{"id":"https://openalex.org/W2891473325","doi":"https://doi.org/10.23919/icif.2018.8455568","title":"Security Issues for Distributed Fusion in Coalition Environments","display_name":"Security Issues for Distributed Fusion in Coalition Environments","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2891473325","doi":"https://doi.org/10.23919/icif.2018.8455568","mag":"2891473325"},"language":"en","primary_location":{"id":"doi:10.23919/icif.2018.8455568","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icif.2018.8455568","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 21st International Conference on Information Fusion (FUSION)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112348256","display_name":"Greg Cirincione","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Greg Cirincione","raw_affiliation_strings":["CISD, Army Research Lab, Adelphi, MD, USA"],"affiliations":[{"raw_affiliation_string":"CISD, Army Research Lab, Adelphi, MD, USA","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077318302","display_name":"Dinesh Verma","orcid":"https://orcid.org/0000-0003-1933-7343"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dinesh Verma","raw_affiliation_strings":["Distributed AI Dept, IBM TJ Watson Research Center, NY, USA"],"affiliations":[{"raw_affiliation_string":"Distributed AI Dept, IBM TJ Watson Research Center, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061694501","display_name":"Elisa Bertino","orcid":"https://orcid.org/0000-0002-4029-7051"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elisa Bertino","raw_affiliation_strings":["Dept of Computer Science, Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Dept of Computer Science, Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103191815","display_name":"Ananthram Swami","orcid":"https://orcid.org/0000-0003-1439-332X"},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ananthram Swami","raw_affiliation_strings":["CISD, Army Research Lab, Adelphi, MD, USA"],"affiliations":[{"raw_affiliation_string":"CISD, Army Research Lab, Adelphi, MD, USA","institution_ids":["https://openalex.org/I166416128"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5112348256"],"corresponding_institution_ids":["https://openalex.org/I166416128"],"apc_list":null,"apc_paid":null,"fwci":0.3691,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.6461767,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"830","last_page":"837"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.973800003528595,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sensor-fusion","display_name":"Sensor fusion","score":0.7498970627784729},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.734099268913269},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5718919634819031},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5601638555526733},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.46610602736473083},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18453636765480042},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17140576243400574},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12037244439125061}],"concepts":[{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.7498970627784729},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.734099268913269},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5718919634819031},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5601638555526733},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.46610602736473083},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18453636765480042},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17140576243400574},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12037244439125061}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icif.2018.8455568","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icif.2018.8455568","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 21st International Conference on Information Fusion (FUSION)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1571401318","https://openalex.org/W2061286996","https://openalex.org/W2089295423","https://openalex.org/W2170773937","https://openalex.org/W2767985535","https://openalex.org/W2782850674","https://openalex.org/W2810205687","https://openalex.org/W4244787281"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"When":[0],"sensor":[1,24,40,64],"fusion":[2,18,25,42,51,65],"operations":[3],"are":[4,19,80],"conducted":[5],"in":[6,53],"coalition":[7,104,117],"environments,":[8],"security":[9,58,91,115,124],"of":[10,78,94,116],"the":[11,36,45,50,56,61,90,98,111,123],"data":[12,37,74,99],"and":[13,43,49,92,97,119,127],"infrastructure":[14,26,62],"used":[15,38,87],"for":[16,39,63,73],"model":[17],"very":[20],"important.":[21],"AI":[22,82,126],"enabled":[23,83],"can":[27,85],"be":[28,86],"attacked":[29],"on":[30,35],"many":[31],"fronts,":[32],"including":[33],"attacks":[34,79],"information":[41],"disrupting":[44],"communication":[46],"between":[47],"devices":[48],"nodes,":[52],"addition":[54],"to":[55,88,121],"traditional":[57],"attacks.":[59],"As":[60],"becomes":[66],"more":[67],"automated":[68],"with":[69,114],"multiple":[70],"intelligent":[71],"assistants":[72],"collection,":[75],"different":[76],"types":[77],"possible.":[81],"approaches":[84,120],"improve":[89,122],"resiliency":[93],"federated":[95],"networks,":[96],"that":[100],"is":[101],"shared":[102],"across":[103],"problems.":[105],"In":[106],"this":[107],"paper,":[108],"we":[109],"discuss":[110],"challenges":[112],"associated":[113],"infrastructures,":[118],"using":[125],"machine":[128],"learning":[129],"techniques.":[130]},"counts_by_year":[{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
