共 17 条
- [1] Kumar P., Ylianttila M., Gurtov A., Lee S.-G., Lee H.-J., An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor networks-based applications, MDPI Sens., 14, 2, pp. 2732-2755, (2014)
- [2] Sridhar P., Sheikh-Bahaei S., Xia S., Jamshidi M., Multi agent simulation using discrete event and softcomputing methodologies, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2, pp. 1711-1716, (2003)
- [3] Page J., Zaslavsky A., Indrawan M., Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities, Proc. of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85-101, (2004)
- [4] Zikratov I.A., Kozlova E.V., Zikratova T.V., Analysis of vulnerabilities of robotic complexes with swarm intelligence, Nauchno-Tekh. Vestn. Inf. Tekhnol. Mekh. Opt., 5, 87, pp. 149-154, (2013)
- [5] Zikratov I., Lebedev I., Gurtov A., Trust and reputation mechanisms for multi-agent robotic systems, Lect. Notes Comput. Sci., 8638, pp. 106-120, (2014)
- [6] Wyglinski A.M., Huang X., Padir T., Lai L., Eisenbarth T.R., Venkatasubramanian K., Security of autonomous systems employing embedded computing and sensors, IEEE Micro, 33, 1, pp. 80-86, (2013)
- [7] Lebedev I.S., Korzhuk V.M., The monitoring of information security of remote devices of wireless networks, Lect. Notes Comput. Sci., 9247, pp. 3-10, (2015)
- [8] Prabhakar M., Singh J.N., Mahadevan Nash equilibrium and Marcov chains to enhance game theoretic approach for VANET security, International Conference on Advances in Computing, ICAdC 2012, pp. 191-199, (2012)
- [9] Korzun D.G., Nikolaevskiy I., Gurtov A.V., Service intelligence support for medical sensor networks in personalized mobile health systems, Lect. Notes Comput. Sci., 9247, pp. 116-127, (2015)
- [10] Security Architecture for Systems that Provide Communication between Endpoints