This paper studies how to deploy sensors in the context of detection in adversarial environments. A fusion center is performing a binary hypothesis testing based on measurements from remotely deployed heterogeneous sensors. An attacker may compromise some of the deployed sensors, which send arbitrary measurements to the fusion center. The problems of interest are: to characterize the performance of the system under attack and, thus, develop a performance metric; and to deploy sensors within a cost budget, such that the proposed performance metric is maximized. In this paper, we first present a performance metric by formulating the detection in adversarial environments in a game theoretic way. A Nash equilibrium pair of the detection algorit...
Given the increasing importance of optimal sensor deployment for battlefield strategists, the conve...
In this thesis, we develop mathematical models for the optimal deployment of security forces address...
© 2020 IEEE.This paper investigates a moving target defense strategy based on detector threshold swi...
This paper studies how to deploy sensors in the context of detection in adversarial environments. A ...
We propose new game theoretic approaches to estimate a binary random variable based on sensor measur...
We consider a two-player network inspection game, in which a defender positions heterogeneous sensor...
We consider the problem of optimally allocating static and dynamic detection resources in order to d...
Abstract—Insufficiency of memory and battery power of sensors makes the security of sensor networks ...
The data collected by sensor networks often contain sensitive information and care must be taken to ...
We consider the problem of providing surveillance to a grid area using multiple heterogeneous UAVs, ...
Every day we share our personal information through digital systems which are constantly exposed to ...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
International audienceEnforcing security in a network always comes with a trade-off regarding budget...
In this paper, a distributed detection model is introduced for m-ary hypotheses testing where the lo...
In this thesis, we develop mathematical models for the optimal deployment of security forces address...
Given the increasing importance of optimal sensor deployment for battlefield strategists, the conve...
In this thesis, we develop mathematical models for the optimal deployment of security forces address...
© 2020 IEEE.This paper investigates a moving target defense strategy based on detector threshold swi...
This paper studies how to deploy sensors in the context of detection in adversarial environments. A ...
We propose new game theoretic approaches to estimate a binary random variable based on sensor measur...
We consider a two-player network inspection game, in which a defender positions heterogeneous sensor...
We consider the problem of optimally allocating static and dynamic detection resources in order to d...
Abstract—Insufficiency of memory and battery power of sensors makes the security of sensor networks ...
The data collected by sensor networks often contain sensitive information and care must be taken to ...
We consider the problem of providing surveillance to a grid area using multiple heterogeneous UAVs, ...
Every day we share our personal information through digital systems which are constantly exposed to ...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
International audienceEnforcing security in a network always comes with a trade-off regarding budget...
In this paper, a distributed detection model is introduced for m-ary hypotheses testing where the lo...
In this thesis, we develop mathematical models for the optimal deployment of security forces address...
Given the increasing importance of optimal sensor deployment for battlefield strategists, the conve...
In this thesis, we develop mathematical models for the optimal deployment of security forces address...
© 2020 IEEE.This paper investigates a moving target defense strategy based on detector threshold swi...