{"id":"https://openalex.org/W2895958276","doi":"https://doi.org/10.1145/3264437.3264475","title":"Development of the Anomaly Detection Method for a Group of Mobile Robots","display_name":"Development of the Anomaly Detection Method for a Group of Mobile Robots","publication_year":2018,"publication_date":"2018-09-10","ids":{"openalex":"https://openalex.org/W2895958276","doi":"https://doi.org/10.1145/3264437.3264475","mag":"2895958276"},"language":"en","primary_location":{"id":"doi:10.1145/3264437.3264475","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3264437.3264475","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security of Information and Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009411018","display_name":"Elena Basan","orcid":"https://orcid.org/0000-0001-6127-4484"},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Elena Basan","raw_affiliation_strings":["Department of Information Security, Southern Federal University, Taganrog, Russia"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Southern Federal University, Taganrog, Russia","institution_ids":["https://openalex.org/I137534880"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047361237","display_name":"Oleg Makarevich","orcid":"https://orcid.org/0000-0003-0066-8564"},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Oleg Makarevich","raw_affiliation_strings":["Department of Information Security, Southern Federal University, Taganrog, Russia"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Southern Federal University, Taganrog, Russia","institution_ids":["https://openalex.org/I137534880"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037034305","display_name":"Alexander Basan","orcid":"https://orcid.org/0000-0002-2973-2737"},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Alexandr Basan","raw_affiliation_strings":["Department of Information Security, Southern Federal University, Taganrog, Russia"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Southern Federal University, Taganrog, Russia","institution_ids":["https://openalex.org/I137534880"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009411018"],"corresponding_institution_ids":["https://openalex.org/I137534880"],"apc_list":null,"apc_paid":null,"fwci":0.1954,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58323917,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8069989681243896},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7395745515823364},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6117756962776184},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.588801383972168},{"id":"https://openalex.org/keywords/mobile-robot","display_name":"Mobile robot","score":0.4709038734436035},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46422550082206726},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.46019768714904785},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.43957772850990295},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.42915576696395874},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2097972333431244},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.09329724311828613}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8069989681243896},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7395745515823364},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6117756962776184},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.588801383972168},{"id":"https://openalex.org/C19966478","wikidata":"https://www.wikidata.org/wiki/Q4810574","display_name":"Mobile robot","level":3,"score":0.4709038734436035},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46422550082206726},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.46019768714904785},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.43957772850990295},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.42915576696395874},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2097972333431244},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.09329724311828613},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3264437.3264475","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3264437.3264475","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security of Information and Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.9100000262260437}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1871618398","https://openalex.org/W2015410863","https://openalex.org/W2027840659","https://openalex.org/W2034419870","https://openalex.org/W2161166082","https://openalex.org/W2784231356","https://openalex.org/W2784597565"],"related_works":["https://openalex.org/W2039821316","https://openalex.org/W2388081684","https://openalex.org/W2017017061","https://openalex.org/W2765293204","https://openalex.org/W1557263371","https://openalex.org/W3116615970","https://openalex.org/W2125459098","https://openalex.org/W2226934102","https://openalex.org/W2795339160","https://openalex.org/W2997892586"],"abstract_inverted_index":{"This":[0,98],"article":[1],"studied":[2],"the":[3,27,34,70,73,76,80,88,91,107,116,128,134,142],"attacks":[4,19,74],"that":[5,21],"can":[6],"be":[7,110],"implemented":[8],"in":[9,112,119],"a":[10,24,45,49,122,138],"network":[11,37,83,131,136],"of":[12,17,29,36,48,51,60,72,90,93,96,130,144],"mobile":[13,52],"robots.":[14,53],"The":[15,39],"peculiarity":[16],"these":[18],"is":[20,124],"they,":[22],"as":[23,137],"rule,":[25],"use":[26],"vulnerabilities":[28],"wireless":[30],"data":[31],"transmission":[32],"and":[33,79,133],"weakness":[35],"protocols.":[38],"study":[40],"was":[41,55,68,86],"carried":[42],"out":[43],"using":[44],"simulation":[46],"model":[47],"group":[50],"It":[54,85],"modeled":[56],"following":[57],"attacks:":[58],"denial":[59],"service,":[61],"Black-Hole,":[62],"Gray-Hole.":[63],"In":[64],"this":[65,120],"case,":[66],"it":[67,102],"analyzed":[69],"impact":[71,81],"on":[75,82,141],"energy":[77],"consumption":[78],"traffic.":[84],"assessed":[87],"complexity":[89],"implementation":[92],"various":[94],"types":[95],"attacks.":[97],"analysis":[99],"should":[100,109],"make":[101],"clear":[103],"with":[104],"what":[105],"intensity":[106],"attack":[108],"conducted":[111],"order":[113],"to":[114],"damage":[115],"network.":[117],"Also":[118],"study,":[121],"method":[123],"proposed":[125],"for":[126],"calculating":[127],"trust":[129],"nodes":[132],"entire":[135],"whole":[139],"based":[140],"number":[143],"discarded":[145],"packets.":[146]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
