Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Introduction
Preliminaries
Security attacks and defenses in distributed sensor networks
A Heuristic defense: A soft isolation algorithm for adversarial decision fusion
Optimum decision fusion in the presence of Byzantines
Nearly optimum decision fusion via message passing
Decision fusion of hidden-Markov observations with synchronized attacks
Decision fusion with unbalanced priors
Decision fusion game with incomplete knowledge in a Bayesian setup
Conclusions.

Browse Subjects

Show more subjects...

Statistics

from
to
Export