12,113 Hits in 2.4 sec

An ontology for Maritime Situational Awareness Heterogeneous Sensor Networks

Elena Camossi
2020 Zenodo  
Here, different situational views offered by a variegate suite of sensors and platforms are fused and combined with big data analytics to achieve situational awareness for maritime security.  ...  most interesting modelling patterns, from MSA sensor information, to maritime event detection and forecasting, to the modelling of information quality in fusion systems.  ...  The information needed to achieve SA in a maritime security context is acquired by an heterogeneous sensor network, that may integrate collaborative and non-cooperating systems, terrestrial and remote  ... 
doi:10.5281/zenodo.4692487 fatcat:pcskeknucrgatboz42oxlqmt5i

Enhanced Insight for Environment and Security: The Cube4EnvSec Initiative

Peter Baumann, Colin Price, Karl Zinglersen, Ralf Berger, Arnold Tafferner, Caroline Reitwiesner, Bruno Neininger, Rene Heise
2022 Zenodo  
Data¬cubes, aka spatio-temporally homogenized raster data, are an accepted cornerstone for providing Big Geo Data easier for users and applications, ready for analysis, visualization, fusion, etc.  ...  Rapid environmental changes due to climate change call for innovative technological approaches, and likewise is this required for security missions.  ...  CONCLUSIONS The Cube4EnvSec project has set out to consolidate central use cases for geo data support in environment and security scenarios.  ... 
doi:10.5281/zenodo.6619613 fatcat:g75ftorqzjezbm3fxexniefecy

Review of Robust Cooperative Spectrum Sensing Techniques for Cognitive Radio Networks

Helena Rifà-Pous, Mercedes Jiménez Blasco, Carles Garrigues
2011 Wireless personal communications  
This paper makes a review of secure cooperative spectrum sensing in cognitive radio networks.  ...  However, taking a collaborative approach poses new security threats to the system as nodes can report false sensing data to reach a wrong decision.  ...  In particular, the secure cooperative sensing proposals that we analyze in this paper have a centralized architecture, with a fusion center that performs the data fusion.  ... 
doi:10.1007/s11277-011-0372-x fatcat:sun3zwkqibarfnjgvigz5i22se

Accelerating the scientific exploration process with scientific workflows

Ilkay Altintas, Oscar Barney, Zhengang Cheng, Terence Critchlow, Bertram Ludaescher, Steve Parker, Arie Shoshani, Mladen Vouk
2006 Journal of Physics, Conference Series  
In particular, we highlight the use of some of the current features of Kepler in several scientific applications, as well as upcoming extensions and improvements that are geared specifically for SciDAC  ...  Workflow systems provide domain-independent customizable interfaces and tools that combine different tools and technologies along with efficient methods for using them.  ...  thank the DOE scientists working with the SDM Center, especially to Matthew Coleman, Doug Swesty, Eric Myra, John Blondin and Scott Klasky, and the SDSC SWAT Lab team and the rest of the Kepler team for  ... 
doi:10.1088/1742-6596/46/1/065 fatcat:z5ltbncglnhvrgt6rscnzhjubq

Wireless sensor network for mobile surveillance systems

Gert J. A. van Dijk, Marinus G. Maris, Edward M. Carapezza
2004 Unmanned/Unattended Sensors and Sensor Networks  
Conventional surveillance systems typically employ standalone sensors that transmit their data to a central control station for data-processing.  ...  In this concept, surveillance is automatically performed by means of many small sensing devices including cameras. The requirements for such surveillance systems are investigated.  ...  For example, wireless sensor systems have been discussed for tracking vehicles in a field 1 rather than for use in compound security.  ... 
doi:10.1117/12.578046 fatcat:hhxbcah2rjdnnpqv2m6z3wbwpq

Ieee Access Special Section Editorial: Human-Driven Edge Computing

Rongbo Zhu, Lu Liu, Ashq Anjum, Maode Ma, Shiwen Mao
2021 IEEE Access  
The article ''Two-stage spatial mapping for multimodal data fusion in mobile crowd sensing,'' by Zhou et al., proposes a fusion and classification method for multimodal data.  ...  In the article ''Secure cooperative spectrum sensing strategy based on reputation mechanism for cognitive wireless sensor networks,'' by Luo, a secure cooperative spectrum sensing strategy is presented  ... 
doi:10.1109/access.2021.3092476 fatcat:wirzxkbrkfg7jmsk2vl67a7gnu

Learning Frameworks for Cooperative Spectrum Sensing and Energy-Efficient Data Protection in Cognitive Radio Networks

