[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Liu et al., 2018 - Google Patents

A mechanism for recognizing and suppressing the emergent behavior of UAV swarm

Liu et al., 2018

View PDF @Full View
Document ID
13639761487201340378
Author
Liu Q
He M
Xu D
Ding N
Wang Y
Publication year
Publication venue
Mathematical Problems in Engineering

External Links

Snippet

Similar to social animals in nature, UAV swarm is also a complex system that can produce emergent behavior. The emergent behavior of UAV swarm in specific airspace is undoubtedly the act that the defense side does not expect to see; therefore, recognition and …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition

Similar Documents

Publication Publication Date Title
Liu et al. A mechanism for recognizing and suppressing the emergent behavior of UAV swarm
Wang et al. A bat algorithm with mutation for UCAV path planning
Théron et al. When autonomous intelligent goodware will fight autonomous intelligent malware: A possible future of cyber defense
Kim et al. Optimal task assignment for UAV swarm operations in hostile environments
Han et al. Evaluation method and optimization strategies of resilience for air & space defense system of systems based on kill network theory and improved self-information quantity
Cengiz et al. A novel intrusion detection system based on artificial neural network and genetic algorithm with a new dimensionality reduction technique for UAV communication
Huang et al. Exposing Spoofing Attack on Flocking‐Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence
Qingwen et al. Cooperative jamming resource allocation of UAV swarm based on multi-objective DPSO
Li et al. Optimization of air defense system deployment against reconnaissance drone swarms
Christensen et al. Principles for small-unit sUAS tactical deployment from a combat-simulating agent-based model analysis
Yan et al. [Retracted] Optimization of UAV Cooperative Path Planning Mathematical Model Based on Personalized Multigroup Sparrow Search Algorithm in Complex Environment
Yang et al. Improved sparrow algorithm based on game predatory mechanism and suicide mechanism
Meng et al. A cluster UAV inspired honeycomb defense system to confront military IoT: A dynamic game approach
Pasdar et al. Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems
Jadav et al. Blockchain-based secure and intelligent data dissemination framework for uavs in battlefield applications
Day Multi-agent task negotiation among UAVs to defend against swarm attacks
Simonjan et al. Reinforcement Learning-based Countermeasures against Attacking UAV Swarms
Sapaty Distributed technology for global dominance
Mallick Artificial Intelligence in Armed Forces: An Analysis
Simonjan et al. Inducing defenders to mislead an attacking uav swarm
McLemore et al. A model for geographically distributed combat interactions of swarming naval and air forces
Sun et al. A Combat Capability Evaluation Method of UAV Swarm Based on Kill Chain
Gonzalez et al. Adaptive cyberdefense with deception: A human–ai cognitive approach
Altinoz Evolving model for synchronous weapon target assignment problem
Behzadan et al. Models and framework for adversarial attacks on complex adaptive systems