Academic literature on the topic 'Security agents'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security agents.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security agents"

1

Zrari, Chadha, Hela Hachicha, and Khaled Ghedira. "Agent's Security During Communication in Mobile Agents System." Procedia Computer Science 60 (2015): 17–26. http://dx.doi.org/10.1016/j.procs.2015.08.100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bagga, Pallavi, and Rahul Hans. "Mobile Agents System Security." ACM Computing Surveys 50, no. 5 (2017): 1–45. http://dx.doi.org/10.1145/3095797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Greenberg, M. S., L. C. Byington, and D. G. Harper. "Mobile agents and security." IEEE Communications Magazine 36, no. 7 (1998): 76–85. http://dx.doi.org/10.1109/35.689634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dadhich, Priyanka, Dr Kamlesh Dutta, and Dr M. C. Govil. "Security Issues in Mobile Agents." International Journal of Computer Applications 11, no. 4 (2010): 1–7. http://dx.doi.org/10.5120/1574-2104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bailey, Steve. "Intelligent agents: New security issues." Computers & Security 16, no. 6 (1997): 526. http://dx.doi.org/10.1016/s0167-4048(97)84700-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rafael, Páez, Yolima Uribe Mery, and Torres Miguel. "INTERNAL SECURITY ON AN IDS BASED ON AGENTS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 129–42. https://doi.org/10.5281/zenodo.4632591.

Full text
Abstract:
An Intrusion Detection System (IDS) can monitor different events that may occur in a determined network or host, and which affect any network security service (confidentiality, integrity, availability). Because of this, an IDS must be flexible and it must detect and trace each alert without affecting the system´s performance. On the other hand, agents ina Multi-Agent system have inherent security problems due to their mobility; that’s why we propose some techniques in order to provide internal security for the agents belonging to the system. The deployed IDS works with a multiagent
APA, Harvard, Vancouver, ISO, and other styles
7

A. C., Okoye,, Ezeanya, H. C., and Chikezie, A. E. "Securing Election Processes: Interrogating the Role of Security Agents in Nigeria’s Elections." African Journal of Social Sciences and Humanities Research 8, no. 1 (2025): 61–74. https://doi.org/10.52589/ajsshr-cftnaono.

Full text
Abstract:
Election is a democratic mechanism that measures and reflects the political will of the people. Ideally, the election ought to be a peaceful process of leadership recruitment and succession. However, given the nature of the Nigerian state and the character of its politics, elections in the country often result in violence. The violence takes different forms and is mostly targeted at stakeholders like members of the opposition, election officials, electoral materials, and public and private infrastructures. Worse still, the electoral violence compromises the integrity and credibility of the out
APA, Harvard, Vancouver, ISO, and other styles
8

Oleksandr, Milov, Hrebeniuk Andrii, Nalyvaiko Andrii, et al. "Development of the space-time structure of the methodology for modeling the behavior of antagonistic agents of the security system." Eastern-European Journal of Enterprise Technologies 6, no. 2(108) (2020): 30–52. https://doi.org/10.15587/1729-4061.2020.218660.

Full text
Abstract:
The rapid development of computer technology, the emergence of modern cyber threats with signs of hybridity and synergy put forward strict requirements for the economic component of national security and especially the processes of ensuring the economy cybersecurity. The cybersecurity industry is trying to meet today's requirements by introducing new and more advanced security technologies and methods, but it is believed that such a universal approach is not enough. The study is devoted to resolving the objective contradiction between the growing practical requirements for an appropriate l
APA, Harvard, Vancouver, ISO, and other styles
9

Mohamed, A. H., and K. H. Marzouk. "Mobile Agents for Wireless Network Security." IOSR Journal of Computer Engineering 18, no. 04 (2016): 77–82. http://dx.doi.org/10.9790/0661-1804017782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hassan, Razouki, and Hair Abdellatif. "Self-Adaptive Security for Mobiles Agents." International Journal of Computer Applications 94, no. 13 (2014): 24–29. http://dx.doi.org/10.5120/16404-6102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security agents"

1

Abouzakhar, Nasser Salem. "Intelligent agents-based networks security." Thesis, University of Sheffield, 2005. http://etheses.whiterose.ac.uk/3575/.

Full text
Abstract:
The growing dependence of modem society on telecommunication and information networks has become inevitable. The increase in the number of networks interconnected over the Internet has led to an increase in security threats. The existing mobile and fixed network systems and telecommunication protocols are not appropriately designed to deal with current developed distributed attacks. I started my research work by exploring the deployment of intelligent Agents that could detect network anomalies and issue automated response actions. An Intelligent Agent (IA) [Knapik et at, 1998] is an entity tha
APA, Harvard, Vancouver, ISO, and other styles
2

Shibli, Awais. "Security Infrastructure and Applicationsfor Mobile Agents." Doctoral thesis, KTH, Data- och systemvetenskap, DSV, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-12764.

Full text
Abstract:
Research areas of this dissertation are security for mobile agents, for applications based on mobile agents, and for distributed network environments in which mobile agents execute. Mobile agents paradigm has captured researchers’ and industry’s interests long time ago because of its innovative capabilities and attractive applications. The ability of mobile agents to autonomously migrate from host to host, transferring their code and internal state, enables them to accomplish tasks in network and distributed environments more conveniently, robustly, and efficiently than traditional client-serv
APA, Harvard, Vancouver, ISO, and other styles
3

Tekbacak, Fatih Tuğlular Tuğkan. "Developing a security mechanism for software agents/." [s.l.]: [s.n.], 2006. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000526.pdf.

Full text
Abstract:
Thesis (Master)--İzmir Institute of Technology, İzmir, 2006.<br>Keywords: Agents, security protocols, software, software development, software security. Includes bibliographical references (leaves. 73-76).
APA, Harvard, Vancouver, ISO, and other styles
4

CORDEIRO, JOANNA DE VASCONCELOS. "AGENTS OF TERROR AS AGENTS OF SECURITY: CONTESTING HISTORIES OF THE IRA." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2011. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=18315@1.

Full text
Abstract:
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR<br>PROGRAMA DE SUPORTE À PÓS-GRADUAÇÃO DE INSTS. DE ENSINO<br>Aquilo que vem sendo interpretado como terror pode, por sua vez, ser interpretado como segurança. As narrativas padrão sobre organizações como o Exército Republicano Irlandês, baseadas em afirmações sobre terror de uma lado e revolução de outro, podem ser relidas com base em narrativas (também usuais) sobre segurança, termo este que infere muito mais legitimidade que terror. A dissertação se debruça sobre o pensamento de Jef Huysmans a fim de fazer uma leitura do IRA enqua
APA, Harvard, Vancouver, ISO, and other styles
5

Furst, Alexander J. "State Regulation of Private Police and Security Agents." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245626912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

WEN, XUE. "THREE ESSAYS ON SOCIAL SECURITY WITH MYOPIC AGENTS." Doctoral thesis, Università Cattolica del Sacro Cuore, 2012. http://hdl.handle.net/10280/1469.

Full text
Abstract:
Questa tesi si compone di tre capitoli. Nel primo capitolo, si presenta una rassegna della letteratura sui principali contributi teorici di modellazione per la progettazione della sicurezza sociale, assumendo gli individui come non-standard preferences. Ci concentriamo su tre approcci particolari: time inconsistent preferences, temptation preferences e myopia. Il secondo capitolo studia gli incentivi politici per la progettazione della politica di sicurezza sociale nelle democrazie competitive con le famiglie lungimiranti e miopi in un ambiente di probabilistic voting. In particolare, l'analis
APA, Harvard, Vancouver, ISO, and other styles
7

WEN, XUE. "THREE ESSAYS ON SOCIAL SECURITY WITH MYOPIC AGENTS." Doctoral thesis, Università Cattolica del Sacro Cuore, 2012. http://hdl.handle.net/10280/1469.

Full text
Abstract:
Questa tesi si compone di tre capitoli. Nel primo capitolo, si presenta una rassegna della letteratura sui principali contributi teorici di modellazione per la progettazione della sicurezza sociale, assumendo gli individui come non-standard preferences. Ci concentriamo su tre approcci particolari: time inconsistent preferences, temptation preferences e myopia. Il secondo capitolo studia gli incentivi politici per la progettazione della politica di sicurezza sociale nelle democrazie competitive con le famiglie lungimiranti e miopi in un ambiente di probabilistic voting. In particolare, l'analis
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Ke. "Mobile agent security through multi-agent cryptographic protocols." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4473/.

Full text
Abstract:
An increasingly promising and widespread topic of research in distributed computing is the mobile agent paradigm: code travelling and performing computations on remote hosts in an autonomous manner. One of the biggest challenges faced by this new paradigm is security. The issue of protecting sensitive code and data carried by a mobile agent against tampering from a malicious host is particularly hard but important. Based on secure multi-party computation, a recent research direction shows the feasibility of a software-only solution to this problem, which had been deemed impossible by some rese
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Jaljouli, Raja Computer Science &amp Engineering Faculty of Engineering UNSW. "A proposed security protocol for data gathering mobile agents." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/23999.

