Analysis of mutual assured destruction-like scenario with swarms of non-recallable autonomous robots
暂无分享,去创建一个
[1] Jody M. Prescott. Autonomous decision-making processes and the responsible cyber commander , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[2] Satyandra K. Gupta,et al. Trajectory planning with look-ahead for Unmanned Sea Surface Vehicles to handle environmental disturbances , 2011, 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[3] Jason D. Jolley. Article 2(4) and Cyber Warfare: How do Old Rules Control the Brave New World? , 2013 .
[4] Andrew Lee,et al. Malware is called malicious for a reason: The risks of weaponizing code , 2014, 2014 6th International Conference On Cyber Conflict (CyCon 2014).
[5] Enn Tyugu,et al. Command and control of cyber weapons , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).
[6] Xiling Luo,et al. A Novel Cluster-Based Location-Aided Routing Protocol for UAV Fleet Networks , 2012 .
[7] Alonzo Kelly,et al. Receding Horizon Model-Predictive Control for Mobile Robot Navigation of Intricate Paths , 2009, FSR.
[8] Y. Volkan Pehlivanoglu,et al. A new vibrational genetic algorithm enhanced with a Voronoi diagram for path planning of autonomous UAV , 2012 .
[9] Henrik I. Christensen,et al. Cooperative 3D and 2D mapping with heterogenous ground robots , 2012, Defense, Security, and Sensing.
[10] Eckart Michaelsen,et al. Stochastic reasoning for structural pattern recognition: An example from image-based UAV navigation , 2014, Pattern Recognit..
[11] Isaac Kaminer,et al. Optimal Motion Planning for Searching for Uncertain Targets , 2014 .
[12] Jian Yang,et al. Comparison of Optimal Solutions to Real-Time Path Planning for a Mobile Vehicle , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[13] Rongbo Zhu,et al. Efficient Intelligent Optimized Algorithm for Dynamic Vehicle Routing Problem , 2011, J. Softw..
[14] Molly McNab,et al. Clarifying the Law Relating to Unmanned Drones and the Use of Force: The Relationships between Human Rights, Self-Defense, Armed Conflict, and International Humanitarian Law , 2011 .
[15] Alexander Chanock. Fixing the War Powers Resolution in the Age of Predator Drones and Cyber-Warfare , 2013 .
[16] Caitriona H. Heinl,et al. Artificial (intelligent) agents and active cyber defence: Policy implications , 2014, 2014 6th International Conference On Cyber Conflict (CyCon 2014).
[17] Jeremy Straub,et al. A Characterization of the Utility of Using Artificial Intelligence to Test Two Artificial Intelligence Systems , 2013, Comput..
[18] Jeffrey L. Caton. Exploring the prudent limits of automated cyber attack , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[19] Xin Chen,et al. A Wolf Colony Search Algorithm Based on the Complex Method for Uninhabited Combat Air Vehicle Path Planning , 2014 .
[20] N. Kshetri. Pattern of Global Cyber War and Crime: A Conceptual Framework , 2005 .
[21] Arko Lucieer,et al. Assessing the Accuracy of Georeferenced Point Clouds Produced via Multi-View Stereopsis from Unmanned Aerial Vehicle (UAV) Imagery , 2012, Remote. Sens..
[22] David P. Fidler. Was Stuxnet an Act of War? Decoding a Cyberattack , 2011, IEEE Security & Privacy.
[23] Yoshiaki Kuwata,et al. Flight Demonstrations of Cooperative Control for UAV Teams , 2004 .
[24] Frederic Megret. The Humanitarian Problem with Drones , 2013 .
[25] Trey Herr,et al. PrEP: A Framework for Malware & Cyber Weapons , 2013 .
[26] Haibin Duan,et al. Chaotic predator–prey biogeography-based optimization approach for UCAV path planning , 2014 .
[27] Thomas Fincannon,et al. The influence of camouflage, obstruction, familiarity and spatial ability on target identification from an unmanned ground vehicle , 2013, Ergonomics.
[28] Nicholas Ernest,et al. UAV Swarm Cooperative Control Based on a Genetic-Fuzzy Approach , 2012 .
[29] Hai-Won Yang,et al. The optimal design scheme of an SUGV for surveillance and reconnaissance missions in urban and rough terrain , 2012 .
[30] Mweemba Kasongo,et al. The use of force under international law , 2009 .
[31] Gai-Ge Wang,et al. A modified firefly algorithm for UCAV path planning , 2012 .
[32] Nengcheng Chen,et al. Efficient UAV Path Planning with Multiconstraints in a 3D Large Battlefield Environment , 2014 .
[33] Christophe Guettier,et al. Automatic vehicle navigation with bandwidth constraints , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[34] David Silver,et al. Applied Imitation Learning for Autonomous Navigation in Complex Natural Terrain , 2009, FSR.
[35] Gaige Wang,et al. A Bat Algorithm with Mutation for UCAV Path Planning , 2012, TheScientificWorldJournal.
[36] Christopher M. Clark,et al. Multi-robot boundary tracking with phase and workload balancing , 2010, 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[37] Richard Garcia,et al. Multi-UAV Simulator Utilizing X-Plane , 2010, J. Intell. Robotic Syst..
[38] Xiaoyan Hong,et al. Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[39] Haibin Duan,et al. Receding horizon control for multiple UAV formation flight based on modified brain storm optimization , 2014, Nonlinear Dynamics.
[40] B. Koch,et al. UAV-BASED PHOTOGRAMMETRIC POINT CLOUDS – TREE STEM MAPPING IN OPEN STANDS IN COMPARISON TO TERRESTRIAL LASER SCANNER POINT CLOUDS , 2013 .
[41] Anders Henriksen. Jus ad bellum and American Targeted Use of Force to Fight Terrorism Around the World , 2014 .
[42] Toru Kaneko,et al. Path selection based on local terrain feature for unmanned ground vehicle in unknown rough terrain environment , 2013, 2013 IEEE International Conference on Robotics and Biomimetics (ROBIO).
[43] M. Schmitt. Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework , 1999 .
[44] Chris Jenks,et al. Law from Above: Unmanned Aerial Systems, Use of Force, and the Law of Armed Conflict , 2010 .
[45] Li Yu. VEHICLE EXTRACTION USING HISTOGRAM AND GENETIC ALGORITHM BASED FUZZY IMAGE SEGMENTATION FROM HIGH RESOLUTION UAV AERIAL IMAGERY , 2008 .