[1] A. Benaskeur, "Combat Resource Management (11bm) Applied Research Project (ARP)," DEFENCE RESEARCH AND DEVELOPMENT CANADA VALCARTIER (QUEBEC)2009.
[2] D. Akselrod, T. Lang, M. McDonald, and T. Kirubarajan, "Markov decision process-based resource and information management for sensor networks," in Sensor Networks: Springer, 2010, pp. 167-216.
[3] B. Kovalerchuk and L. Perlovsky, "Sensor Resource Management: Intelligent Multi-objective Modularized Optimization Methodology and Models," in Recent Advances in Computational Intelligence in Defense and Security: Springer, 2016, pp. 695-726.
[4] T. H. de Groot, O. A. Krasnov, and A. G. J. I. S. J. Yarovoy, "Mission-driven resource management for reconfigurable sensing systems," vol. 12, no. 2, pp. 1531-1542, 2018.
[5] S. F. Page, J. P. Oldfield, and P. Thomas, "Towards integrated threat assessment and sensor management: Bayesian multi-target search," in Multisensor Fusion and Integration for Intelligent Systems (MFI), 2016 IEEE International Conference on, 2016, pp. 44-51: IEEE.
[6] S. Page et al., "Threat assessment and sensor management in a modular architecture," in Optics and Photonics for Counterterrorism, Crime Fighting, and Defence XII, 2016, vol. 9995, p. 99950W: International Society for Optics and Photonics.
[7] F. Katsilieris, H. Driessen, and A. Yarovoy, "Threat-based sensor management for joint target tracking and classification," in Information Fusion (Fusion), 2015 18th International Conference on, 2015, pp. 435-442: IEEE.
[8] S. kamelian, n. Pariz, and A. Karimpor, "Threat concept development based on tolerability and a decision support system for threat evaluation using logical statements and discrete-Value evidences %J Journal of Command and Control," (in eng), Research vol. 3, no. 1, pp. 1-24, 2019.
[9] F. Katsilieris, "Sensor management for surveillance and tracking: An operational perspective," 2015.
[10] F. Katsilieris, Y. Boers, and H. Driessen, "Optimal search: A practical interpretation of information-driven sensor management," in FUSION, 2012, pp. 439-446.
[11] N. Okello and G. Thoms, "Threat assessment using Bayesian networks," in Proceedings of the 6th International Conference on Information fusion, 2003, pp. 1102-1109.
[12] Y. Hou, W. Guo, and Z. Zhu, "Threat assessment based on variable parameter dynamic Bayesian network," in Proceedings of the 29th Chinese Control Conference, 2010, pp. 1230-1235: IEEE.
[13] W. Mei, "Air Defense Threat Evaluation using Fuzzy Bayesian Classifier," in IJCCI, 2013, pp. 227-232.
[14] S. Kumar and B. K. J. P. T. Tripathi, "Modelling of threat evaluation for dynamic targets using bayesian network approach," vol. 24, pp. 1268-1275, 2016.
[15] A. N. Costa and P. C. Costa, "Simulation-based air mission evaluation with Bayesian threat assessment for opposing forces," in Disciplinary Convergence in Systems Engineering Research: Springer, 2018, pp. 281-295.
[16] M. Yadegary, and S. A. Seideyn, "Threat evaluation using joint fuzzy and probablistic network based on rules," in Electronic and Cyber Defense Quarterly, 2019, vol 6, Issue 4. (in persian)
[17] M. Nilsson, J. Van Laere, T. Ziemke, and J. Edlund, "Extracting rules from expert operators to support situation awareness in maritime surveillance," in 2008 11th International conference on information fusion, 2008, pp. 1-8: IEEE.
[18] W. Elahsoumi, I. Boujelben, and I. Keskes, "Rule Based Method for Terrorism, Violence and Threat Classification: Application to Arabic Tweets," in International Conference on Automatic Processing of Natural-Language Electronic Texts with NooJ, 2019, pp. 209-219: Springer.
[19] Y. Liang, J. Lee, B. Hong, and W. Kim, "Design and Implementation of Rule-based CEP for Threat Detection and Defense," in 2019 IEEE International Symposium on INnovations in Intelligent SysTems and Applications (INISTA), 2019, pp. 1-6: IEEE.
[20] [20] A. N. Steinberg, "A model for threat assessment," in Fusion Methodologies in Crisis Management: Springer, 2016, pp. 313-340.
[21] A. N. J. H. o. m. d. f. t. Steinberg and practice, "Foundations of situation and threat assessment," pp. 437-501, 2009.
