2015
DOI: 10.1007/978-3-319-26567-4_17
|View full text |Cite
|
Sign up to set email alerts
|

Situational Awareness Using Distributed Data Fusion with Evidence Discounting

Abstract: HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d'enseignement et de recherche français ou étrangers, des labor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Moreover, a disaster can, temporarily or permanently, damage also data centres hosting the core services or cloud services. As disasters often affect people, communication networks are viewed as an essential part of the critical infrastructure [16] allowing us to communicate and providing emergency communications between citizens and authorities. Therefore, in a post-disaster period, we can often observe a substantial increase in the network traffic demand volume, which is hard to serve in a network already affected by a disaster event and contributes to network saturation and service unavailability.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, a disaster can, temporarily or permanently, damage also data centres hosting the core services or cloud services. As disasters often affect people, communication networks are viewed as an essential part of the critical infrastructure [16] allowing us to communicate and providing emergency communications between citizens and authorities. Therefore, in a post-disaster period, we can often observe a substantial increase in the network traffic demand volume, which is hard to serve in a network already affected by a disaster event and contributes to network saturation and service unavailability.…”
Section: Introductionmentioning
confidence: 99%
“…A considerable amount of research has focused on the development of intrusion/anomaly detection systems. Different strategies have been suggested by embracing diverse techniques such as classification [19], [20], multivariate statistical analysis, principal component analysis [21], [22], and data fusion [23]- [25].…”
Section: Introductionmentioning
confidence: 99%