Sciweavers

270 search results - page 23 / 54
» Distribution of Mobile Agents in Vulnerable Networks
Sort
View
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
14 years 2 months ago
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures
Information systems now form the backbone of nearly every government and private system. Increasingly these systems are networked together allowing for distributed operations, sha...
Frederick T. Sheldon, Stephen Gordon Batsell, Stac...
AINA
2004
IEEE
14 years 11 days ago
A Mathematical Model for Analyzing the Proxy Bidding Method for Mobile Agent-Based Auction Services
This paper presents an auction system based on mobile agents. By using a proxy server, a user can generate a mobile auction agent by giving the bidding information, including the ...
Jie Zhang, Henry C. B. Chan
DEXAW
2004
IEEE
166views Database» more  DEXAW 2004»
14 years 10 days ago
Development of Flexible Peer-To-Peer Information Systems Using Adaptable Mobile Agents
Wide-area networks provide an easy access to many different distributed and heterogeneous data sources. The development of automated operating tools is still complex, particularly...
Jean-Paul Arcangeli, Sebastien Leriche, Marc Pante...
MATA
2004
Springer
189views Communications» more  MATA 2004»
14 years 2 months ago
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 9 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries