{"id":"https://openalex.org/W3118816395","doi":"https://doi.org/10.1109/icarcv50220.2020.9305492","title":"On Stability of Multi-Agent Systems on Time Scales under Denial-of-Service attacks","display_name":"On Stability of Multi-Agent Systems on Time Scales under Denial-of-Service attacks","publication_year":2020,"publication_date":"2020-12-13","ids":{"openalex":"https://openalex.org/W3118816395","doi":"https://doi.org/10.1109/icarcv50220.2020.9305492","mag":"3118816395"},"language":"en","primary_location":{"id":"doi:10.1109/icarcv50220.2020.9305492","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icarcv50220.2020.9305492","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 16th International Conference on Control, Automation, Robotics and Vision (ICARCV)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053980695","display_name":"Ewa Girejko","orcid":"https://orcid.org/0000-0003-1111-6730"},"institutions":[{"id":"https://openalex.org/I1323121030","display_name":"Bialystok University of Technology","ror":"https://ror.org/02bzfsy61","country_code":"PL","type":"education","lineage":["https://openalex.org/I1323121030"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Ewa Girejko","raw_affiliation_strings":["Faculty of Computer Science, Bialystok University of Technology, Bialystok, Poland"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Bialystok University of Technology, Bialystok, Poland","institution_ids":["https://openalex.org/I1323121030"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076441274","display_name":"Agnieszka B. Malinowska","orcid":"https://orcid.org/0000-0002-1309-8583"},"institutions":[{"id":"https://openalex.org/I1323121030","display_name":"Bialystok University of Technology","ror":"https://ror.org/02bzfsy61","country_code":"PL","type":"education","lineage":["https://openalex.org/I1323121030"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Agnieszka B. Malinowska","raw_affiliation_strings":["Faculty of Computer Science, Bialystok University of Technology, Bialystok, Poland"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Bialystok University of Technology, Bialystok, Poland","institution_ids":["https://openalex.org/I1323121030"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5053980695"],"corresponding_institution_ids":["https://openalex.org/I1323121030"],"apc_list":null,"apc_paid":null,"fwci":0.2942,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.58082947,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"489","last_page":"496"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8972513675689697},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7229104042053223},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.692491888999939},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6516162157058716},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6004723310470581},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.5316287279129028},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4799407124519348},{"id":"https://openalex.org/keywords/adjacency-list","display_name":"Adjacency list","score":0.4653305411338806},{"id":"https://openalex.org/keywords/multi-agent-system","display_name":"Multi-agent system","score":0.46447670459747314},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45141294598579407},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.4218016266822815},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3853864073753357},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3438166379928589},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3139934539794922},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18208083510398865},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14536574482917786}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8972513675689697},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7229104042053223},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.692491888999939},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6516162157058716},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6004723310470581},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.5316287279129028},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4799407124519348},{"id":"https://openalex.org/C110484373","wikidata":"https://www.wikidata.org/wiki/Q264398","display_name":"Adjacency list","level":2,"score":0.4653305411338806},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.46447670459747314},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45141294598579407},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.4218016266822815},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3853864073753357},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3438166379928589},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3139934539794922},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18208083510398865},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14536574482917786},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icarcv50220.2020.9305492","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icarcv50220.2020.9305492","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 16th International Conference on Control, Automation, Robotics and Vision (ICARCV)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5799999833106995,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W271810198","https://openalex.org/W587265912","https://openalex.org/W1522419168","https://openalex.org/W1604665513","https://openalex.org/W2004791924","https://openalex.org/W2039250476","https://openalex.org/W2039984414","https://openalex.org/W2056790703","https://openalex.org/W2068740779","https://openalex.org/W2086959852","https://openalex.org/W2272544077","https://openalex.org/W2283365629","https://openalex.org/W2319415081","https://openalex.org/W2501990301","https://openalex.org/W2524156903","https://openalex.org/W2760283564","https://openalex.org/W2761428690","https://openalex.org/W2790351206","https://openalex.org/W2898740172","https://openalex.org/W2901223909","https://openalex.org/W2916555858","https://openalex.org/W2996049890","https://openalex.org/W4389930878","https://openalex.org/W6636161696","https://openalex.org/W6756194695","https://openalex.org/W6860395660"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W2765763546","https://openalex.org/W96612179","https://openalex.org/W4386482731","https://openalex.org/W4229499248","https://openalex.org/W4385302085","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2360429410","https://openalex.org/W4390188535"],"abstract_inverted_index":{"In":[0],"the":[1,15,30,44,58,72,97],"paper,":[2],"multi-agent":[3],"system":[4,49,99],"under":[5,50],"Denial-of-Service":[6],"(DoS)":[7],"attacks":[8,29,52],"is":[9,12,20,61],"considered.":[10],"It":[11],"assumed":[13],"that":[14,96],"dynamics":[16],"of":[17,48,57,71,74,79,91,104],"each":[18],"agent":[19],"defined":[21],"on":[22],"an":[23],"arbitrary":[24],"time":[25],"scale":[26],"and":[27,85],"during":[28],"adversaries":[31],"can":[32],"attack":[33],"part":[34],"or":[35],"all":[36],"channels":[37],"at":[38],"any":[39],"time.":[40],"Sufficient":[41],"conditions":[42],"for":[43],"global":[45],"exponential":[46],"stability":[47],"DoS":[51,105],"are":[53],"derived.":[54],"The":[55],"effectiveness":[56],"theoretical":[59],"results":[60],"illustrated":[62],"by":[63],"numerical":[64],"examples.":[65],"Moreover,":[66],"we":[67],"propose":[68],"practical":[69],"solutions":[70],"deployment":[73],"links":[75],"in":[76,102],"a":[77],"network":[78],"cooperative":[80],"devices":[81],"(servers,":[82],"computers,":[83],"robots":[84],"etc.),":[86],"according":[87],"to":[88],"adjacency":[89],"matrices":[90],"quasi-Abelian":[92],"Cayley":[93],"graphs,":[94],"so":[95],"entire":[98],"still":[100],"works":[101],"spite":[103],"attacks.":[106]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
