Loading…
Research directions in remote detection of covert tactical adversarial intent of individuals in asymmetric operations
This article designs a first-order road map for modeling research to bridge the scientific gap between observations from physical sensor networks at 3-50 m on the one hand and determination of covert tactical adversarial intent of individuals with deception and in extensive clutter on the other. To...
Saved in:
Main Authors: | , , , , , , , , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 8 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Arnold, G Fullenkamp, A M Bornstein, A Morelli, F Brown, T Iyer, P Lavery, J McElhinny, S Schmeisser, E Strand, M Karakowski, J Scanlon, M Srour, Nino |
description | This article designs a first-order road map for modeling research to bridge the scientific gap between observations from physical sensor networks at 3-50 m on the one hand and determination of covert tactical adversarial intent of individuals with deception and in extensive clutter on the other. To be successful, the research needs to integrate kinesiological, neurophysiological, psychological, and cognitive science, and sociocultural anthropology and information science components. Research and development (R&D) issues that need to be considered include metrics for cognitive phenomena and how well detection systems work, data sets, determining whether actors can provide sufficient verisimilitude to create data sets, and relevant sensing technologies and information fusion techniques. Successful procedures may need to include actively (but unobtrusively) perturbing the situation in which the sensing takes place in order to elicit specific responses. Comprehensive government R&D programs are required to promote rapid progress. |
doi_str_mv | 10.1109/ICIF.2010.5711892 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5711892</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5711892</ieee_id><sourcerecordid>5711892</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-53c240653ac62c6b77295cb84d056287646c745e84ba89501ae774414b2473233</originalsourceid><addsrcrecordid>eNotUNtKAzEQjQ-CWvsB4kt-YGvul0dZrC4UCtL3kk2mGOnuliQt9O-Nbedl5pw5nDkMQi-ULCgl9q1ru-WCkQqlptRYdoeeiDVMCG4ofUDznH9JLamklPoRHb8hg0v-B4eYwJc4jRnHEScYpgI4QLmSeNphP50gFVxcZbzbYxcqzi7FOsexwFj-VXEM8RTD0e0vRi6fhwFKih5PB0jucuEZ3e_qHua3PkOb5cem_WpW68-ufV810ZLSSO6ZIEpy5xXzqteaWel7I0KNz4xWQnktJBjRO2MloQ60FoKKngnNGecz9Hq1jQCwPaQ4uHTe3h7D_wCxuFqy</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Research directions in remote detection of covert tactical adversarial intent of individuals in asymmetric operations</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Arnold, G ; Fullenkamp, A M ; Bornstein, A ; Morelli, F ; Brown, T ; Iyer, P ; Lavery, J ; McElhinny, S ; Schmeisser, E ; Strand, M ; Karakowski, J ; Scanlon, M ; Srour, Nino</creator><creatorcontrib>Arnold, G ; Fullenkamp, A M ; Bornstein, A ; Morelli, F ; Brown, T ; Iyer, P ; Lavery, J ; McElhinny, S ; Schmeisser, E ; Strand, M ; Karakowski, J ; Scanlon, M ; Srour, Nino</creatorcontrib><description>This article designs a first-order road map for modeling research to bridge the scientific gap between observations from physical sensor networks at 3-50 m on the one hand and determination of covert tactical adversarial intent of individuals with deception and in extensive clutter on the other. To be successful, the research needs to integrate kinesiological, neurophysiological, psychological, and cognitive science, and sociocultural anthropology and information science components. Research and development (R&D) issues that need to be considered include metrics for cognitive phenomena and how well detection systems work, data sets, determining whether actors can provide sufficient verisimilitude to create data sets, and relevant sensing technologies and information fusion techniques. Successful procedures may need to include actively (but unobtrusively) perturbing the situation in which the sensing takes place in order to elicit specific responses. Comprehensive government R&D programs are required to promote rapid progress.