Login / Signup
) based on fusion approach: Challenges, threats and implications in cybersecurity.
Dragan Korac
Boris Damjanovic
Dejan Simic
Kim-Kwang Raymond Choo
Published in:
J. King Saud Univ. Comput. Inf. Sci. (2022)
Keyphrases
</>
potential impact
key issues
technical challenges
data fusion
lessons learned
countermeasures
fusion method
data sets
open issues
real world
data mining
image processing
information security
image fusion
application scenarios
sensor fusion
security threats