Full text
Abstract:
We address the security issue of the data which mobile agents gather as they are traversing the Internet. Our goal is to devise a security protocol that truly secures the data which mobile agents gather. Several cryptographic protocols were presented in the literature asserting the security of gathered data. Formal verification of the protocols reveals unforeseen security flaws, such as truncation or alteration of the collected data, breaching the privacy of the gathered data, sending others data under the private key of a malicious host, and replacing the collected data with data of similar a
APA, Harvard, Vancouver, ISO, and other styles
10

Sarracco, Fabiano. "Mobile agents security: algorithmic approaches for hostile hosts detection." Doctoral thesis, La Sapienza, 2006. http://hdl.handle.net/11573/917058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security agents"

1

Vigna, Giovanni, ed. Mobile Agents and Security. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-68671-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Giovanni, Vigna, ed. Mobile agents and security. Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jansen, Wayne. Mobile agent security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jansen, Wayne. Mobile agent security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jansen, Wayne. Mobile agent security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tom, Karygiannis, and National Institute of Standards and Technology (U.S.), eds. Mobile agent security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kunreuther, Howard. Interdependent security: The case of identical agents. National Bureau of Economic Research, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

-P, Tsai Jeffrey J., ed. Security modeling and analysis of mobile agent systems. Imperial College Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wallin, Arto. Secure auction for mobile agents. VTT Technical Research Centre of Finland, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Congress, United States. Homeland security: Information on training new Border Patrol agents. General Accountability Office, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security agents"

1

Tschudin, Christian F. "Mobile Agent Security." In Intelligent Information Agents. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-60018-0_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bella, Giampaolo. "Modelling Agents’ Knowledge Inductively." In Security Protocols. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10720107_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bella, Giampaulo. "Modelling Agents’ Knowledge Inductively." In Security Protocols. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10720107_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yoshioka, Nobukazu, Yasuyuki Tahara, Akihiko Ohsuga, and Shinichi Honiden. "Security for Mobile Agents." In Agent-Oriented Software Engineering. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44564-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wagner, Gerd. "Multi-level security in multiagent systems." In Cooperative Information Agents. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62591-7_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stojkovic, Vojislav, and Hongwei Huo. "Software Agents Action Securities." In Computational Intelligence and Security. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74377-4_74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fischmeister, Sebastian, Giovanni Vigna, and Richard A. Kemmerer. "Evaluating the Security of Three Java-Based Mobile Agent Systems." In Mobile Agents. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45647-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Foltz, Kevin, and William R. Simpson. "Enterprise Security with Endpoint Agents." In Enterprise Information Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-40783-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Meier, Arion, and Susanne Röhrig. "Security Levels for Contracting Agents." In IFIP Advances in Information and Communication Technology. Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35586-3_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Corsava, Sophia, and Vladimir Getov. "Autonomous Agents-Based Security Infrastructure." In Computational Science and Its Applications — ICCSA 2003. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44843-8_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security agents"

1

He, Yifeng, Ethan Wang, Yuyang Rong, Zifei Cheng, and Hao Chen. "Security of AI Agents." In 2025 IEEE/ACM International Workshop on Responsible AI Engineering (RAIE). IEEE, 2025. https://doi.org/10.1109/raie66699.2025.00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jabbar, Haidar, Samir Al-Janabi, and Francis Syms. "Securing Autonomous Vehicles with Smart AI Security Agents." In 2025 International Conference on New Trends in Computing Sciences (ICTCS). IEEE, 2025. https://doi.org/10.1109/ictcs65341.2025.10989346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Danish, Xujuan Zhou, Jianming Yong, and Xiaohui Tao. "User Equipment Privacy and Security Issues in 5G Network." In 2024 IEEE International Conference on Agents (ICA). IEEE, 2024. https://doi.org/10.1109/ica63002.2024.00043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aouadi, H., and M. B. Ahmed. "Mobile agents security." In IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEEE, 2005. http://dx.doi.org/10.1109/mtas.2005.207201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aouadi, H., and M. B. Ahmed. "Mobile agents security." In IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEE, 2005. http://dx.doi.org/10.1049/cp:20051518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Varadharajan, Vijay. "Security enhanced mobile agents." In the 7th ACM conference. ACM Press, 2000. http://dx.doi.org/10.1145/352600.352632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Greenstadt, Rachel, Sadia Afroz, and Michael Brennan. "Mixed-initiative security agents." In the 2nd ACM workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1654988.1654999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Oruc, Orcun. "Role-Based Embedded Domain-Specific Language for Collaborative Multi-Agent Systems through Blockchain Technology." In 9th International Conference of Security, Privacy and Trust Management (SPTM 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110501.

