Information Fusion in Distributed Sensor Networks with Byzantines (Record no. 76360)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03699nam a22006015i 4500 |
001 - CONTROL NUMBER | |
control field | 978-981-32-9001-3 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801214442.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200714s2021 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789813290013 |
-- | 978-981-32-9001-3 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.382 |
100 1# - AUTHOR NAME | |
Author | Abrardo, Andrea. |
245 10 - TITLE STATEMENT | |
Title | Information Fusion in Distributed Sensor Networks with Byzantines |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2021. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XIX, 109 p. 26 illus., 15 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Signals and Communication Technology, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Introduction -- Preliminaries -- Security attacks and defenses in distributed sensor networks -- A Heuristic defense: A soft isolation algorithm for adversarial decision fusion -- Optimum decision fusion in the presence of Byzantines -- Nearly optimum decision fusion via message passing -- Decision fusion of hidden-Markov observations with synchronized attacks -- Decision fusion with unbalanced priors -- Decision fusion game with incomplete knowledge in a Bayesian setup -- Conclusions. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and the corresponding payoffs are derived, shedding new light on the achievable performance level and the impact that the presence of the Byzantines has on the accuracy of decisions made by the Fusion Center. Accordingly, the book offers a simple yet effective introduction to the emerging field of adversarial information fusion, providing a wealth of intuitive take-home lessons for practitioners interested in applying the most basic notions to the design of practical systems, while at the same time introducing researchers and other readers to the mathematical details behind the theory. |
700 1# - AUTHOR 2 | |
Author 2 | Barni, Mauro. |
700 1# - AUTHOR 2 | |
Author 2 | Kallas, Kassem. |
700 1# - AUTHOR 2 | |
Author 2 | Tondi, Benedetta. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-981-32-9001-3 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Singapore : |
-- | Springer Nature Singapore : |
-- | Imprint: Springer, |
-- | 2021. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Signal processing. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security systems. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Signal, Speech and Image Processing . |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security Science and Technology. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1860-4870 |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.