{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:22:32Z","timestamp":1759134152607,"version":"3.37.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319264486"},{"type":"electronic","value":"9783319264509"}],"license":[{"start":{"date-parts":[[2015,12,20]],"date-time":"2015-12-20T00:00:00Z","timestamp":1450569600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-26450-9_4","type":"book-chapter","created":{"date-parts":[[2015,12,18]],"date-time":"2015-12-18T19:51:32Z","timestamp":1450468292000},"page":"71-100","source":"Crossref","is-referenced-by-count":2,"title":["Fuzzy Decision Fusion and Multiformalism Modelling in Physical Security Monitoring"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Flammini","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Marrone","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Mazzocca","sequence":"additional","affiliation":[]},{"given":"Valeria","family":"Vittorini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,20]]},"reference":[{"key":"4_CR1","unstructured":"Garcia, M.L.: The Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann, Boston (2001)"},{"key":"4_CR2","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/978-3-540-88181-0_12","volume":"53","author":"F Flammini","year":"2009","unstructured":"Flammini, F., Gaglione, A., Mazzocca, N., Moscato, V., Pragliola, C.: Wireless sensor data fusion for critical infrastructure security. Adv. Intell. Soft Comput. 53, 92\u201399 (2009)","journal-title":"Adv. Intell. Soft Comput."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Flammini, F., Gaglione, A., Ottello, F., Pappalardo, A., Pragliola, C., Tedesco, A.: Towards wireless sensor networks for railway infrastructure monitoring. In: Proceeding ESARS 2010, pp. 1\u20136, Bologna, Italy (2010)","DOI":"10.1109\/ESARS.2010.5665249"},{"key":"4_CR4","volume-title":"Multimodal Surveillance: Sensors, Algorithms and Systems","author":"Z Zhu","year":"2007","unstructured":"Zhu, Z., Huang, T.S.: Multimodal Surveillance: Sensors, Algorithms and Systems. Artech House Publisher, Boston (2007)"},{"issue":"3","key":"4_CR5","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1080\/14639220500370105","volume":"8","author":"C Wickens","year":"2007","unstructured":"Wickens, C., Dixon, S.: The benefits of imperfect diagnostic automation: a synthesis of the literature. Theor. Issues Ergon. Sci. 8(3), 201\u2013212 (2007)","journal-title":"Theor. Issues Ergon. Sci."},{"issue":"3","key":"4_CR6","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1016\/j.ejor.2006.01.041","volume":"178","author":"Ming Dong","year":"2007","unstructured":"Dong, M., He, D.: Hidden semi-Markov model-based methodology for multi-sensor equipment health diagnosis and prognosis Eur. J. Oper. Res. 178(3), 858\u2013878 (2007)","journal-title":"European Journal of Operational Research"},{"issue":"5","key":"4_CR7","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/TSMCB.2006.872269","volume":"36","author":"H Guo","year":"2006","unstructured":"Guo, H., Shi, W., Deng, Y.: Evaluating sensor reliability in classification problems based on evidence theory. IEEE Trans. Syst. Man Cybern. Part B: Cybern. 36(5), 970\u2013981 (2006). doi:\n                    10.1109\/TSMCB.2006.872269","journal-title":"IEEE Trans. Syst. Man Cybern. Part B: Cybern."},{"issue":"3","key":"4_CR8","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1109\/TPDS.2010.93","volume":"22","author":"Hong Luo","year":"2011","unstructured":"Luo, H., Tao, H., Ma, H., Das, S.K.: Data fusion with desired reliability in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 23(3), 501\u2013513 (2012)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"4_CR9","unstructured":"Flammini, F., Gaglione, A., Mazzocca, N., Pragliola, C.: DETECT: a novel framework for the detection of attacks to critical infrastructures. In: Martorell, et al. (eds.) Safety, Reliability and Risk Analysis: Theory, Methods and Applications, Proceedings of ESREL\u201908, pp. 105\u2013112 (2008)"},{"issue":"2","key":"4_CR10","first-page":"183","volume":"4","author":"F Flammini","year":"2009","unstructured":"Flammini, F., Gaglione, A., Mazzocca, N., Moscato, V., Pragliola, C.: On-line integration and reasoning of multi-sensor data to enhance infrastructure surveillance. J. Inf. Assur. Secur. (JIAS) 4(2), 183\u2013191 (2009)","journal-title":"J. Inf. Assur. Secur. (JIAS)"},{"issue":"3","key":"4_CR11","first-page":"269","volume":"81","author":"A