2005
DOI: 10.21236/ada463701
|View full text |Cite
|
Sign up to set email alerts
|

Intent Driven Adversarial Modeling

Abstract: Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. AbstractModern elements of military intelligence and decision making require predictions of adversary force actions and reactions to provide a complete and realistic viewpoint. Current methods for providing realistic adversary f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Adversarial intent is an important component in threat assessment and a challenge research area. Using Bayesian networks, Gilmour et al 17 proposed a model of adversarial intent to describe the influence of an adversary's beliefs on behavior and the possible relationships between an adversary's goals and the actions chosen to realize those goals. To predict an enemy's tactical intention, Johansson and Falkman 18,19 explored a Bayesian approach based on protection values, target type, weapon type, distance, and direction.…”
Section: Modeling Situation and Threat Assessment In C2mentioning
confidence: 99%
“…Adversarial intent is an important component in threat assessment and a challenge research area. Using Bayesian networks, Gilmour et al 17 proposed a model of adversarial intent to describe the influence of an adversary's beliefs on behavior and the possible relationships between an adversary's goals and the actions chosen to realize those goals. To predict an enemy's tactical intention, Johansson and Falkman 18,19 explored a Bayesian approach based on protection values, target type, weapon type, distance, and direction.…”
Section: Modeling Situation and Threat Assessment In C2mentioning
confidence: 99%
“…Such activities may include predicting and evaluating enemy courses of action (eCOAs) [5,4], competing against arbitrary opponents in adversarial gaming environments such as robotic soccer [8], protecting computer networks against everchanging malicious attacks [9], and finding appropriate partners to cooperate with-as well as those to avoid-when forming coalitions [14,13]. Increasingly, such activities are being examined in the context of dynamic multi-agent systems (MASs), where the state of the world is changing as the agents operate.…”
Section: Introductionmentioning
confidence: 99%
“…Other efforts have considered real-time competitions in the context of simulated markets [22,15] and robotic software [8,20]. Similarly, there is current research in adversarial modeling to support military mission planning [5,4] and coalition formation [14,13]. But AChess is the first research environment that combines real-time decision making and adversarial reasoning in a problem domain that allows researchers to focus on just these core issues.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation