lnu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Improving the dependability of distributed surveillance systems using diverse redundant detectors
Ansaldo STS, Italy.ORCID iD: 0000-0002-2833-7196
University of Naples “Federico II”, Italy.
Ansaldo STS, Italy ; University of Naples “Federico II”, Italy.
Ansaldo STS, Italy.
Show others and affiliations
2015 (English)In: Dependability Problems of Complex Information Systems / [ed] Zamojski W., Sugier J., Springer, 2015, p. 35-53Conference paper, Published paper (Refereed)
Abstract [en]

Sensor networks nowadays employed in critical monitoring and surveillance applications represent a relevant case of complex information infrastructures whose dependability needs to be carefully assessed. Detection models based on Event Trees provide a simple and effective mean to correlate events in Physical Security Information Management (PSIM) systems. However, as a deterministic modeling approach, Event Trees are not able to address uncertainties in practical applications, like: 1) imperfect threat modelling; 2) sensor false alarms. Regarding point (1), it is quite obvious that real-world threat scenarios can be very variable and it is nearly impossible to consider all the possible combinations of events characterizing a threat. Point (2) addresses the possibility of missed detections due to sensor faults and the positive/nuisance false alarms that any real sensor can generate. In this chapter we describe two techniques that can be adopted to deal with those uncertainties. The first technique is based on Event Tree heuristic distance metrics. It allows to generate warnings whenever a threat scenario is detected and it is similar to the ones in the knowledge base repository. The second technique allows to measure in real-time the estimated trustworthiness of event detection based on: a) sensors false alarm rates; b) uncertainties indices associated to correlation operators. We apply those techniques to case-studies of physical security for metro railways. © Springer International Publishing Switzerland 2015

Place, publisher, year, edition, pages
Springer, 2015. p. 35-53
Series
Advances in Intelligent Systems and Computing, ISSN 2194-5357 ; 307
Keywords [en]
Dependability, False Alarms, Fuzzy Logic, Physical Security Information Management, Situation Recognition, Soft Computing, Alarm systems, Complex networks, Computation theory, Errors, Knowledge based systems, Mobile security, Network security, Security of data, Sensor networks, Uncertainty analysis, Complex information, Deterministic modeling, Distributed surveillance systems, Physical security, Surveillance applications, Information management
National Category
Embedded Systems
Research subject
Computer and Information Sciences Computer Science, Computer Science
Identifiers
URN: urn:nbn:se:lnu:diva-73652DOI: 10.1007/978-3-319-08964-5_3Scopus ID: 2-s2.0-84927633948ISBN: 9783319089638 (print)ISBN: 9783319089645 (electronic)OAI: oai:DiVA.org:lnu-73652DiVA, id: diva2:1213277
Conference
-
Available from: 2018-06-04 Created: 2018-06-04 Last updated: 2018-06-07Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Flammini, Francesco

Search in DiVA

By author/editor
Flammini, Francesco
Embedded Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 18 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf