2017
DOI: 10.1007/978-3-319-89935-0_20
|View full text |Cite
|
Sign up to set email alerts
|

Large Scale Surveillance, Detection and Alerts Information Management System for Critical Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Nevertheless, in this subsection, comparison of the proposed to three existing schemes is provided. In particular: (a) the complexity of the proposed scheme is compared to the complexity of a linear scheme [69], where the concept of omni-directional propagation of the blast wave is presented, (b) the threat notification time of the proposed scheme is compared to the one presented in [70], where sensors/cameras are mounted along the perimeter fence of a CI and (c) the estimated surveillance equipment cost of the proposed scheme is compared to the cost of [71], where surveillance of the area of a CI is accomplished by a grid of sensors.…”
Section: Comparison To Other Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Nevertheless, in this subsection, comparison of the proposed to three existing schemes is provided. In particular: (a) the complexity of the proposed scheme is compared to the complexity of a linear scheme [69], where the concept of omni-directional propagation of the blast wave is presented, (b) the threat notification time of the proposed scheme is compared to the one presented in [70], where sensors/cameras are mounted along the perimeter fence of a CI and (c) the estimated surveillance equipment cost of the proposed scheme is compared to the cost of [71], where surveillance of the area of a CI is accomplished by a grid of sensors.…”
Section: Comparison To Other Approachesmentioning
confidence: 99%
“…This time is enough for trained forces to stop a possible attack. On the other hand, in [70] sensors/cameras are mounted along the perimeter fence of a CI. Even if a truck can be detected and its size can be estimated at every point of the field of view of a fence-mounted sensor/camera, in several cases the structure and morphology of the roads do not allow large radiuses of surveillance, for the specific settings and for the performed experiments.…”
Section: Figure 12mentioning
confidence: 99%
“…[8]. With the recent advancement in IoT, large streams of big data can be generated and from which critical knowledge can be extracted in real-time using machines reasoning in order to understand threats and/or attacks on urban spaces with high context awareness [9], [10]. The MAIDS twin of S4AllCities SoS, adopts the JDL data fusion framework, for big data processing and analytics while it can efficiently organize them at various fusion levels, which themselves are levels of cyber-physical situational awareness.…”
Section: Data Fusion Modelling and Reasoningmentioning
confidence: 99%
“…The Joint Directorate of Laboratories model (JDL) is a common framework for enabling situational awareness for decision support contexts. Initially developed for military systems, its use in large-scale critical infrastructure monitoring has been an effective framework to drive a structured and scalable information fusion system that incorporates the user with machine-driven analytics [27]. With respect to cyber defence, a lack of literature has been delivered applying the JDL framework.…”
Section: Jdl Modelmentioning
confidence: 99%