000 | 03623nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-981-32-9001-3 | ||
003 | DE-He213 | ||
005 | 20240423125310.0 | ||
007 | cr nn 008mamaa | ||
008 | 200714s2021 si | s |||| 0|eng d | ||
020 |
_a9789813290013 _9978-981-32-9001-3 |
||
024 | 7 |
_a10.1007/978-981-32-9001-3 _2doi |
|
050 | 4 | _aTK5102.9 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC067000 _2bisacsh |
|
072 | 7 |
_aTJF _2thema |
|
072 | 7 |
_aUYS _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aAbrardo, Andrea. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aInformation Fusion in Distributed Sensor Networks with Byzantines _h[electronic resource] / _cby Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2021. |
|
300 |
_aXIX, 109 p. 26 illus., 15 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSignals and Communication Technology, _x1860-4870 |
|
505 | 0 | _aIntroduction -- Preliminaries -- Security attacks and defenses in distributed sensor networks -- A Heuristic defense: A soft isolation algorithm for adversarial decision fusion -- Optimum decision fusion in the presence of Byzantines -- Nearly optimum decision fusion via message passing -- Decision fusion of hidden-Markov observations with synchronized attacks -- Decision fusion with unbalanced priors -- Decision fusion game with incomplete knowledge in a Bayesian setup -- Conclusions. | |
520 | _aThis book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and the corresponding payoffs are derived, shedding new light on the achievable performance level and the impact that the presence of the Byzantines has on the accuracy of decisions made by the Fusion Center. Accordingly, the book offers a simple yet effective introduction to the emerging field of adversarial information fusion, providing a wealth of intuitive take-home lessons for practitioners interested in applying the most basic notions to the design of practical systems, while at the same time introducing researchers and other readers to the mathematical details behind the theory. | ||
650 | 0 | _aSignal processing. | |
650 | 0 | _aData protection. | |
650 | 0 | _aSecurity systems. | |
650 | 1 | 4 | _aSignal, Speech and Image Processing. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aSecurity Science and Technology. |
700 | 1 |
_aBarni, Mauro. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aKallas, Kassem. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aTondi, Benedetta. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789813290006 |
776 | 0 | 8 |
_iPrinted edition: _z9789813290020 |
776 | 0 | 8 |
_iPrinted edition: _z9789813290037 |
830 | 0 |
_aSignals and Communication Technology, _x1860-4870 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-32-9001-3 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cSPRINGER | ||
999 |
_c176425 _d176425 |