Detection of Cyber-attacks to indoor real time localization systems for autonomous robots
暂无分享,去创建一个
Vicente Matellán Olivera | Noemí DeCastro-García | Ángel Manuel Guerrero Higueras | Noemí DeCastro-García
[1] Geok See Ng,et al. Empirical Assessment of Methods to Detect Cyber Attacks on a Robot , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).
[2] L. Breiman. Arcing classifier (with discussion and a rejoinder by the author) , 1998 .
[3] Cipriano Galindo,et al. Mobile robot localization based on Ultra-Wide-Band ranging: A particle filter approach , 2009, Robotics Auton. Syst..
[4] Trevor Hastie,et al. Regularization Paths for Generalized Linear Models via Coordinate Descent. , 2010, Journal of statistical software.
[5] Yoav Freund,et al. Boosting: Foundations and Algorithms , 2012 .
[6] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[7] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[8] Nir Friedman,et al. Probabilistic Graphical Models - Principles and Techniques , 2009 .
[9] Junjie Yan,et al. Experimental analysis of denial-of-service attacks on teleoperated robotic systems , 2015, ICCPS.
[10] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[11] Geoffrey E. Hinton,et al. Learning internal representations by error propagation , 1986 .
[12] George Cybenko,et al. Approximation by superpositions of a sigmoidal function , 1992, Math. Control. Signals Syst..
[13] Harry Zhang,et al. The Optimality of Naive Bayes , 2004, FLAIRS.
[14] Maria Domenica Di Benedetto,et al. Cyber-Physical Systems Security: a Systematic Mapping Study , 2016, J. Syst. Softw..
[15] Kevin P. Murphy,et al. Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.
[16] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[17] Wei-Yin Loh,et al. Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..
[18] David G. Stork,et al. Pattern Classification , 1973 .
[19] George Loukas,et al. Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[20] Young-Koo Lee,et al. An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.
[21] Jing Liu,et al. Survey of Wireless Indoor Positioning Techniques and Systems , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[22] Hugh F. Durrant-Whyte,et al. A solution to the simultaneous localization and map building (SLAM) problem , 2001, IEEE Trans. Robotics Autom..
[23] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[24] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[25] Trevor Hastie,et al. Multi-class AdaBoost ∗ , 2009 .
[26] Vicente Matellán Olivera,et al. Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots , 2017, Comput. Secur..
[27] Carlos Balaguer,et al. Cryptobotics: Why Robots Need Cyber Safety , 2015, Front. Robot. AI.
[28] Morgan Quigley,et al. ROS: an open-source Robot Operating System , 2009, ICRA 2009.
[29] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..