Introduction.- Preliminaries.- Security attacks and defenses in distributed sensor networks.- A Heuristic defense: A soft isolation algorithm for adversarial decision fusion.- Optimum decision fusion in the presence of Byzantines.- Nearly optimum decision fusion via message passing.- Decision fusion of hidden-Markov observations with synchronized attacks.- Decision fusion with unbalanced priors.- Decision fusion game with incomplete knowledge in a Bayesian setup.- Conclusions.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want