2014 World Automation Congress (WAC) 2014
DOI: 10.1109/wac.2014.6936187
|View full text |Cite
|
Sign up to set email alerts
|

Tiered architecture for threat detection and containment using system of wireless embedded sensors and robots

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Threat-aware deployment of sensors and systems of robots can work in pair to identify, evaluate, quarantine and hold threats. [125] presents a model, a scheme and a categorized architectural operation of a threat detection system. Using a convergent architecture, [125] propose a varied set of operationally independent systems, ranging from in situ sensors, sensor robots (mobile sensors) to aerial reconnaissance sensors, each of which is capable of working in combination.…”
Section: Threat Containmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Threat-aware deployment of sensors and systems of robots can work in pair to identify, evaluate, quarantine and hold threats. [125] presents a model, a scheme and a categorized architectural operation of a threat detection system. Using a convergent architecture, [125] propose a varied set of operationally independent systems, ranging from in situ sensors, sensor robots (mobile sensors) to aerial reconnaissance sensors, each of which is capable of working in combination.…”
Section: Threat Containmentmentioning
confidence: 99%
“…[125] presents a model, a scheme and a categorized architectural operation of a threat detection system. Using a convergent architecture, [125] propose a varied set of operationally independent systems, ranging from in situ sensors, sensor robots (mobile sensors) to aerial reconnaissance sensors, each of which is capable of working in combination. As a way to improve the handling of a threat, [125] suggest a deployment strategy arranging in order of rank, which is especially attentive to data integrity and false alarm lessening [125].…”
Section: Threat Containmentmentioning
confidence: 99%