The effect of leaders on the consistency of group behaviour
暂无分享,去创建一个
[1] Yang Xiao,et al. Notice of RetractionStochastic event capture using single robot moving along a certain track , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.
[2] Reuven R. Levary,et al. An adaptive expert system approach for intrusion detection , 2006, Int. J. Secur. Networks.
[3] Elisa Bertino,et al. Workflow authorisation in mediator-free environments , 2006, Int. J. Secur. Networks.
[4] Paul Rabinovich,et al. Secure message delivery in publish/subscribe networks using overlay multicast , 2007, Int. J. Secur. Networks.
[5] Qijun Gu,et al. Defence against packet injection in ad hoc networks , 2007, Int. J. Secur. Networks.
[6] Xuemin Shen,et al. A self-encryption authentication protocol for teleconference services , 2006, Int. J. Secur. Networks.
[7] Myung J. Lee,et al. A lightweight encryption and authentication scheme for wireless sensor networks , 2006, Int. J. Secur. Networks.
[8] Mahalingam Ramkumar,et al. Secure collaborations over message boards , 2006, Int. J. Secur. Networks.
[9] Yang Xiao,et al. Studying Bio-Inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[10] Yu Liu,et al. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.
[11] Yang Xiao,et al. Bio-inspired communications among robots, sensors, and RFID tags , 2009, 2009 International Conference on Mechatronics and Automation.
[12] Jianping Pan,et al. Vulnerabilities in distance-indexed IP traceback schemes , 2007, Int. J. Secur. Networks.
[13] Hsiao-Hwa Chen,et al. DKMS: distributed hierarchical access control for multimedia networks , 2007, Int. J. Secur. Networks.
[14] Xinyuan Wang. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones , 2006, Int. J. Secur. Networks.
[15] Yi-Bing Lin,et al. End-to-end security mechanisms for SMS , 2006, Int. J. Secur. Networks.
[16] H. Jonathan Chao,et al. Design and analysis of a multipacket signature detection system , 2007, Int. J. Secur. Networks.
[17] Bo Sheng,et al. Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.
[18] Yang Xiao,et al. Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[19] Chik How Tan,et al. Low-power authenticated group key agreement for heterogeneous wireless networks , 2006, Int. J. Secur. Networks.
[20] Xiannuan Liang,et al. Stochastic Capturing Moving Intrusions by Mobile Sensors , 2009 .
[21] Yang Xiao,et al. Bio-inspired visual attention in agile sensing for target detection , 2009, Int. J. Sens. Networks.
[22] Vicsek,et al. Novel type of phase transition in a system of self-driven particles. , 1995, Physical review letters.
[23] Jamal N. Al-Karaki,et al. Analysis of routing security-energy trade-offs in wireless sensor networks , 2006, Int. J. Secur. Networks.
[24] Nirwan Ansari,et al. Adaptive trust-based anonymous network , 2007, Int. J. Secur. Networks.
[25] Jianqing Zhang,et al. Application-Aware Secure Multicast for Power Grid Communications , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[26] Vasileios Karyotis,et al. A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks , 2006, Int. J. Secur. Networks.
[27] Hairong Qi,et al. Load-balanced key establishment methodologies in wireless sensor networks , 2006, Int. J. Secur. Networks.
[28] Mark A. Shayman,et al. On pairwise connectivity of wireless multihop networks , 2007, Int. J. Secur. Networks.
[29] Mercedes Pascual,et al. Computational Ecology: From the Complex to the Simple and Back , 2005, PLoS Comput. Biol..
[30] Jingyuan Zhang,et al. A bio-inspired time synchronization algorithm for wireless sensor networks , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[31] Mohamed G. Gouda,et al. Vulnerability analysis of certificate graphs , 2006, Int. J. Secur. Networks.
[32] Kamil Saraç,et al. Single packet IP traceback in AS-level partial deployment scenario , 2007, Int. J. Secur. Networks.
[33] Min Chen,et al. Architecture and protocol design for a pervasive robot swarm communication networks , 2011, Wirel. Commun. Mob. Comput..
[34] J. Toner,et al. Flocks, herds, and schools: A quantitative theory of flocking , 1998, cond-mat/9804180.
