DocumentCode
442126
Title
Hostile plan recognition and opposition
Author
Gu, Wen-xiang ; Cao, Chun-Jing ; Guan, Wei-zhou
Author_Institution
Dept. of Comput., Northeast Normal Univ., Changchun, China
Volume
7
fYear
2005
fDate
18-21 Aug. 2005
Firstpage
4420
Abstract
First, several new conceptions are proposed, such as hostile action, relative hostile action, absolute hostile action, hostile planning and so on. Then, a deep research is done on the hostile plan recognition system that is composed mainly of five parts including hostile plan library, action vector analysis system, agent action library, agent action record library and hostile plan comparator. The structure and feature of the hostile plan recognition system is fully described. Based on this, an algorithm is applied for recognizing hostile planning. In section 3, a further study is made on the problem that how to oppose hostile planning. Firstly, a detailed description of what is hostile action resolution and what is its premise as well as how to resolve hostile action is given. Secondly, the system architecture of the opposition planner and the structural graph of the opposition tree are presented. Lastly, on the basis of researching on both oppositional planning and opposition planner, an algorithm with its analysis for opposing hostile planning has been conceived of. The research is of great significance for network safety and even national security. It will be extensively useful in many areas, like information security, business strategy, contest robot, game role design and etc.
Keywords
pattern recognition; planning (artificial intelligence); security of data; software agents; trees (mathematics); action vector analysis system; agent action library; agent action record library; business strategy; contest robot; game role design; hostile action; hostile plan comparator; hostile plan library; hostile plan recognition; information security; national security; network safety; opposition planning; opposition tree; structural graph; system architecture; Algorithm design and analysis; Computer networks; Information security; Libraries; Military aircraft; National security; Radar; Robots; Safety; Tree graphs; absolute hostile action; hostile action; hostile planning; opposition action; oppositional planning; relative hostile action;
fLanguage
English
Publisher
ieee
Conference_Titel
Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on
Conference_Location
Guangzhou, China
Print_ISBN
0-7803-9091-1
Type
conf
DOI
10.1109/ICMLC.2005.1527717
Filename
1527717
Link To Document