In this paper, we investigate the security of pheromone swarming under different types of jamming attacks. In particular, we expose new types of stealthy ...
Stealthy attacks on pheromone swarming | IEEE Conference ...
ieeexplore.ieee.org › document › similar
In this paper, we investigate the security of pheromone swarming under different types of jamming attacks. In particular, we expose new types of stealthy ...
[PDF] Stealthy A*acks on Pheromone Swarming - Computer Science
userweb.cs.txstate.edu › mcps › swa...
Future work: Securing swarming systems against these and other types of stealthy. aEacks. Obstacle. Detected. Wait. 5 sec. Obstacle. Moved? YES? ConNnue ...
In this paper, we investigate the security of pheromone swarming under different types of jamming attacks. In particular, we expose new types of stealthy ...
Atia, Mina Guirguis: Stealthy edge decoy attacks against dynamic channel assignment in wireless networks. ... Stealthy attacks on pheromone swarming. CogSIMA 2013 ...
Stealthy attacks on pheromone swarming. 1 Feb 2013. Swarming on Symbolic Structures: Guiding Self-Organizing Search with Domain Knowledge. 1 Apr 2011.
Jan 19, 2015 · ... pheromone swarming under different types of jamming attacks. In particular, we expose new types of stealthy attacks that aim to maximize the ...
People also ask
What is pheromone insect behavior?
Which of the following is a pheromone?
Apr 17, 2020 · Swarm prevention involves strategies to delay or stop the colony from initiating events that lead to swarming.
... Stealthy attacks on pheromone swarming. Kelly J., Richter S., Guirguis M. IEEE. 2013 , citations by CoLab: 2 | Abstract. In multi-agent systems, digital ...