Kumar, P., Ylianttila, M., Gurtov, A., Lee, S.-G., Lee, H.-J.: An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Networks-based Applications. MDPI Sensors 14(2), 2732–2755 (2014)
CrossRef
Google Scholar
Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, Mo.: Multi agent simulation using discrete event and soft-computing methodologies. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 1711–1716 (2003)
Google Scholar
Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proc. of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85–101 (2004)
Google Scholar
Peters, J.F.: Approximation spaces for hierarchical intelligent behavioral system models. Advances in Soft Computing (28), 13–30 (2005)
Google Scholar
Zikratov, I.A., Kozlova, E.V., Stratowa, T.V.: The analysis of vulnerabilities of robotic systems with swarm intelligence. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 5(87), 149–154 (2013)
Google Scholar
Gvozdev, V.A., Zikratov, I.A., Lebedev, I.S., Lapshin, S.V., Solov’ev, I.N.: Prognostic evaluation of software architectures security. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 4(80), 126–130 (2012)
Google Scholar
Zikratov, I.A., Lebedev, I.S., Gurtov, A.V.: Trust and Reputation Mechanisms for Multi-agent Robotic Systems. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2014. LNCS, vol. 8638, pp. 106–120. Springer, Heidelberg (2014)
Google Scholar
Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., Venkatasubramanian, K.: Security of autonomous systems employing embedded computing and sensors. IEEE Micro 33(1), art. no. 6504448, 80–86 (2013)
Google Scholar
Bobtsov, A., Nikiforov, V.O.: Adaptive output control: tasks, applied problems and solutions. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 1(83). S.1–S.14 (2013)
Google Scholar
Maltsev, G.N., Dzhumkov, V.V.: A generalized model of a discrete communication channel with grouping errors. Information and Control Systems 1, 27–33 (2013)
Google Scholar
Prabhakar, M., Singh, J.N., Mahadevan, G.: Nash Equilibrium and Marcov Chains to Enhance Game Theoretic Approach for Vanet Security. In: Aswatha Kumar, M., Selvarani, R., Kumar, T.V.S. (eds.) Proceedings of ICAdC. AISC, vol. 174, pp. 191–199. Springer, Heidelberg (2013)
CrossRef
Google Scholar
Komov, S. A. and others: Terms and definitions in the field of information security. – M., AC-trust, 2009. -304 S.
Google Scholar
Koval, E.N., Lebedev, I.S.: Total security model of the robotic systems. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 4(86) S.153–S.154 (2013)
Google Scholar
Zikratov, I.S., Stratowa, T.V., Lebedev, I.S., Gurtov, V.A.: Building a Model of trust and reputation to the objects of multi-agent robotic systems with decentralized control. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 3(91), 30–39 (2014)
Google Scholar
Shago, F.N., Zikratov, I.A.: The optimization system of planning of audit of information security management. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 2(90), 111–118 (2014)
Google Scholar