[HTML][HTML] Risk-based path planning for preventing collisions and groundings of maritime autonomous surface ships

RG Maidana, SD Kristensen, IB Utne, AJ Sørensen - Ocean Engineering, 2023 - Elsevier
In this paper, we propose and demonstrate a method for risk-based path planning,
generating risk-acceptable trajectories for an autonomous surface ship. This objective is …

RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey

A Gupta, A Anpalagan, GHS Carvalho, AS Khwaja… - 2019 - Elsevier
Three missing references should have been added throughout the manuscript [145] S. Yasir;
C. Noel; RM Husain, C. Rebecca,“Open Access Internet of Things-aided Smart Grid …

From Reactive to Active Sensing: A Survey on Information Gathering in Decision-theoretic Planning

T Veiga, J Renoux - ACM Computing Surveys, 2023 - dl.acm.org
In traditional decision-theoretic planning, information gathering is a means to a goal. The
agent receives information about its environment (state or observation) and uses it as a way …

Active perception in adversarial scenarios using maximum entropy deep reinforcement learning

M Shen, JP How - 2019 International Conference on Robotics …, 2019 - ieeexplore.ieee.org
We pose an active perception problem where an autonomous agent actively interacts with a
second agent with potentially adversarial behaviors. Given the uncertainty in the intent of the …

New goal recognition algorithms using attack graphs

R Mirsky, Y Shalom, A Majadly, K Gal, R Puzis… - … and Machine Learning …, 2019 - Springer
Goal recognition is the task of inferring the goal of an actor given its observed actions. Attack
graphs are a common representation of assets, vulnerabilities, and exploits used for …

Single real goal, magnitude-based deceptive path-planning

K Xu, Y Zeng, L Qin, Q Yin - Entropy, 2020 - mdpi.com
Deceptive path-planning is the task of finding a path so as to minimize the probability of an
observer (or a defender) identifying the observed agent's final goal before the goal has been …

Detecting and Deterring Manipulation in a Cognitive Hierarchy

N Alon, L Schulz, JM Barnby, JS Rosenschein… - arXiv preprint arXiv …, 2024 - arxiv.org
Social agents with finitely nested opponent models are vulnerable to manipulation by agents
with deeper reasoning and more sophisticated opponent modelling. This imbalance, rooted …

[PDF][PDF] Threat assessment for multistage cyber attacks in smart grid communication networks

X He - 2017 - opus4.kobv.de
In smart grids, managing and controlling power operations are supported by information and
communication technology (ICT) and supervisory control and data acquisition (SCADA) …

Knowing the Enemy, Dealing with Deception, and Situation/Threat Estimation

J Llinas, K Sentz - 2024 IEEE Conference on Cognitive and …, 2024 - ieeexplore.ieee.org
The foundational principles of warfare have always required a combatant to" know the
enemy and know yourself", and to consider the likelihood that methods of deception will be …

Goal Identification Control Using an Information Entropy-Based Goal Uncertainty Metric

K Xu, Q Yin - Entropy, 2019 - mdpi.com
Recent research has found situations where the identification of agent goals could be
purposefully controlled, either by changing the underlying environment to make it easier, or …