Sciweavers

529 search results - page 63 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
ATAL
2004
Springer
13 years 11 months ago
State-Space Reduction Techniques in Agent Verification
We have developed a set of tools to allow the use of model-checking techniques for the verification of systems directly implemented in an agent-oriented programming language. The ...
Rafael H. Bordini, Michael Fisher, Willem Visser, ...
CSREASAM
2010
13 years 4 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
ACSAC
2003
IEEE
13 years 11 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
ATAL
2010
Springer
13 years 8 months ago
AgentC: agent-based testbed for adversarial modeling and reasoning in the maritime domain
We present an agent-based system for modeling, analyzing and reasoning in the maritime domain with the emphasis on detecting, anticipating and preventing illegitimate activities, ...
Michal Jakob, Ondrej Vanek, Stepán Urban, P...
ACSAC
2008
IEEE
14 years 2 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...