[22] A. N. Steinberg, "Threat assessment technology development," in International and Interdisciplinary Conference on Modeling and Using Context, 2005, pp. 490-500: Springer.
[23] M. Oxenham, "Enhancing situation awareness for air defence via automated threat analysis," in Proceedings of the Sixth International Conference on Information Fusion, 2003, vol. 2, pp. 1086-1093.
[24] M. G. Oxenham, "Using contextual information for extracting air target behavior from sensor tracks," in Signal Processing, Sensor Fusion, and Target Recognition XII, 2003, vol. 5096, pp. 482-493: International Society for Optics and Photonics.
[25] H. Irandoust, A. Benaskeur, F. Kabanza, and P. Bellefeuille, "A mixed-initiative advisory system for threat evaluation," in Proceedings of the 15th International Command and Control Research and Technology Symposium: The Evolution of C, 2010, vol. 2, pp. 2-3.
[26] M. J. Liebhaber, D. Kobus, and B. J. S. Feher, "Studies of US Navy air defense threat assessment: Cues, information order, and impact of conflicting data," 2002.
[27] R. Roux and J. H. J. O. van Vuuren, "Real-time threat evaluation in a ground based air defence environment," vol. 24, no. 1, pp. 75-101, 2008.
[28] M. Yoon, J. Park, and J. J. I. J. o. C. Yi, "An Effective Threat Evaluation Algorithm for Multiple Ground Targets in Multi-target and Multi-weapon Environments," vol. 15, no. 1, 2019.
[29] I. Dimitrijević and N. Stekić, "Intelligence Analysis Models for Asymmetric Threats," Strategic Research Institute & National Defence School, 2018.
[30] T. Hamilton and R. Mesic, "A simple game-theoretic approach to suppression of enemy defenses and other time critical target analyses," RAND CORP SANTA MONICA CA2004.
[31] E. G. Little and G. L. Rogova, "An ontological analysis of threat and vulnerability," in 2006 9th International Conference on Information Fusion, 2006, pp. 1-8: IEEE.
[32] S. M. R. Mousavi, and H. Alimohammadi, "Optimized allocation for radar jamming resources.," in Electronic and Cyber Defense Quarterly, 2015, vol 3, Issue 7. (in persian)
[33] N. Le Guillarme, A.-I. Mouaddib, S. Gatepaille, and A. Bellenger, "Adversarial intention recognition as inverse game-theoretic planning for threat assessment," in 2016 IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI), 2016, pp. 698-705: IEEE.
[34] G. Chen, D. Shen, C. Kwan, J. B. Cruz, and M. Kruger, "Game theoretic approach to threat prediction and situation awareness," in 2006 9th International Conference on Information Fusion, 2006, pp. 1-8: IEEE.
[35] J. Roy, S. Paradis, and M. Allouche, "Threat evaluation for impact assessment in situation analysis systems," in Signal processing, sensor fusion, and target recognition XI, 2002, vol. 4729, pp. 329-341: International Society for Optics and Photonics.
[36] N. Le Guillarme, "A Game-Theoretic Planning Framework for Intentional Threat Assessment," Thèse de doctorat, Université de Caen, 2016.
[37] M. J. Liebhaber and B. Feher, "Air threat assessment: Research, model, and display guidelines," SPACE AND NAVAL WARFARE SYSTEMS COMMAND SAN DIEGO CA2002.
[38] S. Blackman and R. J. A. h. Popoli, "Design and Analysis of Modern Tracking Systems (Artech House Radar Library)," 1999.
[39] D. Bauso, Game theory with engineering applications. SIAM, 2016.
[40] M. Kress, "Lanchester Models for Irregular Warfare," vol. 8, no. 5, p. 737, 2020.
[41] J. G. Taylor, "Lanchester-type models of warfare and optimal control," vol. 21, no. 1, pp. 79-106, 1974.
[42] S. Jørgensen and S. Sigué, "A lanchester-type dynamic game of advertising and pricing," in Games in Management Science: Springer, 2020, pp. 1-14.
[43] S. Jørgensen and S.-P. Sigué, "Defensive, Offensive, and Generic Advertising in a Lanchester Model with Market Growth," Dynamic Games and Applications, vol. 5, no. 4, pp. 523-539, 2015/12/01 2015.
[44] G. M. J. M. L. Erickson, "Offensive and defensive marketing: Closed-loop duopoly strategies," pp. 285-295, 1993.
[45] G. J. J. o. E. D. Sorger and Control, "Competitive dynamic advertising: A modification of the Case game," vol. 13, no. 1, pp. 55-80, 1989.