Analysis of ways to secure group control for autonomous mobile robots
暂无分享,去创建一个
[1] Elena Basan,et al. Trust management system for mobile cluster-based wireless sensor network , 2015, SIN.
[2] Jinyuan You,et al. POM-a mobile agent security model against malicious hosts , 2000, Proceedings Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region.
[3] Allan Tomlinson,et al. Threats to the Swarm: Security Considerations for Swarm Robotics , 2009 .
[4] Andrei V. Gurtov,et al. TRUST AND REPUTATION MODEL DESIGN FOR OBJECTS OF MULTI-AGENT ROBOTICS SYSTEMS WITH DECENTRALIZED CONTROL , 2017 .
[5] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[6] George Loukas,et al. Decision tree-based detection of denial of service and command injection attacks on robotic vehicles , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[7] Xiang Zhou,et al. A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.
[8] Farouk Kamoun,et al. CASAN: Clustering algorithm for security in ad hoc networks , 2008, Comput. Commun..
[9] Elena Basan,et al. Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust , 2016, 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[10] Anand R. Tripathi,et al. Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..
[11] Radda A. Iureva,et al. Assessment of stability of algorithms based on trust and reputation model , 2016, 2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT).