Liu et al., 2018 - Google Patents
A mechanism for recognizing and suppressing the emergent behavior of UAV swarmLiu et al., 2018
View PDF- Document ID
- 13639761487201340378
- Author
- Liu Q
- He M
- Xu D
- Ding N
- Wang Y
- Publication year
- Publication venue
- Mathematical Problems in Engineering
External Links
Snippet
Similar to social animals in nature, UAV swarm is also a complex system that can produce emergent behavior. The emergent behavior of UAV swarm in specific airspace is undoubtedly the act that the defense side does not expect to see; therefore, recognition and …
- 230000001629 suppression 0 title abstract description 41
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | A mechanism for recognizing and suppressing the emergent behavior of UAV swarm | |
Wang et al. | A bat algorithm with mutation for UCAV path planning | |
Théron et al. | When autonomous intelligent goodware will fight autonomous intelligent malware: A possible future of cyber defense | |
Kim et al. | Optimal task assignment for UAV swarm operations in hostile environments | |
Han et al. | Evaluation method and optimization strategies of resilience for air & space defense system of systems based on kill network theory and improved self-information quantity | |
Cengiz et al. | A novel intrusion detection system based on artificial neural network and genetic algorithm with a new dimensionality reduction technique for UAV communication | |
Huang et al. | Exposing Spoofing Attack on Flocking‐Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence | |
Qingwen et al. | Cooperative jamming resource allocation of UAV swarm based on multi-objective DPSO | |
Li et al. | Optimization of air defense system deployment against reconnaissance drone swarms | |
Christensen et al. | Principles for small-unit sUAS tactical deployment from a combat-simulating agent-based model analysis | |
Yan et al. | [Retracted] Optimization of UAV Cooperative Path Planning Mathematical Model Based on Personalized Multigroup Sparrow Search Algorithm in Complex Environment | |
Yang et al. | Improved sparrow algorithm based on game predatory mechanism and suicide mechanism | |
Meng et al. | A cluster UAV inspired honeycomb defense system to confront military IoT: A dynamic game approach | |
Pasdar et al. | Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems | |
Jadav et al. | Blockchain-based secure and intelligent data dissemination framework for uavs in battlefield applications | |
Day | Multi-agent task negotiation among UAVs to defend against swarm attacks | |
Simonjan et al. | Reinforcement Learning-based Countermeasures against Attacking UAV Swarms | |
Sapaty | Distributed technology for global dominance | |
Mallick | Artificial Intelligence in Armed Forces: An Analysis | |
Simonjan et al. | Inducing defenders to mislead an attacking uav swarm | |
McLemore et al. | A model for geographically distributed combat interactions of swarming naval and air forces | |
Sun et al. | A Combat Capability Evaluation Method of UAV Swarm Based on Kill Chain | |
Gonzalez et al. | Adaptive cyberdefense with deception: A human–ai cognitive approach | |
Altinoz | Evolving model for synchronous weapon target assignment problem | |
Behzadan et al. | Models and framework for adversarial attacks on complex adaptive systems |