This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
The movement of design out of the workplace and into the home brings with it the need to develop new analytic concepts to consider how ubiquitous computing might relate to and supp...
Andy Crabtree, Tom Rodden, Terry Hemmings, Steve B...
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
Multi-agent interactions often result in mutual occlusion sequences which constitute a visual signature for the event. We define six qualitative occlusion primitives based on the ...
Amitabha Mukerjee, K. S. Venkatesh, Pabitra Mitra,...
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...