...on and recognition of threats towards deployment on mobile critical assets/platforms such as trucks, trains, vessels, and oil rigs. There is a substantial end-user need for intelligent and continuous proactive monitoring to enable situational awareness and determination of potential threats enabling timely and appropriate response. Hijacking, piracy, theft raise major security concerns, as well as ...