Vinh Do, Insoo Koo
2018 Applied Sciences  
We first design a new cooperative spectrum-sensing technique based on a convolutional neural network in which the FC uses historical sensing data to train the network for classification problem.  ...  The system is assumed to operate in a time-slotted manner.  ...  This scheme aims to find an optimal policy for the data encryption decision to maximize the long-term security level of the system.  ... 
doi:10.3390/app8050722 fatcat:ugsinjdmjrdxfhqusblgmthgiy

IEEE Access Special Section Editorial: Trusted Computing

Zheng Yan, Venu Govindaraju, Qinghua Zheng, Yan Wang
2020 IEEE Access  
To enhance data security in the process of publishing and transmission, the article ''Data provenance with retention of reference relations,'' by Wang et al., proposes a data provenance system with retention  ...  In social networking, IoT and Internet of Everything (IoE) systems, the issue is how to ensure data trust in its whole life cycle from data sensing, collection, pre-processing, transmission, to fusion,  ... 
doi:10.1109/access.2020.2969768 fatcat:il5i7ofsbrdgho6m6roodlrqsy

Editorial for Crowncom 2013 Special Issue

Xiuzhen Cheng, Danijela Cabric
2014 Journal on spesial topics in mobile networks and applications  
system. In order to obtain the calculated threshold, a simple method to assess the data rate of the secondary system is developed.  ...  A novel cooperative spectrum sensing (CSS) framework is designed, in which one SU's reporting time can be used for other SUs' sensing.  ... 
doi:10.1007/s11036-014-0530-y fatcat:eoabb3qxw5d53elexn7lhbn6oe

Flexible Fusion Structure-Based Performance Optimization Learning for Multisensor Target Tracking

Quanbo Ge, Zhongliang Wei, Tianfa Cheng, Shaodong Chen, Xiangfeng Wang
2017 Sensors  
to dynamically adjust the system fusion structure including sensors and fusion methods in a given adjustment period.  ...  Compared with the fixed fusion structure, the flexible fusion structure with mixed fusion methods has better adjustment performance for the complex air task network systems, and it can effectively help  ...  The survivability can be used for the nodes and the system. In this paper, it is used for the task network system.  ... 
doi:10.3390/s17051045 pmid:28481243 pmcid:PMC5469650 fatcat:iau4uug73bclzbxjaj5t5pl3ea

A survey on data provenance in IoT

Rui Hu, Zheng Yan, Wenxiu Ding, Laurence T. Yang
2019 World wide web (Bussum)  
Thus, secure routing protocols and data protection schemes need to be designed in this layer for protecting data security in IoT [1].  ...  In this paper, we first propose a number of design requirements of data provenance in IoT by analyzing the features of IoT data and applications.  ...  For different data types, the information collected by the provenance management system varies in granularity.  ... 
doi:10.1007/s11280-019-00746-1 fatcat:6b6ebd5turedfoomhhn6vqoqwu

Secure Prioritized Inter Cluster Channel Selection for Tracking User Attack in Cognitive Radio Networks

Chandra Sekhar Musinana, Kalyana Chakravarthy Chilukuri, Prasad Reddy
2018 International Journal of Security and Its Applications  
For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks.  ...  Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security  ...  By sensing channels apart from the one currently in use, the system will be able to build up a picture of alternative channels that can be used when the current one becomes occupied.  ... 
doi:10.14257/ijsia.2018.12.5.04 fatcat:j3x72rzdkvegblpe4q7lefl4ve

A primer on provenance

Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, Margo Selter, Andy Hopper
2014 Communications of the ACM  
ASSESSING THE QUALITY or validity of a piece of data is not usually done in isolation.  ...  You typically examine the context in which the data appears and try to determine its original sources or review the process through which it was created.  ...  Acknowledgments We would like to thank George Coulouris for his feedback and our reviewers for their constructive comments and suggestions.  ... 
doi:10.1145/2596628 fatcat:votcaprhhfe25laiohnm7tc7de

A Primer on Provenance

Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, Margo Seltzer, Andy Hopper
2014 Queue  
Assessing the quality or validity of a piece of data is not usually done in isolation.  ...  You typically examine the context in which the data appears and try to determine its original sources or review the process through which it was created.  ...  ACKNOWLEDGMENTS We would like to thank George Coulouris for his feedback and support in shaping this article toward its current form, and our reviewers for their constructive comments and suggestions.  ... 
doi:10.1145/2602649.2602651 fatcat:p2swocpz2vhjfbffuch4oseexu

Computational Intelligence in Multi-Source Data and Information Fusion

Todor Tagarev, Petya Ivanova
1999 Information & Security An International Journal  
complex dynamics of security processes. 24 In the quest for efficiency, the use of artificial NNs has been suggested.  ...  The usefulness of a fusion system is measured by the extent to which the system supports the intended decision process.  ... 
doi:10.11610/isij.0203 fatcat:4eiz7kofubev5cdt5drlkutlay
« Previous Showing results 1 — 15 out of 12,113 results