Threats to the Swarm: Security Considerations for Swarm Robotics
暂无分享,去创建一个
[1] Alan F. T. Winfield,et al. Towards dependable swarms and a new discipline of swarm engineering , 2004 .
[2] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[3] Lynne E. Parker,et al. ALLIANCE: an architecture for fault tolerant multirobot cooperation , 1998, IEEE Trans. Robotics Autom..
[4] Gaurav S. Sukhatme,et al. Robomote: enabling mobility in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[5] S Erol. Swarm Robotics: From Sources of Inspiration to Domains of Application , 2005 .
[6] Nikolaus Correll,et al. A Challenging Application in Swarm Robotics: The Autonomous Inspection of Complex Engineered Structures , 2007 .
[7] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[8] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[9] Maja J. Mataric,et al. A general algorithm for robot formations using local sensing and minimal communication , 2002, IEEE Trans. Robotics Autom..
[10] Christof Paar,et al. Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor , 2004, FPL.
[11] D.P. Stormont. Autonomous rescue robot swarms for first responders , 2005, CIHSPS 2005. Proceedings of the 2005 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2005..
[12] Levente Buttyán,et al. Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .
[13] Tony White,et al. Expert Assessment of Stigmergy: A Report for the Department of National Defence , 2005 .
[14] Alan F. T. Winfield,et al. Safety in numbers: fault-tolerance in robot swarms , 2006, Int. J. Model. Identif. Control..
[15] Tim Kerins,et al. Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[16] Allan Tomlinson,et al. Survey on Security Challenges for Swarm Robotics , 2009, 2009 Fifth International Conference on Autonomic and Autonomous Systems.
[17] Owen Holland,et al. UltraSwarm: A Further Step Towards a Flock of Miniature Helicopters , 2006, Swarm Robotics.
[18] Erol Şahin,et al. A review of studies in swarm robotics , 2007 .
[19] Rodney A. Brooks,et al. Fast, Cheap and Out of Control: a Robot Invasion of the Solar System , 1989 .
[20] Peter I. Corke,et al. The Design and Evaluation of a Mobile Sensor/Actuator Network for Autonomous Animal Control , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[21] Elisabeth Hansson,et al. Security solutions for mobile ad hoc networks , 2005 .
[22] Niklas Borselius,et al. Multi-agent system security for mobile communication , 2003 .
[23] Nicola Santoro,et al. Gathering of asynchronous robots with limited visibility , 2005, Theor. Comput. Sci..
[24] Jing Wang,et al. Swarm Intelligence in Cellular Robotic Systems , 1993 .
[25] Marco Dorigo,et al. Swarm intelligence: from natural to artificial systems , 1999 .
[26] P.-P. Grasse. La reconstruction du nid et les coordinations interindividuelles chezBellicositermes natalensis etCubitermes sp. la théorie de la stigmergie: Essai d'interprétation du comportement des termites constructeurs , 1959, Insectes Sociaux.
[27] Elizabeth Sklar,et al. Robot-Sensor Networks for Search and Rescue , 2006 .
[28] Robin R. Murphy,et al. Introduction to AI Robotics , 2000 .
[29] R. Andrew Russell. Visual recognition of conspecifics by swarm robots , 2004 .