Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations

B. Banks, G. Jackson, J. Helly, D. Chin, T. J. Smith, A. Schmidt, P. Brewer, R. Medd, D. Masters, A. Burger, W. K. Krebs

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The objective of this research is to identify, develop, adapt, prototype, integrate and demonstrate open access force protection and security technologies and processes. The goal is to provide more open public access to recreational and other non-restricted facilities on military bases and to improve the overall base safety and security utilizing advanced video and signal based surveillance. A testbed was created at the Pacific Missile Range Facility (PMRF), Kauai, Hawaii to demonstrate novel and innovative security solutions that serve these objectives. The testbed consists of (1) novel sensors (video cameras, radio frequency identification tags, and seismic, lidar, microwave, and infrared sensors), (2) a computer, data storage, and network infrastructure, and (3) behavior analysis software. The behavior analysis software identifies patterns of behavior and discriminates "normal" and "anomalous" behavior in order to anticipate and predict threats so that they can be interdicted before they impact mission critical operations or cause harm to people and infrastructure.

Original languageEnglish
Title of host publication2007 IEEE Conference on Advanced Video and Signal Based Surveillance, AVSS 2007 Proceedings
Pages307-312
Number of pages6
DOIs
StatePublished - 2007
Externally publishedYes
Event2007 IEEE Conference on Advanced Video and Signal Based Surveillance, AVSS 2007 - London, United Kingdom
Duration: Sep 5 2007Sep 7 2007

Publication series

Name2007 IEEE Conference on Advanced Video and Signal Based Surveillance, AVSS 2007 Proceedings

Conference

Conference2007 IEEE Conference on Advanced Video and Signal Based Surveillance, AVSS 2007
Country/TerritoryUnited Kingdom
CityLondon
Period09/5/0709/7/07

Fingerprint

Dive into the research topics of 'Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations'. Together they form a unique fingerprint.

Cite this