TY - GEN
T1 - Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations
AU - Banks, B.
AU - Jackson, G.
AU - Helly, J.
AU - Chin, D.
AU - Smith, T. J.
AU - Schmidt, A.
AU - Brewer, P.
AU - Medd, R.
AU - Masters, D.
AU - Burger, A.
AU - Krebs, W. K.
PY - 2007
Y1 - 2007
N2 - The objective of this research is to identify, develop, adapt, prototype, integrate and demonstrate open access force protection and security technologies and processes. The goal is to provide more open public access to recreational and other non-restricted facilities on military bases and to improve the overall base safety and security utilizing advanced video and signal based surveillance. A testbed was created at the Pacific Missile Range Facility (PMRF), Kauai, Hawaii to demonstrate novel and innovative security solutions that serve these objectives. The testbed consists of (1) novel sensors (video cameras, radio frequency identification tags, and seismic, lidar, microwave, and infrared sensors), (2) a computer, data storage, and network infrastructure, and (3) behavior analysis software. The behavior analysis software identifies patterns of behavior and discriminates "normal" and "anomalous" behavior in order to anticipate and predict threats so that they can be interdicted before they impact mission critical operations or cause harm to people and infrastructure.
AB - The objective of this research is to identify, develop, adapt, prototype, integrate and demonstrate open access force protection and security technologies and processes. The goal is to provide more open public access to recreational and other non-restricted facilities on military bases and to improve the overall base safety and security utilizing advanced video and signal based surveillance. A testbed was created at the Pacific Missile Range Facility (PMRF), Kauai, Hawaii to demonstrate novel and innovative security solutions that serve these objectives. The testbed consists of (1) novel sensors (video cameras, radio frequency identification tags, and seismic, lidar, microwave, and infrared sensors), (2) a computer, data storage, and network infrastructure, and (3) behavior analysis software. The behavior analysis software identifies patterns of behavior and discriminates "normal" and "anomalous" behavior in order to anticipate and predict threats so that they can be interdicted before they impact mission critical operations or cause harm to people and infrastructure.
UR - http://www.scopus.com/inward/record.url?scp=44849097840&partnerID=8YFLogxK
U2 - 10.1109/AVSS.2007.4425328
DO - 10.1109/AVSS.2007.4425328
M3 - Conference contribution
AN - SCOPUS:44849097840
SN - 9781424416967
T3 - 2007 IEEE Conference on Advanced Video and Signal Based Surveillance, AVSS 2007 Proceedings
SP - 307
EP - 312
BT - 2007 IEEE Conference on Advanced Video and Signal Based Surveillance, AVSS 2007 Proceedings
T2 - 2007 IEEE Conference on Advanced Video and Signal Based Surveillance, AVSS 2007
Y2 - 5 September 2007 through 7 September 2007
ER -