000 03623nam a22006015i 4500
001 978-981-32-9001-3
003 DE-He213
005 20240423125310.0
007 cr nn 008mamaa
008 200714s2021 si | s |||| 0|eng d
020 _a9789813290013
_9978-981-32-9001-3
024 7 _a10.1007/978-981-32-9001-3
_2doi
050 4 _aTK5102.9
072 7 _aTJF
_2bicssc
072 7 _aUYS
_2bicssc
072 7 _aTEC067000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aUYS
_2thema
082 0 4 _a621.382
_223
100 1 _aAbrardo, Andrea.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aInformation Fusion in Distributed Sensor Networks with Byzantines
_h[electronic resource] /
_cby Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi.
250 _a1st ed. 2021.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2021.
300 _aXIX, 109 p. 26 illus., 15 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSignals and Communication Technology,
_x1860-4870
505 0 _aIntroduction -- Preliminaries -- Security attacks and defenses in distributed sensor networks -- A Heuristic defense: A soft isolation algorithm for adversarial decision fusion -- Optimum decision fusion in the presence of Byzantines -- Nearly optimum decision fusion via message passing -- Decision fusion of hidden-Markov observations with synchronized attacks -- Decision fusion with unbalanced priors -- Decision fusion game with incomplete knowledge in a Bayesian setup -- Conclusions.
520 _aThis book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and the corresponding payoffs are derived, shedding new light on the achievable performance level and the impact that the presence of the Byzantines has on the accuracy of decisions made by the Fusion Center. Accordingly, the book offers a simple yet effective introduction to the emerging field of adversarial information fusion, providing a wealth of intuitive take-home lessons for practitioners interested in applying the most basic notions to the design of practical systems, while at the same time introducing researchers and other readers to the mathematical details behind the theory.
650 0 _aSignal processing.
650 0 _aData protection.
650 0 _aSecurity systems.
650 1 4 _aSignal, Speech and Image Processing.
650 2 4 _aData and Information Security.
650 2 4 _aSecurity Science and Technology.
700 1 _aBarni, Mauro.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aKallas, Kassem.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aTondi, Benedetta.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789813290006
776 0 8 _iPrinted edition:
_z9789813290020
776 0 8 _iPrinted edition:
_z9789813290037
830 0 _aSignals and Communication Technology,
_x1860-4870
856 4 0 _uhttps://doi.org/10.1007/978-981-32-9001-3
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cSPRINGER
999 _c176425
_d176425