[HTML][HTML] Risk-based path planning for preventing collisions and groundings of maritime autonomous surface ships
In this paper, we propose and demonstrate a method for risk-based path planning,
generating risk-acceptable trajectories for an autonomous surface ship. This objective is …
generating risk-acceptable trajectories for an autonomous surface ship. This objective is …
RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey
A Gupta, A Anpalagan, GHS Carvalho, AS Khwaja… - 2019 - Elsevier
Three missing references should have been added throughout the manuscript [145] S. Yasir;
C. Noel; RM Husain, C. Rebecca,“Open Access Internet of Things-aided Smart Grid …
C. Noel; RM Husain, C. Rebecca,“Open Access Internet of Things-aided Smart Grid …
From Reactive to Active Sensing: A Survey on Information Gathering in Decision-theoretic Planning
In traditional decision-theoretic planning, information gathering is a means to a goal. The
agent receives information about its environment (state or observation) and uses it as a way …
agent receives information about its environment (state or observation) and uses it as a way …
Active perception in adversarial scenarios using maximum entropy deep reinforcement learning
We pose an active perception problem where an autonomous agent actively interacts with a
second agent with potentially adversarial behaviors. Given the uncertainty in the intent of the …
second agent with potentially adversarial behaviors. Given the uncertainty in the intent of the …
New goal recognition algorithms using attack graphs
Goal recognition is the task of inferring the goal of an actor given its observed actions. Attack
graphs are a common representation of assets, vulnerabilities, and exploits used for …
graphs are a common representation of assets, vulnerabilities, and exploits used for …
Single real goal, magnitude-based deceptive path-planning
K Xu, Y Zeng, L Qin, Q Yin - Entropy, 2020 - mdpi.com
Deceptive path-planning is the task of finding a path so as to minimize the probability of an
observer (or a defender) identifying the observed agent's final goal before the goal has been …
observer (or a defender) identifying the observed agent's final goal before the goal has been …
Detecting and Deterring Manipulation in a Cognitive Hierarchy
Social agents with finitely nested opponent models are vulnerable to manipulation by agents
with deeper reasoning and more sophisticated opponent modelling. This imbalance, rooted …
with deeper reasoning and more sophisticated opponent modelling. This imbalance, rooted …
[PDF][PDF] Threat assessment for multistage cyber attacks in smart grid communication networks
X He - 2017 - opus4.kobv.de
In smart grids, managing and controlling power operations are supported by information and
communication technology (ICT) and supervisory control and data acquisition (SCADA) …
communication technology (ICT) and supervisory control and data acquisition (SCADA) …
Knowing the Enemy, Dealing with Deception, and Situation/Threat Estimation
J Llinas, K Sentz - 2024 IEEE Conference on Cognitive and …, 2024 - ieeexplore.ieee.org
The foundational principles of warfare have always required a combatant to" know the
enemy and know yourself", and to consider the likelihood that methods of deception will be …
enemy and know yourself", and to consider the likelihood that methods of deception will be …
Goal Identification Control Using an Information Entropy-Based Goal Uncertainty Metric
K Xu, Q Yin - Entropy, 2019 - mdpi.com
Recent research has found situations where the identification of agent goals could be
purposefully controlled, either by changing the underlying environment to make it easier, or …
purposefully controlled, either by changing the underlying environment to make it easier, or …