lnu.sePublikasjoner
Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Trustworthiness evaluation of multi-sensor situation recognition in transit surveillance scenarios
Ansaldo STS, Italy. (CPS)ORCID-id: 0000-0002-2833-7196
Seconda Università di Napoli, Italy.
Università “Federico II” di Napoli, Italy.
Ansaldo STS, Italy.
Vise andre og tillknytning
2013 (engelsk)Inngår i: Security Engineering and Intelligence Informatics. CD-ARES 2013 / [ed] Cuzzocrea A., Kittl C., Simos D.E., Weippl E., Xu L., Springer, 2013, s. 442-456Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Physical Security Information Management (PSIM) systems are a recent introduction in the surveillance of critical infrastructures, like those used for mass-transit. In those systems, different sensors are integrated as separate event detection devices, each of them generating independent alarms. In order to lower the rate of false alarms and provide greater situation awareness for surveillance operators, we have developed a framework-namely DETECT-for correlating information coming from multiple heterogeneous sensors. DETECT uses detection models based on (extended) Event Trees in order to generate higher level warnings when a known threat scenario is being detected. In this paper we extend DETECT by adopting probabilistic models for the evaluation of threat detection trustworthiness on reference scenarios. The approach also allows for a quantitative evaluation of model sensitivity to sensor faults. The results of a case-study in the transit system domain demonstrate the increase of trust one could expect when using scenarios characterized in a probabilistic way for the threat detection instead of single-sensor alarms. Furthermore, we show how a model analysis can serve at design time to support decisions about the type and redundancy of detectors. © IFIP International Federation for Information Processing 2013.

sted, utgiver, år, opplag, sider
Springer, 2013. s. 442-456
Serie
Lecture Notes in Computer Science, ISSN 0302-9743 ; 8128
Emneord [en]
Event correlation, Physical security, Probabilistic modelling, Quantitative evaluation, Sensor and data analysis, Trustworthiness, Information management, Information retrieval systems, Information science, Monitoring, Network security, Security systems, Sensors
HSV kategori
Forskningsprogram
Datavetenskap, Programvaruteknik
Identifikatorer
URN: urn:nbn:se:lnu:diva-73657DOI: 10.1007/978-3-642-40588-4_31Scopus ID: 2-s2.0-84892890122ISBN: 9783642405877 (tryckt)OAI: oai:DiVA.org:lnu-73657DiVA, id: diva2:1213291
Konferanse
CD-ARES 2013 Workshops: 2nd International Workshop on Modern Cryptography and Security Engineering, MoCrySEn 2013 and 3rd International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2013; Regensburg; Germany; 2-6 September 2013;
Tilgjengelig fra: 2018-06-04 Laget: 2018-06-04 Sist oppdatert: 2019-03-07bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

Forlagets fulltekstScopus

Personposter BETA

Flammini, Francesco

Søk i DiVA

Av forfatter/redaktør
Flammini, Francesco

Søk utenfor DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric

doi
isbn
urn-nbn
Totalt: 51 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf