lnu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Trustworthiness evaluation of multi-sensor situation recognition in transit surveillance scenarios
Ansaldo STS, Italy.ORCID iD: 0000-0002-2833-7196
Seconda Università di Napoli, Italy.
Università “Federico II” di Napoli, Italy.
Ansaldo STS, Italy.
Show others and affiliations
2013 (English)In: Security Engineering and Intelligence Informatics. CD-ARES 2013 / [ed] Cuzzocrea A., Kittl C., Simos D.E., Weippl E., Xu L., Springer, 2013, p. 442-456Conference paper, Published paper (Refereed)
Abstract [en]

Physical Security Information Management (PSIM) systems are a recent introduction in the surveillance of critical infrastructures, like those used for mass-transit. In those systems, different sensors are integrated as separate event detection devices, each of them generating independent alarms. In order to lower the rate of false alarms and provide greater situation awareness for surveillance operators, we have developed a framework-namely DETECT-for correlating information coming from multiple heterogeneous sensors. DETECT uses detection models based on (extended) Event Trees in order to generate higher level warnings when a known threat scenario is being detected. In this paper we extend DETECT by adopting probabilistic models for the evaluation of threat detection trustworthiness on reference scenarios. The approach also allows for a quantitative evaluation of model sensitivity to sensor faults. The results of a case-study in the transit system domain demonstrate the increase of trust one could expect when using scenarios characterized in a probabilistic way for the threat detection instead of single-sensor alarms. Furthermore, we show how a model analysis can serve at design time to support decisions about the type and redundancy of detectors. © IFIP International Federation for Information Processing 2013.

Place, publisher, year, edition, pages
Springer, 2013. p. 442-456
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 8128
Keywords [en]
Event correlation, Physical security, Probabilistic modelling, Quantitative evaluation, Sensor and data analysis, Trustworthiness, Information management, Information retrieval systems, Information science, Monitoring, Network security, Security systems, Sensors
National Category
Embedded Systems
Research subject
Computer Science, Software Technology
Identifiers
URN: urn:nbn:se:lnu:diva-73657DOI: 10.1007/978-3-642-40588-4_31Scopus ID: 2-s2.0-84892890122ISBN: 9783642405877 (print)OAI: oai:DiVA.org:lnu-73657DiVA, id: diva2:1213291
Conference
CD-ARES 2013 Workshops: 2nd International Workshop on Modern Cryptography and Security Engineering, MoCrySEn 2013 and 3rd International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2013; Regensburg; Germany; 2-6 September 2013;
Available from: 2018-06-04 Created: 2018-06-04 Last updated: 2018-06-05Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Flammini, Francesco

Search in DiVA

By author/editor
Flammini, Francesco
Embedded Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf