메뉴 건너뛰기




Volumn 11, Issue 2, 2012, Pages 126-135

The effect of leaders on the consistency of group behaviour

Author keywords

Coordination control; Emergence; Group behaviour; Leader follower; Swarm intelligence

Indexed keywords

COMMUNICATION RANGE; COORDINATION CONTROL; CURRENT FOLLOWERS; EMERGENCE; GROUP BEHAVIOR; IMPACT FACTOR; LEADER-FOLLOWER; SYSTEM MODELS; VELOCITY DIRECTIONS;

EID: 84859088385     PISSN: 17481279     EISSN: 17481287     Source Type: Journal    
DOI: 10.1504/IJSNET.2012.045962     Document Type: Article
Times cited : (12)

References (75)
  • 1
    • 84859042889 scopus 로고    scopus 로고
    • Social behaviors of the California sea lion, bottlenose dolphin, and orca whal
    • in Xiao, Y. (Ed.). CRC Press, New York, NY
    • Adams, N.W. and Xiao, Y. (2011) 'Social behaviors of the California sea lion, bottlenose dolphin, and orca whale', in Xiao, Y. (Ed.): Bio-inspired Computing and Networking, CRC Press, New York, NY, pp.19-40.
    • (2011) Bio-inspired Computing and Networking , pp. 19-40
    • Adams, N.W.1    Xiao, Y.2
  • 2
    • 79951694028 scopus 로고    scopus 로고
    • Analysis of routing security-energy trade-offs in wireless sensor networks
    • Al-Karaki, J.N. (2006) 'Analysis of routing security-energy trade-offs in wireless sensor networks', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.147-157.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 147-157
    • Al-Karaki, J.N.1
  • 3
    • 49949107235 scopus 로고    scopus 로고
    • Load-balanced key establishment methodologies in wireless sensor networks
    • Araz, O. and Qi, H. (2006) 'Load-balanced key establishment methodologies in wireless sensor networks', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.158-166.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 158-166
    • Araz, O.1    Qi, H.2
  • 4
    • 39349109602 scopus 로고    scopus 로고
    • Design and analysis of a multipacket signature detection system
    • Artan, N.S. and Chao, H.J. (2007) 'Design and analysis of a multipacket signature detection system', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.122-136.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 122-136
    • Artan, N.S.1    Chao, H.J.2
  • 6
    • 34548366188 scopus 로고    scopus 로고
    • Optimal worm-scanning method using vulnerable-host distributions
    • Chen, Z. and Ji, C. (2007) 'Optimal worm-scanning method using vulnerable-host distributions', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.71-80.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 71-80
    • Chen, Z.1    Ji, C.2
  • 7
    • 77955710234 scopus 로고    scopus 로고
    • Convertible identity-based anonymous designated ring signatures
    • Chen, Y., Susilo, W. and Mu, Y. (2006) 'Convertible identity-based anonymous designated ring signatures', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.218-225.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 218-225
    • Chen, Y.1    Susilo, W.2    Mu, Y.3
  • 8
    • 13444292210 scopus 로고    scopus 로고
    • Effective leadership and decision-making in animal groups on the move
    • DOI 10.1038/nature03236
    • Couzin, I.D., Krause J., Franks, N.R. and Levin, SA. (2005) 'Effective leadership and decision-making in animal groups on the move', Nature, Vol. 433, pp.513-516. (Pubitemid 40204306)
    • (2005) Nature , vol.433 , Issue.7025 , pp. 513-516
    • Couzin, I.D.1    Krause, J.2    Franks, N.R.3    Levin, S.A.4
  • 9
    • 84890880165 scopus 로고    scopus 로고
    • Limiting DoS attacks during multihop data delivery in wireless sensor networks
    • Deng, J., Han, R. and Mishra, S. (2006) 'Limiting DoS attacks during multihop data delivery in wireless sensor networks', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.167-178.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 167-178
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 10
    • 72449209394 scopus 로고    scopus 로고
    • Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
    • Englund, H. and Johansson, T. (2006) 'Three ways to mount distinguishing attacks on irregularly clocked stream ciphers', International Journal of Security and Networks, Vol. 1, Nos. 1/2, pp.95-102.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 95-102
    • Englund, H.1    Johansson, T.2
  • 11
    • 74049111426 scopus 로고    scopus 로고
    • Hash-AV: Fast virus signature scanning by cache-resident filters
    • Erdogan, O. and Cao, P. (2007) 'Hash-AV: fast virus signature scanning by cache-resident filters', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.50-59.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 50-59
    • Erdogan, O.1    Cao, P.2
  • 12
    • 74549166520 scopus 로고    scopus 로고
    • Wireless networking security: Open issues in trust, management, interoperation and measurement
    • Evans, J.B., Wang, W. and Ewy, B.J. (2006) 'Wireless networking security: open issues in trust, management, interoperation and measurement', International Journal of Security and Networks, Vol. 1, Nos. 1/2, pp.84-94.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 84-94
    • Evans, J.B.1    Wang, W.2    Ewy, B.J.3
  • 17
    • 51249122792 scopus 로고    scopus 로고
    • A self-encryption authentication protocol for teleconference services
    • Jiang, Y., Lin, C., Shi, M. and Shen, X. (2006) 'A self-encryption authentication protocol for teleconference services', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.198-205.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 198-205
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen, X.4
  • 21
    • 44649095872 scopus 로고    scopus 로고
    • A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
    • Karyotis, V., Papavassiliou, S., Grammatikou, M. and Maglaris, V. (2006) 'A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.255-265.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 255-265
    • Karyotis, V.1    Papavassiliou, S.2    Grammatikou, M.3    Maglaris, V.4
  • 22
    • 54249117650 scopus 로고    scopus 로고
    • Secure scalable group signature with dynamic joins and separable authorities
    • Kiayias, A. and Yung, M. (2006) 'Secure scalable group signature with dynamic joins and separable authorities', International Journal of Security and Networks, Vol. 1, Nos. 1-/2, pp.24-45.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 24-45
    • Kiayias, A.1    Yung, M.2
  • 26
    • 79551652560 scopus 로고    scopus 로고
    • DKMS: Distributed hierarchical access control for multimedia networks
    • Li, R., Li, J. and Chen, H. (2007) 'DKMS: distributed hierarchical access control for multimedia networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.3-10.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 3-10
    • Li, R.1    Li, J.2    Chen, H.3
  • 27
    • 79954614519 scopus 로고    scopus 로고
    • Secure and privacy-preserving information aggregation for smart grids
    • Li, F., Luo, B. and Liu, P. (2011) 'Secure and privacy-preserving information aggregation for smart grids', International Journal of Security and Networks, Vol. 6, No. 1, pp.28-39.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.1 , pp. 28-39
    • Li, F.1    Luo, B.2    Liu, P.3
  • 35
    • 79551646922 scopus 로고    scopus 로고
    • End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
    • Ling, H. and Znati, T. (2007) 'End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.109-121.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 109-121
    • Ling, H.1    Znati, T.2
  • 36
    • 67649498303 scopus 로고    scopus 로고
    • Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection
    • Liu, Y., Comaniciu, C. and Man, H. (2006) 'Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.243-254.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 243-254
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 37
    • 77952585809 scopus 로고    scopus 로고
    • Bio-inspired visual attention in agile sensing for target detection
    • Liu, J., Xiao, Y., Hao, Q. and Ghaboosi, K. (2009) 'Bio-inspired visual attention in agile sensing for target detection', International Journal of Sensor Networks, Vol. 5, No. 2, pp.98-111.
    • (2009) International Journal of Sensor Networks , vol.5 , Issue.2 , pp. 98-111
    • Liu, J.1    Xiao, Y.2    Hao, Q.3    Ghaboosi, K.4
  • 39
    • 74549116861 scopus 로고    scopus 로고
    • Securing Wi-Fi networks with position verification: Extended version
    • Malaney, R.A. (2007) 'Securing Wi-Fi networks with position verification: extended version', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.27-36.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 27-36
    • Malaney, R.A.1
  • 40
    • 0001158846 scopus 로고
    • Absence of ferromagnetism or anti-ferromagnetism in one or two-dimensional isotropic Heisenberg models
    • Mermin, N.D. and Wagner, H. (1966) 'Absence of ferromagnetism or anti-ferromagnetism in one or two-dimensional isotropic Heisenberg models', Physical Review Letters, Vol. 17, No. 22, pp.1133-1136.
    • (1966) Physical Review Letters , vol.17 , Issue.22 , pp. 1133-1136
    • Mermin, N.D.1    Wagner, H.2
  • 41
    • 33746327503 scopus 로고    scopus 로고
    • Ecological networks and their fragility
    • DOI 10.1038/nature04927, PII NATURE04927
    • Montoya, J.M., Pimm, S.L. and Solé, R.V. (2006) 'Ecological networks and their fragility', Nature, Vol. 442, pp.259-264. (Pubitemid 44114895)
    • (2006) Nature , vol.442 , Issue.7100 , pp. 259-264
    • Montoya, J.M.1    Pimm, S.L.2    Sole, R.V.3
  • 42
    • 77955290752 scopus 로고    scopus 로고
    • An adaptive expert system approach for intrusion detection
    • Owens, S.F. and Levary, R.R. (2006) 'An adaptive expert system approach for intrusion detection', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.206-217.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 206-217
    • Owens, S.F.1    Levary, R.R.2
  • 43
    • 79551647519 scopus 로고    scopus 로고
    • Vulnerabilities in distance-indexed IP traceback schemes
    • Pan, J., Cai, L. and Shen, X. (2007) 'Vulnerabilities in distance-indexed IP traceback schemes', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.81-94.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 81-94
    • Pan, J.1    Cai, L.2    Shen, X.3
  • 44
    • 44949242883 scopus 로고    scopus 로고
    • Computational ecology: From the complex to the simple and back
    • Pascual, M. (2005) 'Computational ecology: from the complex to the simple and back', PLoS Computational Biology, Vol. 1, No. 2, pp.101-105.
    • (2005) PLoS Computational Biology , vol.1 , Issue.2 , pp. 101-105
    • Pascual, M.1
  • 45
    • 79551643767 scopus 로고    scopus 로고
    • Secure message delivery in publish/subscribe networks using overlay multicast
    • Rabinovich, P. and Simon, R. (2007) 'Secure message delivery in publish/subscribe networks using overlay multicast', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.60-70.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 60-70
    • Rabinovich, P.1    Simon, R.2
  • 48
    • 0023379184 scopus 로고
    • Flocks, herds, and schools: A distributed behavioral model
    • Reynolds, C.W. (1987) 'Flocks, herds, and schools: a distributed behavioral model', Computer Graphics, Vol. 21, No. 4, pp.25-34.
    • (1987) Computer Graphics , vol.21 , Issue.4 , pp. 25-34
    • Reynolds, C.W.1
  • 49
    • 33746374366 scopus 로고    scopus 로고
    • Structural asymmetry and the stability of diverse food webs
    • DOI 10.1038/nature04887, PII NATURE04887
    • Rooney, N., McCann, K., Gellner, G. and Moore, J.C. (2006) 'Structural asymmetry and the stability of diverse food webs', Nature, Vol. 442, pp.265-269. (Pubitemid 44114896)
    • (2006) Nature , vol.442 , Issue.7100 , pp. 265-269
    • Rooney, N.1    McCann, K.2    Gellner, G.3    Moore, J.C.4
  • 52
    • 74549171036 scopus 로고    scopus 로고
    • On pairwise connectivity of wireless multihop networks
    • Sun, F. and Shayman, M.A. (2007) 'On pairwise connectivity of wireless multihop networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.37-49.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 37-49
