A Networked Evidence Theory Framework for Critical Infrastructure Modeling
نویسندگان
چکیده
This paper describes a distributed approach for data fusion and information sharing based on evidence theory and the transferable belief model. Evidence theory aggregates data generated from different sources in order to better assess an ongoing situation and to aid in the response and decision making processes. In the domain of critical infrastructure protection, researchers are forced to develop distributed approaches for modeling and control with a minimal exchange of data due to the existence of multiple stakeholders and interconnections between infrastructure components. Evidence theory permits the modeling of uncertainty in data fusion, but it is typically applied in a centralized manner. This paper proposes a decentralized extension of the transferable belief model that facilitates the application of evidence theory to data fusion in critical infrastructure applications. A case study is provided to demonstrate the convergence of results similar to the centralized approach, and to show the utility of fusing data in a distributed manner for interdependent critical infrastructure systems.
منابع مشابه
Computing Randomized Security Strategies in Networked Domains
Traditionally, security decisions have been made without explicitly accounting for adaptive, intelligent attackers. Recent game theoretic security models have explicitly included attacker response in computing randomized security policies. Techniques to date, however, generally fail to explicitly account for interdependence between the targets to be secured, which is of vital importance in a va...
متن کاملDesign of Observer-based H∞ Controller for Robust Stabilization of Networked Systems Using Switched Lyapunov Functions
In this paper, H∞ controller is synthesized for networked systems subject to random transmission delays with known upper bound and different occurrence probabilities in the both of feedback (sensor to controller) and forward (controller to actuator) channels. A remote observer is employed to improve the performance of the system by computing non-delayed estimates of the sates. The closed-loop s...
متن کاملKoreaâs Growth, Trade and Energy Imports: New Evidence for Regional Comprehensive Partnership Analysis
The paper uses economic and energy data analysis and econometric modeling to study the prospects and challenges of Koreaâs 2003 FTA Roadmap (MOFAT 2013) in the form of potential comprehensive partnerships with its major trade and energy partners. It first reviews Koreaâs international economic and trade relations in recent years with a focus on its major merchandise export destinations an...
متن کاملA Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture)
There has been a growing interest in decision and game theoretic approaches to networked system security as evidenced by the increasing number of publications and conferences such as the Conference on Decision and Game Theory for Security (GameSec). This presentation aims to give an overview on security games and their applications to network and critical infrastructure security based on the re...
متن کاملMulti-theory model of behavior change: an appropriate model for creating health behaviors
Evolving evidence shows that health promotion interventions that explicitly use models and theories that are rooted in social and behavioral sciences, are more effective than interventions without a theoretical framework [1]. Testing theories and models is a critical step that should be conducted before utilizing them for intervention development [2].
متن کامل