Sciweavers

1332 search results - page 140 / 267
» ideas 2008
Sort
View
IJIS
2008
115views more  IJIS 2008»
15 years 4 months ago
A new semantics for ACL based on commitments and penalties
Abstract. In complex multi agent systems, the agents may be heterogeneous and possibly designed by different programmers. Thus, the importance of defining a standard framework for ...
Leila Amgoud, Florence Dupin de Saint-Cyr
IJNSEC
2008
129views more  IJNSEC 2008»
15 years 4 months ago
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...
IJNSEC
2008
175views more  IJNSEC 2008»
15 years 4 months ago
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
A location-aware scheme uses a priori knowledge of the deployed sensor nodes of some target field in a sensor network. Such location-aware schemes improve substantially higher net...
Ashok Kumar Das
IJNSEC
2008
113views more  IJNSEC 2008»
15 years 4 months ago
A Fragile Associative Watermarking on 2D Barcode for Data Authentication
Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing ...
Jau-Ji Shen, Po-Wei Hsu
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 4 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti