Towards stealthy behaviors

نویسندگان

  • Emil Birgersson
  • Andrew Howard
  • Gaurav S. Sukhatme
چکیده

This paper describes a behavior-based approach to stealth. The specific problem we consider is that of making stealthy traverses, i.e., transiting from one point to another while remaining hidden from an observer. Since we assume that the robot has no a priori model of the environment, our stealthy traverse behavior makes opportunistic use of terrain features to hide from the observer. This behavior has been evaluated in both real and simulated experiments, comparing it against a regular goal-seeking/obstacle-avoidance behavior. These experiments show a clear improvement in the stealthiness of the robot.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Malware Message Analysis through Binary Traces

Many malware trigger their malicious behaviors only if they detect some particular conditions from the environment. Under normal conditions these behaviors are hidden deeply under obfuscated codes, but they may be activated at any time by a Command and Control (C and C) server. However, connections to the C and C are not completely stealthy. We propose to analyse the way messages are operated b...

متن کامل

Inherent structures for soft long-range interactions in two-dimensional many-particle systems.

We generate inherent structures, local potential-energy minima, of the "k-space overlap potential" in two-dimensional many-particle systems using a cooling and quenching simulation technique. The ground states associated with the k-space overlap potential are stealthy (i.e., completely suppress single scattering of radiation for a range of wavelengths) and hyperuniform (i.e., infinite wavelengt...

متن کامل

Optimum Stealthy Aircraft Detection Using a Multistatic Radar Hassan

Radar systems, based on Multistatic radar concept attracted a substantial attention in the recent years. The paper proposes system geometry for S-band Multistatic radar. This technique is used for detecting and tracking the small cross section area and stealthy aircrafts. The proposed geometrical structures are studied with different radars spacing to extend the detection coverage over the Mono...

متن کامل

Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud

Cloud computing, with the paradigm of computing as a utility, has the potential to significantly tranform the IT industry. Attracted by the high efficiency, low cost, and great flexibility of cloud, enterprises began to migrate large parts of their networks into cloud. The cloud becomes a public space where multiple “tenants” reside. Except for some public services, the enterprise networks in c...

متن کامل

Towards Stealthy Malware Detection1

Malcode can be easily hidden in document files and go undetected by standard technology. We demonstrate this opportunity of stealthy malcode insertion in several experiments using a standard COTS Anti-Virus (AV) scanner. Furthermore, in the case of zero-day malicious exploit code, signature-based AV scanners would fail to detect such malcode even if the scanner knew where to look. We propose th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003