Flocks, herds and schools: A distributed behavioral model
SIGGRAPH '87 Proceedings of the 14th annual conference on Computer graphics and interactive techniques
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
Adaptive trust-based anonymous network
International Journal of Security and Networks
Securing Wi-Fi networks with position verification: extended version
International Journal of Security and Networks
On pairwise connectivity of wireless multihop networks
International Journal of Security and Networks
Hash-AV: fast virus signature scanning by cache-resident filters
International Journal of Security and Networks
Secure message delivery in publish/subscribe networks using overlay multicast
International Journal of Security and Networks
Optimal worm-scanning method using vulnerable-host distributions
International Journal of Security and Networks
Vulnerabilities in distance-indexed IP traceback schemes
International Journal of Security and Networks
Single packet IP traceback in AS-level partial deployment scenario
International Journal of Security and Networks
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
International Journal of Security and Networks
Design and analysis of a multipacket signature detection system
International Journal of Security and Networks
Analysis of flow-correlation attacks in anonymity network
International Journal of Security and Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
A lightweight encryption and authentication scheme for wireless sensor networks
International Journal of Security and Networks
Analysis of routing security-energy trade-offs in wireless sensor networks
International Journal of Security and Networks
Load-balanced key establishment methodologies in wireless sensor networks
International Journal of Security and Networks
Limiting DoS attacks during multihop data delivery in wireless sensor networks
International Journal of Security and Networks
End-to-end security mechanisms for SMS
International Journal of Security and Networks
International Journal of Security and Networks
A self-encryption authentication protocol for teleconference services
International Journal of Security and Networks
An adaptive expert system approach for intrusion detection
International Journal of Security and Networks
Convertible identity-based anonymous designated ring signatures
International Journal of Security and Networks
Low-power authenticated group key agreement for heterogeneous wireless networks
International Journal of Security and Networks
A new signature scheme without random oracles
International Journal of Security and Networks
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
International Journal of Security and Networks
International Journal of Security and Networks
Workflow authorisation in mediator-free environments
International Journal of Security and Networks
Vulnerability analysis of certificate graphs
International Journal of Security and Networks
Secure scalable group signature with dynamic joins and separable authorities
International Journal of Security and Networks
A survey of key evolving cryptosystems
International Journal of Security and Networks
A taxonomy of internet traceback
International Journal of Security and Networks
An approach to synthesise safe systems
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
International Journal of Security and Networks
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Secure collaborations over message boards
International Journal of Security and Networks
Bio-inspired visual attention in agile sensing for target detection
International Journal of Sensor Networks
Modeling collaborative robots for detecting intrusions
CTS '09 Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems
Primate social systems, scent-marking and their applications in mobile and static sensor networks
International Journal of Sensor Networks
Primate-Inspired Scent Marking for Mobile and Static Sensors and RFID Tags
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Stochastic Event Capture Using Single Robot Moving along a Certain Track
MSN '09 Proceedings of the 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks
Studying bio-inspired coalition formation of robots for detecting intrusions using game theory
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Towards modelling the impact of cyber attacks on a smart grid
International Journal of Security and Networks
Privacy protection system and metrics for hiding electrical events
International Journal of Security and Networks
Secure and privacy-preserving information aggregation for smart grids
International Journal of Security and Networks
Application-aware secure multicast for power grid communications
International Journal of Security and Networks
Subjective audio quality over a secure IEEE 802.11n network
International Journal of Security and Networks
Bio-Inspired Computing and Networking
Bio-Inspired Computing and Networking
Primate-Inspired Communication Methods for Mobile and Static Sensors and RFID Tags
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags
Wireless Communications & Mobile Computing
Architecture and protocol design for a pervasive robot swarm communication networks
Wireless Communications & Mobile Computing
Studying the stochastic capturing of moving intruders by mobile sensors
Computers & Mathematics with Applications
Error analysis of range-based localisation algorithms in wireless sensor networks
International Journal of Sensor Networks
Hi-index | 0.00 |
This paper addresses the effects of leaders on the consistency of group behaviour. First, a mathematical model is established so that the group attempts to reach a common velocity direction. The action range of leaders is formulated by their communication range. The followers update their states according to the states of both the other followers in the vicinity and the leaders which can communicate with the current follower. After establishing a system model, we then conduct simulations to discover the effects of leaders on the consistency of a group behaviour. Finally, we obtain the following results: (a) the leader is very useful in compelling the group to be consistent, even when the impact factor of the leader is very small; (b) the total consistency of the group is determined not only by the communication range of the leader, but also by the communication range of the followers.