[35] Yang Xiao,et al. A boundary surveillance strategy based on critical line in wireless sensor networks , 2009, 2009 International Conference on Mechatronics and Automation.
[36] Athanasios V. Vasilakos,et al. Stochastic event capturing with a single mobile robot in rectangular perimeters , 2013, Telecommun. Syst..
[37] Neil F. Adams. Social Behaviors of the California Sea Lion, Bottlenose Dolphin and Orca Whale , 2011 .
[38] Mohan S. Kankanhalli,et al. Building trust in peer-to-peer systems: a review , 2006, Int. J. Secur. Networks.
[39] Chik How Tan,et al. A new signature scheme without random oracles , 2006, Int. J. Secur. Networks.
[40] Robert A. Malaney. Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.
[41] Benjamin W. P. Ramsey,et al. Subjective audio quality over a secure IEEE 802.11n network , 2011, Int. J. Secur. Networks.
[42] Peng Liu,et al. Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.
[43] Yang Xiao,et al. A critical line based boundary surveillance strategy in wireless sensor networks , 2013, Telecommun. Syst..
[44] Taieb Znati,et al. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks , 2007, Int. J. Secur. Networks.
[45] Yang Xiao,et al. Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags , 2011, Wirel. Commun. Mob. Comput..
[46] Riccardo Bettati,et al. Analysis of flow-correlation attacks in anonymity network , 2007, Int. J. Secur. Networks.
[47] Yang Xiao,et al. Primate social systems, scent-marking and their applications in mobile and static sensor networks , 2009, Int. J. Sens. Networks.
[48] Yi Mu,et al. Convertible identity-based anonymous designated ring signatures , 2006, Int. J. Secur. Networks.
[49] Joseph B. Evans,et al. Wireless networking security: open issues in trust, management, interoperation and measurement , 2006, Int. J. Secur. Networks.
[50] R. Solé,et al. Ecological networks and their fragility , 2006, Nature.
[51] N. Mermin,et al. Absence of Ferromagnetism or Antiferromagnetism in One- or Two-Dimensional Isotropic Heisenberg Models , 1966 .
[52] Matthew K. Franklin,et al. A survey of key evolving cryptosystems , 2006, Int. J. Secur. Networks.
[53] I. Couzin,et al. Effective leadership and decision-making in animal groups on the move , 2005, Nature.
[54] Georgios Kalogridis,et al. Privacy protection system and metrics for hiding electrical events , 2011, Int. J. Secur. Networks.
[55] Chuanyi Ji,et al. Optimal worm-scanning method using vulnerable-host distributions , 2007, Int. J. Secur. Networks.
[56] Kevin McCann,et al. Structural asymmetry and the stability of diverse food webs , 2006, Nature.
[57] Shivakant Mishra,et al. Limiting DoS attacks during multihop data delivery in wireless sensor networks , 2006, Int. J. Secur. Networks.
[58] Deepa Kundur,et al. Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.
[59] Craig W. Reynolds. Flocks, herds, and schools: a distributed behavioral model , 1987, SIGGRAPH.
[60] Pei Cao,et al. Hash-AV: fast virus signature scanning by cache-resident filters , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[61] Aggelos Kiayias,et al. Secure scalable group signature with dynamic joins and separable authorities , 2006, Int. J. Secur. Networks.
[62] Neeraj Suri,et al. An approach to synthesise safe systems , 2006, Int. J. Secur. Networks.
[63] Yang Xiao,et al. Bio-inspired true coalition formation on intrusion detection by mobile robots , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[64] Yang Xiao,et al. Primate-Inspired Scent Marking for Mobile and Static Sensors and RFID Tags , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[65] Yang Xiao,et al. Modeling collaborative robots for detecting intrusions , 2009, 2009 International Symposium on Collaborative Technologies and Systems.
[66] George Kesidis,et al. A taxonomy of internet traceback , 2006, Int. J. Secur. Networks.
[67] Yang Xiao,et al. Primate-Inspired Communication Methods for Mobile and Static Sensors and RFID Tags , 2011, TAAS.
[68] Thomas Johansson,et al. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers , 2006, Int. J. Secur. Networks.