263
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

Spatio-temporal improvised explosive device monitoring: improving detection to minimise attacks

&
Pages 2493-2508 | Received 05 Oct 2011, Accepted 05 Aug 2012, Published online: 24 Aug 2012

References

  • Army-Technology.com, RQ-7 Shadow 200 Tactical UAV, 2010. Available at http://www.army-technology.com/projects/shadow200uav.
  • Baddeley , A. and Turner , R. 2005 . Spatstat: An R package for analyzing spatial point patterns . J. Statist. Softw. , 12 : 1 – 42 .
  • T. Bartow, After action report: Deployment to Afghanistan 28 January 2008–8 June 2008, Rand Corporation, Santa Monica, 2008.
  • M. Benigni and R. Furrer, Spatio-temporal based IED pattern analysis, Tech. Rep., Colorado School of Mines, CO, 2008.
  • Berman , M. and Diggle , P. 1989 . Estimating weighted integrals of the second-order intensity of a spatial point pattern . J. R. Stat. Soc. Ser. B Methodol. , 51 : 81 – 92 .
  • W. Chang, D. Zeng, and H. Chen, Prospective spatio-temporal data analysis for security informatics, Intelligent Transportation Systems, 2005. Proceedings. 2005 IEEE, 13–15 September, pp. 1120–1124.
  • K. Curtin, Road network snalysis, 2010 Annual Technical Report George Mason University C4I Center, JIEDDO, Washington, DC, 2010, pp. 151–170.
  • K. Curtin and N. Perry, Road network analysis and linear referencing, 2009 Annual Technical Report George Mason University C4I Center, JIEDDO, Washington, DC, 2009, pp. 93–123.
  • K. DeGregory, Optimisation-based allocation of force protection resources in an asymmetric environment, Master of Science Thesis, Massachusetts Institute of Technology, 2007.
  • Diggle , P. J. 1979 . On parameter estimation and goodness-of-fit testing for spatial point patterns . Biometrics , 35 : 87 – 101 .
  • Diggle , P. J. 2003 . Statistical Analysis of Spatial Point Patterns , 2 , New York : Oxford University Press .
  • S.I. Erwin, Surge in vehicle orders calls for unconventional buying methods, National Defense Magazine, 2007. Available at http://www.nationaldefensemagazine.org/archive/2007/April/Pages/Surgeinvehicle2667.aspx.
  • S.I. Erwin, Technology falls short in the war against IEDs, National Defense Magazine, 2010. Available at http://www.nationaldefensemagazine.org/blog/Lists/Posts/Post.aspx?ID=221.
  • Geo Eye Analytics, Geo Analytics’ Signature Analyst, Geo Eye Analytics Advanced Geospatial McLean, VA, Austria, 2012. Available at http://www.spadac.com/SignatureAnalyst/ http://www.spadac.com/SignatureAnalyst/.
  • T. Gjelten, U.S. ’connects the dots’ to catch roadside bombers, 30 April 2010. Available at http://www.npr.org/2010/12/03/131755378/u-s-connects-the-dots-to-catch-roadside-bombers.
  • Globalsecurity.org, OIF – Iraq Significant Activities (SIGACTS), 2010. Available at http://www.globalsecurity.org/military/ops/iraq_sigacts.htm.
  • J. Hsu, ‘SCARE’ software predicts insurgent weapons cache locations based on IED attacks, 11 December, 2009. Available at http://www.popsci.com/technology/article/2009-12/scare-program-predicts-ied-weapons-caches-used-insurgents.
  • Huddleston , S. H. and Brown , D. E. 2009 . A statistical threat assessment . IEEE Trans. Syst. Man Cybern. A, Syst. Humans , 39 ( 6 ) : 1307 – 1315 .
  • JIEDDO, Annual report: Fiscal year 2008, JIEDDO, Washington, DC, 2009. Available at https://www.jieddo.dod.mil/content/docs/20090625_FULL_2008_Annual_Report_Unclassified_v4.pdf.
  • JIEDDO Counter-IED Operations and Intelligence Center, 2012. JIEDDO, Washington, DC, 2009. Available at https://www.jieddo.dod.mil/attack.aspx.
  • Keefe , R. and Sullivan , T. 2007 . Building time sensitive clusters in time and space , Washington , DC : Tech. Rep., JIEDDO .
  • Knox , G. 1963 . Detection of low density epidemicity . Br. J. Prev. Soc. Med. , 18 : 121 – 127 .
  • P. Kolesar, Model of IED clearance for RCP operations, 2010 Annual Technical Report George Mason University C4I Center, JIEDDO, Washington, DC, 2010, pp. 97–150.
  • Kolesar , P. , Woodman , R. and Leister , K. 2008 . Time series analysis of improvised explosive device incidence , Washington , DC : Tech. Rep., JIEDDO .
  • Lantz , R. W. 2006 . A data mining approach to forecasting IED placement in space and time , Naval Postgraduate School . Master of Science Thesis
  • Levitt , T. 2010 . Threat attribution classifier , 6 – 55 . Washington , DC : JIEDDO . 2010 Annual Technical Report George Mason University C4I Center
  • Liu , H. and Brown , D. E. 2003 . Criminal incident prediction using a point-pattern-based density model . Int. J. Forecast. , 19 : 603 – 622 .