Full text
Abstract:
Multi-agent systems have evolved with their complexities over the past few decades. To create multi-agent systems, developers should understand the design, analysis, and implementation together. Agent-oriented software engineering applies best practices through mainly software agents with abstraction levels in the multi-agent systems. However, abstraction levels take a considerable amount of time due to the design complexity and adversity of the analysis phase before implementing them. Moreover, trust and security of multi-agent systems have never been detailed in the design and analysis phase
APA, Harvard, Vancouver, ISO, and other styles
9

Duncan, Ishbel MacDonald. "Intelligent Biological Security Testing Agents." In 2012 International Conference on Software Security and Reliability Companion. IEEE, 2012. http://dx.doi.org/10.1109/sere-c.2012.42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mohite, Vaishali, and Lata Ragha. "Cooperative Security Agents for MANET." In 2012 World Congress on Information and Communication Technologies (WICT). IEEE, 2012. http://dx.doi.org/10.1109/wict.2012.6409138.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security agents"

1

Kunreuther, Howard, and Geoffrey Heal. Interdependent Security: The Case of Identical Agents. National Bureau of Economic Research, 2002. http://dx.doi.org/10.3386/w8871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Volz, B., and Y. Pal. Security of Messages Exchanged between Servers and Relay Agents. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jiang, Ruoyi, Brian Quanz, Hongliang Fei, and Jun Huan. Rail Sensor Testbed Program: Active Agents in Containers for Transport Chain Security: Algorithms. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada539045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Minden, Gary J., Victor S. Frost, Joseph B. Evans, et al. Final Report-Rail Sensor Testbed Program: Active Agents in Containers for Transport Chain Security. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada539038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Herbert, Sian. Women’s Meaningful Participation in Water Security. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/k4d.2022.063.

Full text
Abstract:
This rapid literature review explores gender transformative practices and the meaningful participation of women in water security. There is large and growing literature base on gender and water, with most of it coming from a health, or sanitation and hygiene perspective, and most focussing on access, quality, and women as vulnerable water users and or women and water in rural communities (de Silva, Veilleux &amp; Neal, 2018). There has been a growth in focus on women’s participation in water governance, and particularly a more recent focus on meaningful participation. However, as yet, the lite
APA, Harvard, Vancouver, ISO, and other styles
6

Rahman, Habibur, and Wahid bin Ahsan. Fraud Mitigation, Usability Challenges, and Financial Literacy in Mobile Financial Services for Rural Bangladesh. Userhub, 2024. http://dx.doi.org/10.58947/journal.wpgr45.

Full text
Abstract:
This study examines barriers to mobile financial services (MFS) adoption in rural Bangladesh, focusing on usability challenges, reliance on intermediaries, fraud risks, and insufficient financial literacy. Through qualitative interviews with 18 MFS users, agents, and fintech experts, the findings reveal how low digital and financial literacy, alongside inadequate security protocols, exacerbate users’ dependency on intermediaries, increasing their fraud exposure. The study highlights the urgent need for financial literacy programs, user-centered design improvements, and robust fraud prevention
APA, Harvard, Vancouver, ISO, and other styles
7

Arnold, E., M. Simpson, S. Larsen, et al. Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1012428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Tavseef Mairaj, Olivia Riemer, Nadia El-Hage Scialabba, and Alexander Müller. The Agri-Food Systems Transformation Protocol: Mapping the Agents and Drivers of Transformation. TMG Research gGmbH, 2023. http://dx.doi.org/10.35435/1.2023.4.

Full text
Abstract:
There is a broad consensus that agri-food systems need to be transformed to address the mounting global challenges including food and nutrition security, environmental degradation, and socioeconomic inequities. However, agreement is lacking on what is needed to drive this transformation. This report builds on a sustainability analysis of different proposed pathways and approaches to address transformative needs. It also serves as a study of the drivers and agents that support the implementation of these proposed pathways in different cases around the globe. We recommend the adoption of a multi
APA, Harvard, Vancouver, ISO, and other styles
9

Brown, Jesse Daniel, Adrian Raudaschl, Prashant Kumar, Donald Johnson, and Tsukanov Vladislav Aleksandrovich. Anchoring Global Security: Autonomous Shipping with Mind Reading AI, GPT-core and MAMBA- core Agents, RAG-Fusion, AI Communities, Hive- AI, and the Human Psyche. ResearchHub Technologies, Inc., 2025. https://doi.org/10.55277/researchhub.nl5249y9.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brown, Jesse Daniel, Adrian Raudaschl, Prashant Kumar, Donald Johnson, and Tsukanov Vladislav Aleksandrovich. Anchoring Global Security: Autonomous Shipping with Mind Reading AI, GPT-core and MAMBA- core Agents, RAG-Fusion, AI Communities, Hive- AI, and the Human Psyche. ResearchHub Technologies, Inc., 2025. https://doi.org/10.55277/researchhub.nl5249y9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!