Linked e-resources
Details
Table of Contents
Introduction
Preliminaries
Security attacks and defenses in distributed sensor networks
A Heuristic defense: A soft isolation algorithm for adversarial decision fusion
Optimum decision fusion in the presence of Byzantines
Nearly optimum decision fusion via message passing
Decision fusion of hidden-Markov observations with synchronized attacks
Decision fusion with unbalanced priors
Decision fusion game with incomplete knowledge in a Bayesian setup
Conclusions.
Preliminaries
Security attacks and defenses in distributed sensor networks
A Heuristic defense: A soft isolation algorithm for adversarial decision fusion
Optimum decision fusion in the presence of Byzantines
Nearly optimum decision fusion via message passing
Decision fusion of hidden-Markov observations with synchronized attacks
Decision fusion with unbalanced priors
Decision fusion game with incomplete knowledge in a Bayesian setup
Conclusions.