    • Sun, F.1    Shayman, M.A.2
  • 53
    • 77954644745 scopus 로고    scopus 로고
    • A new signature scheme without random oracles
    • Tan, C. (2006) 'A new signature scheme without random oracles', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.237-242.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 237-242
    • Tan, C.1
  • 54
    • 79951716783 scopus 로고    scopus 로고
    • Low-power authenticated group key agreement for heterogeneous wireless networks
    • Teo, J., Tan, C. and Ng, J. (2006) 'Low-power authenticated group key agreement for heterogeneous wireless networks', International Journal of Security and Networks, Vol. 1, Nos. 3-4, pp.226-236.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 226-236
    • Teo, J.1    Tan, C.2    Ng, J.3
  • 56
    • 0001730998 scopus 로고
    • Novel type of phase transition in a system of self-driven particles
    • Vicsek, T., Cziróok, A., Ben-Jacob, E., Cohen, I. and Shochet, O. (1995) 'Novel type of phase transition in a system of self-driven particles', Physical Review Letter, Vol. 75, No. 6, pp.1226-1229.
    • (1995) Physical Review Letter , vol.75 , Issue.6 , pp. 1226-1229
    • Vicsek, T.1    Cziróok, A.2    Ben-Jacob, E.3    Cohen, I.4    Shochet, O.5
  • 57
    • 77955716028 scopus 로고    scopus 로고
    • The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
    • Wang, X. (2006) 'The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.184-197.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 184-197
    • Wang, X.1
  • 65
    • 84879604927 scopus 로고    scopus 로고
    • A critical line based boundary surveillance strategy in wireless sensor networks
    • Special issue on Challenges in Next-Generation and Resource-Constrained Networks. DOI: 10.1007/s11235-011-9453-0. 2011
    • Xiao, Y. and Zhang, Y. (2011a) 'A critical line based boundary surveillance strategy in wireless sensor networks', Telecommunication Systems Journal, Special issue on Challenges in Next-Generation and Resource-Constrained Networks. DOI: 10.1007/s11235-011-9453-0. 2011.
    • (2011) Telecommunication Systems Journal
    • Xiao, Y.1    Zhang, Y.2
  • 67
    • 84859081367 scopus 로고    scopus 로고
    • Primate-inspired communication methods for mobile and static sensors and RFID tags
    • Xiao, Y., Zhang, Y. and Liang, X. (2011) 'Primate-inspired communication methods for mobile and static sensors and RFID tags', ACM Transactions on Autonomous and Adaptive Systems, Vol. 6, No. 4.
    • (2011) ACM Transactions on Autonomous and Adaptive Systems , vol.6 , Issue.4
    • Xiao, Y.1    Zhang, Y.2    Liang, X.3
  • 68
    • 79954585471 scopus 로고    scopus 로고
    • Application-aware secure multicast for power grid communications
    • Zhang, J. and Gunter, C.A. (2011) 'Application-aware secure multicast for power grid communications', International Journal of Security and Networks, Vol. 6, No. 1, pp.40-52.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.1 , pp. 40-52
    • Zhang, J.1    Gunter, C.A.2
  • 69
    • 79955980141 scopus 로고    scopus 로고
    • A lightweight encryption and authentication scheme for wireless sensor networks
    • Zheng, J., Li, J., Lee, M.J. and Anshel, M. (2006) 'A lightweight encryption and authentication scheme for wireless sensor networks', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.138-146.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 138-146
    • Zheng, J.1    Li, J.2    Lee, M.J.3    Anshel, M.4
  • 72
    • 70449134609 scopus 로고    scopus 로고
    • Primate social systems, scent-marking, and their applications in mobile and static sensor networks
    • Zhang, Y., Xiao, Y. and Bales, K.L. (2009) 'Primate social systems, scent-marking, and their applications in mobile and static sensor networks', International Journal of Sensor Networks, Vol. 5, No. 4, pp.210-222.
    • (2009) International Journal of Sensor Networks , vol.5 , Issue.4 , pp. 210-222
    • Zhang, Y.1    Xiao, Y.2    Bales, K.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.