This paper addresses a security problem in robotic multi–agent systems, where agents are supposed to cooperate according to a shared protocol. A distributed Intrusion Detection System (IDS) is proposed here, that detects possible non–cooperative agents. Previous work by the authors showed how single monitors embedded on–board the agents can detect non– cooperative behavior, using only locally available information. In this paper, we allow such monitors to share the collected information in order to overcome their sensing limitation. In this perspective, we show how an agreement on the type of behavior of a target–robot may be reached by the monitors, through execution of a suitable consensus algorithm. After formulating a consensus problem ...
Over the last few years, a change in one of the classical paradigms in Control Systems has been happ...
This paper considers a multi–agent system and focuses on the detection of motion misbehavior. Previo...
This paper focuses on trustworthy computation systems and proposes a novel intrusion detection schem...
This paper addresses a security problem in robotic multi\u2013agent systems, where agents are suppos...
This paper addresses a security problem in robotic multi-agent systems, where agents are supposed to...
This thesis addresses a security problem in cooperative systems consisting of teams of robotic agent...
This paper addresses the problem of detecting possible intruders in a group of autonomous robots whi...
This Thesis focuses on Distributed Robotics and Cooperating Objects and addresses a problem of Secur...
A general technique to build a dynamic and distributed intrusion detector for a class of multi-agent...
A general technique to build a dynamic and distributed intrusion detector for a class of multi–agent...
This paper focuses on the detection of misbehav- ing agents within a group of mobile robots. A novel...
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A n...
We introduce a novel consensus mechanism by which the agents of a network can reach an agreement on ...
In this thesis we propose a solution for the problem of detecting intruders in an open set of cooper...
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A n...
Over the last few years, a change in one of the classical paradigms in Control Systems has been happ...
This paper considers a multi–agent system and focuses on the detection of motion misbehavior. Previo...
This paper focuses on trustworthy computation systems and proposes a novel intrusion detection schem...
This paper addresses a security problem in robotic multi\u2013agent systems, where agents are suppos...
This paper addresses a security problem in robotic multi-agent systems, where agents are supposed to...
This thesis addresses a security problem in cooperative systems consisting of teams of robotic agent...
This paper addresses the problem of detecting possible intruders in a group of autonomous robots whi...
This Thesis focuses on Distributed Robotics and Cooperating Objects and addresses a problem of Secur...
A general technique to build a dynamic and distributed intrusion detector for a class of multi-agent...
A general technique to build a dynamic and distributed intrusion detector for a class of multi–agent...
This paper focuses on the detection of misbehav- ing agents within a group of mobile robots. A novel...
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A n...
We introduce a novel consensus mechanism by which the agents of a network can reach an agreement on ...
In this thesis we propose a solution for the problem of detecting intruders in an open set of cooper...
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A n...
Over the last few years, a change in one of the classical paradigms in Control Systems has been happ...
This paper considers a multi–agent system and focuses on the detection of motion misbehavior. Previo...
This paper focuses on trustworthy computation systems and proposes a novel intrusion detection schem...