Bobbio","year":"2003","unstructured":"Bobbio, A., Ciancamerla, E., Franceschinis, G., Gaeta, R., Minichino, M., Portinale, L.: Sequential application of heterogeneous models for the safety analysis of a control system: a case study. RESS 81(3), 269\u2013280 (2003)","journal-title":"RESS"},{"issue":"01","key":"4_CR12","doi-asserted-by":"publisher","first-page":"1450001","DOI":"10.1142\/S0218539314500016","volume":"21","author":"FRANCESCO FLAMMINI","year":"2014","unstructured":"Flammini, F., Marrone, S., Iacono, M., Mazzocca, N., Vittorini, V.: A Multiformalism Modular Approach to ERTMS\/ETCS Failure Modelling. Int. J. Reliab. Qual. Saf. Eng. Vol. 21(1) 450001 World Scientific Publishing Company (2014). doi:\n                    10.1142\/S0218539314500016","journal-title":"International Journal of Reliability, Quality and Safety Engineering"},{"issue":"9","key":"4_CR13","first-page":"1422","volume":"94","author":"F Flammini","year":"2009","unstructured":"Flammini, F., Marrone, S., Mazzocca, N., Vittorini, V.: A new modelling approach to the safety evaluation of N-modular redundant computer systems in presence of imperfect maintenance. RESS 94(9), 1422\u20131432 (2009)","journal-title":"RESS"},{"key":"4_CR14","first-page":"191","volume-title":"Lecture Notes in Computer Science","author":"Francesco Flammini","year":"2011","unstructured":"Flammini, F., Mazzocca, N., Pappalardo, A., Pragliola, C., Vittorini, V.: Augmenting surveillance system capabilities by exploiting event correlation and distributed attack detection. In: Proceeding 2011 International Workshop on Security and Cognitive Informatics for Homeland Defence (SeCIHD\u201911), LNCS 6908, pp. 191\u2013204 (2011)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Bocchetti, G., Flammini, F., Pragliola, C., Pappalardo, A.: Dependable integrated surveillance systems for the physical security of metro railways. In: IEEE Proceeding of 3rd ACM\/IEEE International Conference on Distributed Smart Cameras (ICDSC 2009), pp. 1\u20137 (2009)","DOI":"10.1109\/ICDSC.2009.5289385"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Flammini, F., Pappalardo, A., Pragliola, C., Vittorini, V.: A robust approach for on-line and off-line threat detection based on event tree similarity analysis. In: Proceeding of Workshop on Multimedia Systems for Surveillance (MMSS), pp. 414\u2013419 (2011)","DOI":"10.1109\/AVSS.2011.6027364"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Flammini, F., Pappalardo, A., Vittorini, V.: Challenges and emerging paradigms for augmented surveillance. In: Effective Surveillance for Homeland Security: Combining Technology and Social Issues. Taylor & Francis\/CRC Press, Boca Raton (2013) To appear","DOI":"10.1201\/b14839"},{"issue":"5","key":"4_CR18","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1109\/TSMCC.2010.2042446","volume":"40","author":"T D R\u00e4ty","year":"2010","unstructured":"R\u00e4ty, T.D.: Survey on contemporary remote surveillance systems for public safety. IEEE Trans. Sys. Man Cyber Part C, No. 40, 5, 493\u2013515 (2010)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"4_CR19","unstructured":"Hunt, S.: Physical security information management (PSIM): The basics. \n                    http:\/\/www.csoonline.com\/article\/622321\/physical-security-information-management-psim-the-basics\n                    \n                   (2011)"},{"key":"4_CR20","unstructured":"Frost & Sullivan: Analysis of the Worldwide Physical Security Information Management Market. \n                    http:\/\/www.cnlsoftware.com\/media\/reports\/Analysis_Worldwide_Physical_Security_Information_Management_Market.pdf\n                    \n                   (2012)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Ortmann, S., Langendoerfer, P: Enhancing reliability of sensor networks by fine tuning their event observation behavior. In: Proceeding 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM \u201808). IEEE (2008)","DOI":"10.1109\/WOWMOM.2008.4594886"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Bahrepour, M., Meratnia, N., Havinga, P.J.M.: Sensor fusion-based event detection in wireless sensor networks. In: 6th Annual International Conference MobiQuitous 2009, 13\u201316 July 2009","DOI":"10.4108\/ICST.MOBIQUITOUS2009.7056"},{"issue":"1","key":"4_CR23","doi-asserted-by":"publisher","first-page":"806","DOI":"10.3390\/s120100806","volume":"12","author":"I Silva","year":"2012","unstructured":"Silva, I., Guedes, L.A., Portugal, P., Vasques, F.: Reliability and availability evaluation of wireless sensor networks for industrial applications. Sensors 12(1), 806\u2013838 (2012)","journal-title":"Sensors"},{"key":"4_CR24","unstructured":"Legg, J.A.: Distributed multisensor fusion system specification and evaluation issues. Defence Science and Technology Organisation, Edinburgh, South Australia 5111, Australia (2005)"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Tang, L.-A., Yu, X., Kim, S., Han, J., Hung, C.-C., Peng, W.-C.: Tru-Alarm: Trustworthiness analysis of sensor networks in cyber-physical systems. In: ICDM \u201810, IEEE Computer Society, Washington, USA (2010)","DOI":"10.1109\/ICDM.2010.63"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Karimaa, A.: Efficient video surveillance: performance evaluation in distributed video surveillance systems. In: Lin, W., (ed.) Video Surveillance, ISBN: 978-953-307-436-8, InTech (2011)","DOI":"10.5772\/15259"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Flammini, F., Gentile, U., Marrone, S., Nardone, R., Vittorini, V.: A petri net pattern-oriented approach for the design of physical protection systems. In: proceedings of Computer Safety, Reliability, and Security; LNCS 8666, 230\u2013245 (2014)","DOI":"10.1007\/978-3-319-10506-2_16"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Drago, A., Marrone, S., Mazzocca, N., Tedesco, A., Vittorini, V.: Model-Driven Estimation of Distributed Vulnerability in Complex Railway Networks. In: Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on Autonomic and Trusted Computing (UIC\/ATC), pp.380\u2013387, 18\u201321 Dec. 2013 doi:\n                    10.1109\/UIC-ATC.2013.78","DOI":"10.1109\/UIC-ATC.2013.78"},{"issue":"2","key":"4_CR29","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s10796-008-9127-y","volume":"12","author":"E Bagheri","year":"2010","unstructured":"Bagheri, E., Ghorbani, A.A.: UML-CI: a reference model for profiling critical infrastructure systems. Inf. Syst. Frontiers 12(2), 115\u2013139 (2010)","journal-title":"Inf. Syst. Frontiers"},{"key":"4_CR30","unstructured":"Marrone, S., Nardone, R., Tedesco, A., D\u2019Amore, P., Vittorini, V., Setola, R., Cillis, F.D., Mazzocca, N.: Vulnerability modeling and analysis for critical infrastructure protection applications. Int. J. Crit. Infrastruct. Prot. 6(34), 217\u2013227 (2013). doi:\n                    http:\/\/dx.doi.org\/"},{"issue":"10","key":"4_CR31","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1093\/comjnl\/BXU096","volume":"58","author":"Ricardo J. Rodr\u00edguez","year":"2014","unstructured":"Rodr\u00ecguez, R.J., Merseguer, J., Bernardi, S.: Modelling security of critical infrastructures: a survivability assessment. Comput. J. (2014). doi:\n                    10.1093\/comjnl\/BXU096","journal-title":"The Computer Journal"},{"issue":"1","key":"4_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0169-023X(94)90006-X","volume":"14","author":"S Chakravarthy","year":"1994","unstructured":"Chakravarthy, S., Mishra, D.: Snoop, an expressive event specification language for active databases. Data Knowl. Eng. 14(1), 1\u201326 (1994)","journal-title":"Data Knowl. Eng."},{"key":"4_CR33","unstructured":"Charniak, E.: Bayesian Networks without Tears, AI Magazine, 1991"},{"key":"4_CR34","unstructured":"Ajmone-Marsan, M., Balbo, G., Conte, G., Donatelli S., Franceschinis, G.: Modelling with Generalized Stochastic Petri Nets; Wiley Series in Parallel Computing. John Wiley and Sons, New York ISBN: 0\u2013471-93059-8 (1995)"},{"key":"4_CR35","unstructured":"National Consortium for the Study of Terrorism and Responses to Terrorism (START).: Global Terrorism Database [199503200014] (2012). \n                    http:\/\/www.start.umd.edu\/gtd"}],"container-title":["Studies in Computational Intelligence","Recent Advances in Computational Intelligence in Defense and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26450-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T21:15:23Z","timestamp":1559337323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26450-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,20]]},"ISBN":["9783319264486","9783319264509"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26450-9_4","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2015,12,20]]}}}