Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots
暂无分享,去创建一个
Vicente Matellán Olivera | Noemí DeCastro-García | Francisco J. Rodríguez Lera | Ángel Manuel Guerrero Higueras | Noemí DeCastro-García | F. J. Lera
[1] Taeshik Shon,et al. A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..
[2] George Loukas,et al. Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[3] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[4] Junjie Yan,et al. To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots , 2015, ArXiv.
[5] Henrik Sandberg,et al. Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.
[6] Jing Liu,et al. Survey of Wireless Indoor Positioning Techniques and Systems , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[7] Philip Wolfe,et al. An algorithm for quadratic programming , 1956 .
[8] Young-Koo Lee,et al. An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.
[9] Saad B. Qaisar,et al. One-class support vector machines: analysis of outlier detection for wireless sensor networks in harsh environments , 2013, Artificial Intelligence Review.
[10] Hugh F. Durrant-Whyte,et al. A solution to the simultaneous localization and map building (SLAM) problem , 2001, IEEE Trans. Robotics Autom..
[11] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[12] Tong Zhang,et al. Trading Accuracy for Sparsity in Optimization Problems with Sparsity Constraints , 2010, SIAM J. Optim..
[13] Carlos Balaguer,et al. Cryptobotics: Why Robots Need Cyber Safety , 2015, Front. Robot. AI.
[14] Geok See Ng,et al. Empirical Assessment of Methods to Detect Cyber Attacks on a Robot , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).
[15] W. Timothy Strayer,et al. Using Machine Learning Techniques to Identify Botnet Traffic , 2006 .
[16] Eric Jones,et al. SciPy: Open Source Scientific Tools for Python , 2001 .
[17] Jiankun Hu,et al. Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[18] Song Guo,et al. Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[19] Morgan Quigley,et al. ROS: an open-source Robot Operating System , 2009, ICRA 2009.
[20] Cipriano Galindo,et al. Mobile robot localization based on Ultra-Wide-Band ranging: A particle filter approach , 2009, Robotics Auton. Syst..
[21] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..