摘要 |
A method for accurately determining whether a response tool will be effective for responding to a given enemy threat object. Embodiments described herein provide a method and system for responding to a threat object, for example, negating missile threats. Embodiments may include validating effectiveness of a response to the threat object. Other embodiments may include verifying the continued effectiveness of a response to the threat object. Further embodiments may include providing feedback to re-perform the method for responding to the threat object. The system may include a mathematical method, and associated algorithms, to assess, in an automated fashion, the performance of non-kinetic techniques with respect to negating the threat object. |
主权项 |
1. A method of responding to a threat object, the method comprising:
a method for selecting a response tool comprising:
detecting with a sensor a phase and an identification of a threat object based on a detected portion of the threat object and/or a second object operatively connectable with the portion of the threat object;determining a model of a lifecycle of the threat object based on the detected portion and/or the second object;searching for a first set of vulnerabilities of the modeled lifecycle;choosing a first response tool to impair the performance of the threat object and the detected portion of the threat object and/or the second object; andstoring the identification of the threat object, the model of the lifecycle, and the first response tool; a method for iteratively selecting a response tool during a first phase comprising:
performing the method for selecting the response tool; andupdating the identification of the threat object, the modeled lifecycle, the first set of vulnerabilities, and the first response tool based on the modeled lifecycle, vulnerabilities, the first response tool, and the first phase; and a method for iteratively selecting a response tool during a second phase comprising:
detecting with the sensor a second phase;performing the method for selecting the response tool; andupdating the identification of the threat object, the modeled lifecycle, the first set of vulnerabilities, and the first response tool based on the modeled lifecycle, vulnerabilities, the first response tool, and the second phase; and implementing the first response tool against the threat object and/or the second object. |