Please use this identifier to cite or link to this item:
|Title:||Adversary aware surveillance systems|
|Source:||Singh, V.K., Kankanhalli, M.S. (2009). Adversary aware surveillance systems. IEEE Transactions on Information Forensics and Security 4 (3) : 552-563. ScholarBank@NUS Repository. https://doi.org/10.1109/TIFS.2009.2026459|
|Abstract:||We consider surveillance problems to be a set of system-adversary interaction problems in which an adversary can be modeled as a rational (selfish) agent trying to maximize his utility. We feel that appropriate adversary modeling can provide deep insights into the system performance and also clues for optimizing the system's performance against the adversary. Further, we propose that system designers should exploit the fact that they can impose certain restrictions on the intruders and the way they interact with the system. The system designers can analyze the scenario to determine conditions under which system outperforms the adversaries, and then suitably reengineer the environment under a scenario engineering approach to help the system outperform the adversary. We study the proposed enhancements using a game theoretic framework and present results of their adaptation to two significantly different surveillance scenarios. While the precise enforcements for the studied zero-sum ATM lobby monitoring scenario and the nonzero-sum traffic monitoring scenario were different, they lead to some useful generic guidelines for surveillance system designers. © 2006 IEEE.|
|Source Title:||IEEE Transactions on Information Forensics and Security|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on Feb 15, 2018
WEB OF SCIENCETM
checked on Feb 7, 2018
checked on Feb 20, 2018
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.