As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
The growing interconnection of the world and steep development of technologies increase the demand for large and complex critical energy infrastructures. In parallel, the task of optimal security of such infrastructures becomes a challenging task. Comprehensive area surveillance and effective mobile asset monitoring are two main tasks requiring non-trivial reasoning and planning. State of the art advances in mobile robotics provide means to optimally conduct these tasks using unmanned aerial vehicles (UAV) and a number of algorithms and techniques was developed to be able to deploy multiple UAVs able to act autonomously and perform high-level tasks specified by an operator. In seaborne transportation infrastructures the large space prohibits usage of UAVs and another means of security of oil and gas transport has to be sought. We present a brief overview of techniques used in the domain of contemporary maritime piracy, where the vulnerable assets need to transit pirate infested waters. In the center stands a multi-agent simulation which provides means to capture main structure of the problem and thus is able to evaluate countermeasures proposed by domain experts.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.