Proceedings of the 2nd International Conference on Bio-Inspired Models of Network Information and Computing Systems 2007
DOI: 10.4108/icst.bionetics2007.2478
|View full text |Cite
|
Sign up to set email alerts
|

Self-organizing mobile surveillance security networks

Abstract: We develop and evaluate ASK-ASSIST, a decision support system that enables automatically setting up communication networks and sharing knowledge amongst security personnel, in particular when they are confronted with a series of unexpected incidents while on patrol. Currently, team leaders of mobile security guards are still forced to assess the consequences of a series of incidents and to take decisions in a heuristic way. On the basis of incomplete and uncertain information they have to determine the securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Compared to wired network system, mobile network systems are much more vulnerable to security problems [1]. For example, insofar as there is not a precisely defined physical boundary of the mobile network, as soon as an adversary comes in the radio range of a node, he can communicate with that node and thus launch a malicious attack on it [2]; these attacks include eavesdropping, phishing, war driving, and denial of service (DoS) attack [3]. As a result, there is a pressing need to design countermeasures for network attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Compared to wired network system, mobile network systems are much more vulnerable to security problems [1]. For example, insofar as there is not a precisely defined physical boundary of the mobile network, as soon as an adversary comes in the radio range of a node, he can communicate with that node and thus launch a malicious attack on it [2]; these attacks include eavesdropping, phishing, war driving, and denial of service (DoS) attack [3]. As a result, there is a pressing need to design countermeasures for network attacks.…”
Section: Introductionmentioning
confidence: 99%