Figure 3From: Harvesting and analysis of weak signals for detecting lone wolf terrorists A threat model in the Impactorium tool, where a number of evidences have been fused. Back to article page