  • Loerch , A. 2010 . Threat plan prediction model , 56 – 96 . Washington , DC : JIEDDO . 2010 Annual Technical Report George Mason University C4I Center
  • Lu , Y. and Chen , X. 2007 . False alarm of planar K-function when analyzing urban crime distributed along streets . Soc. Sci. Res. , 31 : 611 – 632 .
  • S. Magnuson, JIEDDO chief seeks help as roadside bombs plague Afghanistan, National Defense Magazine, 2010. Available at http://www.nationaldefensemagazine.org/archive/2010/April/Pages/JIEDDOchiefseekshelp.aspx?vm=r.
  • Marks , C. 2009 . Optimisation-based routing and scheduling of IED-detection assets in contemporary military operations , Massachusetts Institute of Technology . Master of Science Thesis
  • C.K. Mitchell and M.H. Roscoe, Assured mobility in the army's first striker brigade, US Army Engineer Magazine, July–September, 2004, pp. 4–8.
  • Okabe , A. and Yamada , I. 2001 . The K-function method on a network and its computational implementation . Geogr. Anal. , 33 : 271 – 290 .
  • Okabe , A. , Okunuki , K. and Shiode , S. 2006 . SANET: A toolbox for spatial analysis on a network . Geogr. Anal. , 38 : 57 – 66 .
  • Okabe , A. , Yomono , H. and Kitamura , M. 1995 . Statistical analysis of the distribution of points on a network . Geogr. Anal. , 27 : 152 – 175 .
  • ORSA Handbook for the Senior Commander, Operations, Center for Army Analysis, Washington, DC, March, 2008.
  • R Development Core Team (2011), R: A Language and Environment for Statistical Computing, R Foundation for Statistical Computing, Vienna, Austria. Available at http://www.R-project.org.
  • Reed , B. 2007 . A social network approach to understanding an insurgency . Parameters, US Army War College Quarterly , 37 ( 2 ) : 19 – 30 .
  • Ressler , S. 2006 . Social network analysis as an approach to combat terrorism: Past, present, and future research . Homeland Security Affairs , 2 Available at http://www.hsaj.org/?article=2.2.8.
  • S.R. Riese, Templating an adaptive threat: Spatial forecasting in operations enduring freedom and Iraqi freedom, Engineer Magazine, January, 2006, pp. 42–43.
  • Royset , J. and Reber , D. 2008 . Optimised routing of unmanned aerial systems for the interdiction of improvised explosive devices , Naval Postgraduate School . Master of Science Thesis
  • Schott , E. 2009 . A metaheuristic algorithm for solving a distribution and inventory problem with setup costs using cross entropy and lagrangian relaxation , Doctor of Philosophy Dissertation, New Mexico State University .
  • Scioletti , M. 2008 . A heuristic algorithm for optimised routing of unmanned aerial systems for the interdiction of improvised explosive devices , Naval Postgraduate School . Master of Science Thesis
  • N. Shachtman, Wired: Danger Room, Wired, May 10, 2007. Available at http://www.wired.com/dangerroom/2007/05/bombspotting_bl/ (accessed August 17, 2012).
  • P. Shakarian, V.S. Subrahmanian, and U.K. Wiil, Region-Based Geospatial Abduction with Counter-IED Applications, Lecture Notes in Social Networks, Springer, Vienna, Vol. 2, pp. 105–122.
  • P. Shakarian, V.S. Subrahmanian, and M.L. Sapino, Using generalized annotated programs to solve social network optimisation problems, ICLP, Technical Communications of the 26th International Conference on Logic Programming, 2010, pp. 182–191. Available at http://drops.dagstuhl.de/opus/volltexte/2010/2596.
  • Smith , M. A. and Brown , D. E. 2007 . Application of discrete choice analysis to attack point patterns . Inf. Syst. Electron. Bus. Manage. , 5 ( 3 ) : 255 – 274 .
  • A. Spillius, Wikileaks Afghanistan: IEDs are Taliban's deadliest weapon, Telegraph, 27 July, 2010.
  • United States Air Force, The U.S. air force remotely piloted aircraft and unmanned aerial vehicle strategic vision, Tech. Rep., United States Air Force, 2005.
  • Wright , E. 2010 . JIEDDO rapid initiative assessment methodology , 194 – 218 . Washington , DC : JIEDDO . 2010 Annual Technical Report George Mason University C4I Center
  • Xue , Y. and Brown , D. E. 2003 . A decision model for spatial site selection by criminals: A foundation for law enforcement decision support . IEEE Trans. Syst. Man Cybern. C, Appl. Rev. , 33 ( 1 ) : 78 – 85 .
  • Yamada , I. and Thill , J. 2004 . Comparison of planar and network K-functions in traffic accident analysis . J. Transp. Geography , 12 : 149 – 158 .
  • Yamada , I. and Thill , J. 2007 . Local indicators of network-constrained clusters in spatial point patterns . Geograph. Anal. , 39 : 268 – 292 .
  • G. Zorpette, Countering IEDs, IEEE Spectrum, September, 2008. Available at http://spectrum.ieee.org/aerospace/military/countering-ieds/0.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.