object speed, size etc. The fusion methods give two output values for each track: a suspect probability and an uncertainty value. The complete dynamic risk assessment of detected flying objects is evaluated by the automatic system and targets with probabilities exceeding a certain threshold and appropriate uncertainty values are presented to the border control operators.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isVersionOf</subfield>
    <subfield code="a">10.5281/zenodo.3460243</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.3460244</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
</record>
132
140
views
downloads
All versions This version
Views 132132
Downloads 140140
Data volume 147.9 MB147.9 MB
Unique views 117117
Unique downloads 129129

Share

Cite as