000 03699nam a22006015i 4500
001 978-981-32-9001-3
003 DE-He213
005 20220801214442.0
007 cr nn 008mamaa
008 200714s2021 si | s |||| 0|eng d
020 _a9789813290013
_9978-981-32-9001-3
024 7 _a10.1007/978-981-32-9001-3
_2doi
050 4 _aTK5102.9
072 7 _aTJF
_2bicssc
072 7 _aUYS
_2bicssc
072 7 _aTEC008000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aUYS
_2thema
082 0 4 _a621.382
_223
100 1 _aAbrardo, Andrea.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_938431
245 1 0 _aInformation Fusion in Distributed Sensor Networks with Byzantines
_h[electronic resource] /
_cby Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi.
250 _a1st ed. 2021.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2021.
300 _aXIX, 109 p. 26 illus., 15 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSignals and Communication Technology,
_x1860-4870
505 0 _aIntroduction -- Preliminaries -- Security attacks and defenses in distributed sensor networks -- A Heuristic defense: A soft isolation algorithm for adversarial decision fusion -- Optimum decision fusion in the presence of Byzantines -- Nearly optimum decision fusion via message passing -- Decision fusion of hidden-Markov observations with synchronized attacks -- Decision fusion with unbalanced priors -- Decision fusion game with incomplete knowledge in a Bayesian setup -- Conclusions.
520 _aThis book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and the corresponding payoffs are derived, shedding new light on the achievable performance level and the impact that the presence of the Byzantines has on the accuracy of decisions made by the Fusion Center. Accordingly, the book offers a simple yet effective introduction to the emerging field of adversarial information fusion, providing a wealth of intuitive take-home lessons for practitioners interested in applying the most basic notions to the design of practical systems, while at the same time introducing researchers and other readers to the mathematical details behind the theory.
650 0 _aSignal processing.
_94052
650 0 _aData protection.
_97245
650 0 _aSecurity systems.
_931879
650 1 4 _aSignal, Speech and Image Processing .
_931566
650 2 4 _aData and Information Security.
_931990
650 2 4 _aSecurity Science and Technology.
_931884
700 1 _aBarni, Mauro.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_938432
700 1 _aKallas, Kassem.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_938433
700 1 _aTondi, Benedetta.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_938434
710 2 _aSpringerLink (Online service)
_938435
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789813290006
776 0 8 _iPrinted edition:
_z9789813290020
776 0 8 _iPrinted edition:
_z9789813290037
830 0 _aSignals and Communication Technology,
_x1860-4870
_938436
856 4 0 _uhttps://doi.org/10.1007/978-981-32-9001-3
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c76360
_d76360