

Observations are produced from matches of the behavioral patterns to behavior specifications, which may be in a behavioral knowledge base.

Behavioral patterns are identified, from analyzing the incident information or the activity information. Incident information or activity information is analyzed. In one embodiment, a method for risk analysis is disclosed. Arriving incident information or activity information, which may pertain to risks to assets such as people and critical infrastructure, is analyzed so that per-asset risks can be determined. SUMMARYĪ risk analysis system, a risk analysis engine and a related method are herein described. Therefore, there is a need in the art for an integrated, flexible solution which overcomes the drawbacks described above. The sheer volume of data and the changing nature of threats make this a daunting task which can easily overwhelm individuals and localized systems. Traditional, human-based monitoring methods have been augmented by data mining, artificial intelligence, statistical analysis and other computer-driven techniques, which have been applied and continue to be developed in an ongoing effort to protect and ensure the safety and survival of the citizens and both public and private assets. There is a known database that identifies key resources and critical infrastructures as assets to be protected. Large amounts of information about threats, incidents, activities, risks and other concerns are collected, stored and analyzed by safety, security and intelligence agencies, including police, military, and homeland security. The government has certain rights in the invention. This invention was made with government support under contract number N00024-03-D-6606 awarded by the Naval Sea Systems Command. 8, 2012, the content of which is herein incorporated by reference in its entirety.

This application claims priority to and the benefit of U.S.
