Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Self-organized and ad hoc communications have many fundamental principles in common and also face similar problems in the domains of security and Quality of Service. Trust manageme...
Vassileios Tsetsos, Giannis F. Marias, Sarantis Pa...
The increasing popularity of resource exchange through peerto-peer networks has encouraged the development of ways to support more complex commercial transactions over these netwo...
To secure good deals, an agent may engage in multiple concurrent negotiations for a particular good or service. However for this to be effective, the agent needs to carefully coor...