Cognitive Radar Information Networks for Security - Enhancing Risk Mitigation for Reducing Operator Overload

被引:0
|
作者
Nohara, Tim J. [1 ]
Eng, P. [1 ]
Haykin, Simon [2 ]
机构
[1] Accipiter Radar Technol Inc, Niagara, ON, Canada
[2] McMaster Univ, Hamilton, ON, Canada
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The paper presents a practical foundation for building and deploying affordable, cognitive radar information networks (CRINs) to secure large, unmanned borders such as the 3,700 km Canada/U.S. border that runs through the Great Lakes. The proposed systems and methods are novel and necessary if radar's future in the 21st century is to embody the risk management principles needed to optimize system and operator resources for detection of suspicious target behaviour. Human cognitive abilities of attention and intelligence are proposed as cardinal characteristics that are built into CRINs to provide force multiplication and reduce operator overload.
引用
收藏
页数:6
相关论文
共 42 条
  • [1] Security risk mitigation for information systems
    Page, V.
    Dixon, M.
    Choudhury, I.
    BT TECHNOLOGY JOURNAL, 2007, 25 (01) : 118 - 127
  • [2] Security in cognitive radio networks: Threats and mitigation
    Clancy, T. Charles
    Goergen, Nathan
    2008 3RD INTERNATIONAL CONFERENCE ON COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND COMMUNICATIONS, 2008, : 440 - 447
  • [3] Providing Ambient Information as Comfortable Sound for Reducing Cognitive Overload
    Ikeuchi, Kohki
    AlSada, Mohammed
    Nakajima, Tatsuo
    12TH ADVANCES IN COMPUTER ENTERTAINMENT TECHNOLOGY CONFERENCE (ACE15), 2015,
  • [4] Information security risk assessment, aggregation, and mitigation
    Lenstra, A
    Voss, T
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 391 - 401
  • [5] Enhancing Security Using the Discarded Security Information in Mobile WiMAX Networks
    Kim, Youngwook
    Bahk, Saewoong
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [6] Linear Precoding Techniques in Enhancing Security of Cognitive Radio Networks
    Sultana, R.
    Sarkar, M. Z. I.
    Hossain, M. S.
    2016 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER & TELECOMMUNICATION ENGINEERING (ICECTE), 2016,
  • [7] A Method For Information Security Risk Aassessment Based On Fuzzy Operator
    Ye, ShiChao
    Wu, KeHe
    Niu, YuGuang
    ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 454 - +
  • [8] Network Security Risk Mitigation Using Bayesian Decision Networks
    Khosravi-Farmad, Masoud
    Rezaee, Razieh
    Harati, Ahad
    Bafghi, Abbas Ghaemi
    2014 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2014, : 267 - 272
  • [9] Evaluation of Cognitive Radar Networks with Joint Adaptive Beamforming for Multipath Effect Mitigation
    Bae, Junhyeong
    Baker, Chris J.
    Antoniou, Michail
    2024 IEEE RADAR CONFERENCE, RADARCONF 2024, 2024,
  • [10] Schedule Strategy Considering the Overload Violation Risk to the Security Region in Distribution Networks
    Jia, Jiacheng
    Yin, Guiliang
    Sun, Lingling
    Abu-Siada, Ahmed
    ENERGIES, 2022, 15 (23)