</description><identifier>EISBN: 0982443811</identifier><identifier>EISBN: 9780982443811</identifier><identifier>DOI: 10.1109/ICIF.2010.5711892</identifier><language>eng</language><publisher>IEEE</publisher><subject>adversarial ; asymmetric ; Atmospheric modeling ; cognitive ; covert ; detection ; Humans ; individual ; intent ; Laboratories ; Measurement ; physical sensing ; Psychology ; remote ; Sensors ; Stress</subject><ispartof>2010 13th International Conference on Information Fusion, 2010, p.1-8</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5711892$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5711892$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Arnold, G</creatorcontrib><creatorcontrib>Fullenkamp, A M</creatorcontrib><creatorcontrib>Bornstein, A</creatorcontrib><creatorcontrib>Morelli, F</creatorcontrib><creatorcontrib>Brown, T</creatorcontrib><creatorcontrib>Iyer, P</creatorcontrib><creatorcontrib>Lavery, J</creatorcontrib><creatorcontrib>McElhinny, S</creatorcontrib><creatorcontrib>Schmeisser, E</creatorcontrib><creatorcontrib>Strand, M</creatorcontrib><creatorcontrib>Karakowski, J</creatorcontrib><creatorcontrib>Scanlon, M</creatorcontrib><creatorcontrib>Srour, Nino</creatorcontrib><title>Research directions in remote detection of covert tactical adversarial intent of individuals in asymmetric operations</title><title>2010 13th International Conference on Information Fusion</title><addtitle>ICIF</addtitle><description>This article designs a first-order road map for modeling research to bridge the scientific gap between observations from physical sensor networks at 3-50 m on the one hand and determination of covert tactical adversarial intent of individuals with deception and in extensive clutter on the other. To be successful, the research needs to integrate kinesiological, neurophysiological, psychological, and cognitive science, and sociocultural anthropology and information science components. Research and development (R&D) issues that need to be considered include metrics for cognitive phenomena and how well detection systems work, data sets, determining whether actors can provide sufficient verisimilitude to create data sets, and relevant sensing technologies and information fusion techniques. Successful procedures may need to include actively (but unobtrusively) perturbing the situation in which the sensing takes place in order to elicit specific responses. Comprehensive government R&D programs are required to promote rapid progress.</description><subject>adversarial</subject><subject>asymmetric</subject><subject>Atmospheric modeling</subject><subject>cognitive</subject><subject>covert</subject><subject>detection</subject><subject>Humans</subject><subject>individual</subject><subject>intent</subject><subject>Laboratories</subject><subject>Measurement</subject><subject>physical sensing</subject><subject>Psychology</subject><subject>remote</subject><subject>Sensors</subject><subject>Stress</subject><isbn>0982443811</isbn><isbn>9780982443811</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotUNtKAzEQjQ-CWvsB4kt-YGvul0dZrC4UCtL3kk2mGOnuliQt9O-Nbedl5pw5nDkMQi-ULCgl9q1ru-WCkQqlptRYdoeeiDVMCG4ofUDznH9JLamklPoRHb8hg0v-B4eYwJc4jRnHEScYpgI4QLmSeNphP50gFVxcZbzbYxcqzi7FOsexwFj-VXEM8RTD0e0vRi6fhwFKih5PB0jucuEZ3e_qHua3PkOb5cem_WpW68-ufV810ZLSSO6ZIEpy5xXzqteaWel7I0KNz4xWQnktJBjRO2MloQ60FoKKngnNGecz9Hq1jQCwPaQ4uHTe3h7D_wCxuFqy</recordid><startdate>201007</startdate><enddate>201007</enddate><creator>Arnold, G</creator><creator>Fullenkamp, A M</creator><creator>Bornstein, A</creator><creator>Morelli, F</creator><creator>Brown, T</creator><creator>Iyer, P</creator><creator>Lavery, J</creator><creator>McElhinny, S</creator><creator>Schmeisser, E</creator><creator>Strand, M</creator><creator>Karakowski, J</creator><creator>Scanlon, M</creator><creator>Srour, Nino</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201007</creationdate><title>Research directions in remote detection of covert tactical adversarial intent of individuals in asymmetric operations</title><author>Arnold, G ; Fullenkamp, A M ; Bornstein, A ; Morelli, F ; Brown, T ; Iyer, P ; Lavery, J ; McElhinny, S ; Schmeisser, E ; Strand, M ; Karakowski, J ; Scanlon, M ; Srour, Nino</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-53c240653ac62c6b77295cb84d056287646c745e84ba89501ae774414b2473233</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>adversarial</topic><topic>asymmetric</topic><topic>Atmospheric modeling</topic><topic>cognitive</topic><topic>covert</topic><topic>detection</topic><topic>Humans</topic><topic>individual</topic><topic>intent</topic><topic>Laboratories</topic><topic>Measurement</topic><topic>physical sensing</topic><topic>Psychology</topic><topic>remote</topic><topic>Sensors</topic><topic>Stress</topic><toplevel>online_resources</toplevel><creatorcontrib>Arnold, G</creatorcontrib><creatorcontrib>Fullenkamp, A M</creatorcontrib><creatorcontrib>Bornstein, A</creatorcontrib><creatorcontrib>Morelli, F</creatorcontrib><creatorcontrib>Brown, T</creatorcontrib><creatorcontrib>Iyer, P</creatorcontrib><creatorcontrib>Lavery, J</creatorcontrib><creatorcontrib>McElhinny, S</creatorcontrib><creatorcontrib>Schmeisser, E</creatorcontrib><creatorcontrib>Strand, M</creatorcontrib><creatorcontrib>Karakowski, J</creatorcontrib><creatorcontrib>Scanlon, M</creatorcontrib><creatorcontrib>Srour, Nino</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore (Online service)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Arnold, G</au><au>Fullenkamp, A M</au><au>Bornstein, A</au><au>Morelli, F</au><au>Brown, T</au><au>Iyer, P</au><au>Lavery, J</au><au>McElhinny, S</au><au>Schmeisser, E</au><au>Strand, M</au><au>Karakowski, J</au><au>Scanlon, M</au><au>Srour, Nino</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Research directions in remote detection of covert tactical adversarial intent of individuals in asymmetric operations</atitle><btitle>2010 13th International Conference on Information Fusion</btitle><stitle>ICIF</stitle><date>2010-07</date><risdate>2010</risdate><spage>1</spage><epage>8</epage><pages>1-8</pages><eisbn>0982443811</eisbn><eisbn>9780982443811</eisbn><abstract>This article designs a first-order road map for modeling research to bridge the scientific gap between observations from physical sensor networks at 3-50 m on the one hand and determination of covert tactical adversarial intent of individuals with deception and in extensive clutter on the other. To be successful, the research needs to integrate kinesiological, neurophysiological, psychological, and cognitive science, and sociocultural anthropology and information science components. Research and development (R&D) issues that need to be considered include metrics for cognitive phenomena and how well detection systems work, data sets, determining whether actors can provide sufficient verisimilitude to create data sets, and relevant sensing technologies and information fusion techniques. Successful procedures may need to include actively (but unobtrusively) perturbing the situation in which the sensing takes place in order to elicit specific responses. Comprehensive government R&D programs are required to promote rapid progress.</abstract><pub>IEEE</pub><doi>10.1109/ICIF.2010.5711892</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISBN: 0982443811 |
ispartof | 2010 13th International Conference on Information Fusion, 2010, p.1-8 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5711892 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | adversarial asymmetric Atmospheric modeling cognitive covert detection Humans individual intent Laboratories Measurement physical sensing Psychology remote Sensors Stress |
title | Research directions in remote detection of covert tactical adversarial intent of individuals in asymmetric operations |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T01%3A12%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Research%20directions%20in%20remote%20detection%20of%20covert%20tactical%20adversarial%20intent%20of%20individuals%20in%20asymmetric%20operations&rft.btitle=2010%2013th%20International%20Conference%20on%20Information%20Fusion&rft.au=Arnold,%20G&rft.date=2010-07&rft.spage=1&rft.epage=8&rft.pages=1-8&rft_id=info:doi/10.1109/ICIF.2010.5711892&rft.eisbn=0982443811&rft.eisbn_list=9780982443811&rft_dat=%3Cieee_6IE%3E5711892%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-53c240653ac62c6b77295cb84d056287646c745e84ba89501ae774414b2473233%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5711892&rfr_iscdi=true |