Risk Management in Asymmetric Conflict: Using Predictive Route Reconnaissance to Assess and Mitigate Threats Conference Paper uri icon

abstract

  • Springer International Publishing Switzerland 2015. This paper presents novel computing algorithms to generate tactical risk maps (TRM) based on the MECH (Monitor, Emplacement, and Command/ Control in a Halo) model to evaluate locational values for attackers to launch improvised explosive device (IED) vs. direct fire (DF) attacks. Given a study area R, its proximity P can be mapped to explore noticeable characteristics associated with the attack locations. Within the distance constraints of the Halo, a simple optimization formula is proposed to support flexible representations of risk preferences of the attackers in ranking of locations for the M, C and E functions across R. Several case studies on major corridors find a significant number of attack locations were near or at local maxima of the measurement route exposure. It was found that IED sites tend to have good visibility and more uniform line-of-sight (LOS) distances. On the other hand, most DF locations are near the boundary of the viewshed suggesting careful selection of the sites to provide cover in the attack.

published proceedings

  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

author list (cited authors)

  • Lin, J., Qu, B., Wang, X., George, S. M., & Liu, J.

citation count

  • 2

complete list of authors

  • Lin, Jason||Qu, Benke||Wang, Xing||George, Stephen M||Liu, Jyh-Charn

publication date

  • January 2015