28 April 2010 Application of the JDL data fusion process model for cyber security
Author Affiliations +
Abstract
A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.
© (2010) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Nicklaus A. Giacobe, Nicklaus A. Giacobe, } "Application of the JDL data fusion process model for cyber security", Proc. SPIE 7710, Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2010, 77100R (28 April 2010); doi: 10.1117/12.850275; https://doi.org/10.1117/12.850275
PROCEEDINGS
10 PAGES


SHARE
Back to Top