Sciweavers

529 search results - page 15 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
CSREASAM
2006
13 years 9 months ago
Custom Plugin - A Solution to Phishing and Pharming Attacks
- This paper proposes a new method to detect, alert and protect the user from Internationalized Domain Names [1] (IDN) and Uniform Resource Locator (URL) spoofing, phishing, pharmi...
Omer Mahmood
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
14 years 2 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...
SAINT
2002
IEEE
14 years 21 days ago
Internet Mail Transfer and Check System Based on Intelligence Mobile Agents
The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today’s Internet world, but there are many dark clouds at the edge of the sunshin...
Li Cheng, Wang Weinong
ICPPW
2002
IEEE
14 years 22 days ago
A Structural Framework for Modeling Multi-Stage Network Attacks
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
Kristopher Daley, Ryan Larson, Jerald Dawkins
ECAI
2006
Springer
13 years 11 months ago
Verifying Interlevel Relations Within Multi-Agent Systems
An approach to handle the complex dynamics of a multi-agent system is based on distinguishing aggregation levels by structuring the system into parts or components. The behavior of...
Alexei Sharpanskykh, Jan Treur