In E-learning systems, where both helpers (tutors) and learners are separated geographically, finding a reliable helper is one of the most important challenges. Although helpers c...
Mohammed Abdel Razek, Claude Frasson, Marc Kaltenb...
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
This paper investigates the effects of two different communication protocols within an artificial society, where communication and cooperation is necessary to survive. Communicat...
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli