Academic literature on the topic 'Security agents'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security agents.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security agents"
Zrari, Chadha, Hela Hachicha, and Khaled Ghedira. "Agent's Security During Communication in Mobile Agents System." Procedia Computer Science 60 (2015): 17–26. http://dx.doi.org/10.1016/j.procs.2015.08.100.
Full textBagga, Pallavi, and Rahul Hans. "Mobile Agents System Security." ACM Computing Surveys 50, no. 5 (2017): 1–45. http://dx.doi.org/10.1145/3095797.
Full textGreenberg, M. S., L. C. Byington, and D. G. Harper. "Mobile agents and security." IEEE Communications Magazine 36, no. 7 (1998): 76–85. http://dx.doi.org/10.1109/35.689634.
Full textDadhich, Priyanka, Dr Kamlesh Dutta, and Dr M. C. Govil. "Security Issues in Mobile Agents." International Journal of Computer Applications 11, no. 4 (2010): 1–7. http://dx.doi.org/10.5120/1574-2104.
Full textBailey, Steve. "Intelligent agents: New security issues." Computers & Security 16, no. 6 (1997): 526. http://dx.doi.org/10.1016/s0167-4048(97)84700-1.
Full textRafael, Páez, Yolima Uribe Mery, and Torres Miguel. "INTERNAL SECURITY ON AN IDS BASED ON AGENTS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 129–42. https://doi.org/10.5281/zenodo.4632591.
Full textA. C., Okoye,, Ezeanya, H. C., and Chikezie, A. E. "Securing Election Processes: Interrogating the Role of Security Agents in Nigeria’s Elections." African Journal of Social Sciences and Humanities Research 8, no. 1 (2025): 61–74. https://doi.org/10.52589/ajsshr-cftnaono.
Full textOleksandr, Milov, Hrebeniuk Andrii, Nalyvaiko Andrii, et al. "Development of the space-time structure of the methodology for modeling the behavior of antagonistic agents of the security system." Eastern-European Journal of Enterprise Technologies 6, no. 2(108) (2020): 30–52. https://doi.org/10.15587/1729-4061.2020.218660.
Full textMohamed, A. H., and K. H. Marzouk. "Mobile Agents for Wireless Network Security." IOSR Journal of Computer Engineering 18, no. 04 (2016): 77–82. http://dx.doi.org/10.9790/0661-1804017782.
Full textHassan, Razouki, and Hair Abdellatif. "Self-Adaptive Security for Mobiles Agents." International Journal of Computer Applications 94, no. 13 (2014): 24–29. http://dx.doi.org/10.5120/16404-6102.
Full textDissertations / Theses on the topic "Security agents"
Abouzakhar, Nasser Salem. "Intelligent agents-based networks security." Thesis, University of Sheffield, 2005. http://etheses.whiterose.ac.uk/3575/.
Full textShibli, Awais. "Security Infrastructure and Applicationsfor Mobile Agents." Doctoral thesis, KTH, Data- och systemvetenskap, DSV, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-12764.
Full textTekbacak, Fatih Tuğlular Tuğkan. "Developing a security mechanism for software agents/." [s.l.]: [s.n.], 2006. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000526.pdf.
Full textCORDEIRO, JOANNA DE VASCONCELOS. "AGENTS OF TERROR AS AGENTS OF SECURITY: CONTESTING HISTORIES OF THE IRA." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2011. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=18315@1.
Full textFurst, Alexander J. "State Regulation of Private Police and Security Agents." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245626912.
Full textWEN, XUE. "THREE ESSAYS ON SOCIAL SECURITY WITH MYOPIC AGENTS." Doctoral thesis, Università Cattolica del Sacro Cuore, 2012. http://hdl.handle.net/10280/1469.
Full textWEN, XUE. "THREE ESSAYS ON SOCIAL SECURITY WITH MYOPIC AGENTS." Doctoral thesis, Università Cattolica del Sacro Cuore, 2012. http://hdl.handle.net/10280/1469.
Full textXu, Ke. "Mobile agent security through multi-agent cryptographic protocols." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4473/.
Full textAl-Jaljouli, Raja Computer Science & Engineering Faculty of Engineering UNSW. "A proposed security protocol for data gathering mobile agents." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/23999.
Full textSarracco, Fabiano. "Mobile agents security: algorithmic approaches for hostile hosts detection." Doctoral thesis, La Sapienza, 2006. http://hdl.handle.net/11573/917058.
Full textBooks on the topic "Security agents"
Vigna, Giovanni, ed. Mobile Agents and Security. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-68671-1.
Full textJansen, Wayne. Mobile agent security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textJansen, Wayne. Mobile agent security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textJansen, Wayne. Mobile agent security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textTom, Karygiannis, and National Institute of Standards and Technology (U.S.), eds. Mobile agent security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textKunreuther, Howard. Interdependent security: The case of identical agents. National Bureau of Economic Research, 2002.
Find full text-P, Tsai Jeffrey J., ed. Security modeling and analysis of mobile agent systems. Imperial College Press, 2006.
Find full textWallin, Arto. Secure auction for mobile agents. VTT Technical Research Centre of Finland, 2004.
Find full textCongress, United States. Homeland security: Information on training new Border Patrol agents. General Accountability Office, 2007.
Find full textBook chapters on the topic "Security agents"
Tschudin, Christian F. "Mobile Agent Security." In Intelligent Information Agents. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-60018-0_22.
Full textBella, Giampaolo. "Modelling Agents’ Knowledge Inductively." In Security Protocols. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10720107_12.
Full textBella, Giampaulo. "Modelling Agents’ Knowledge Inductively." In Security Protocols. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10720107_13.
Full textYoshioka, Nobukazu, Yasuyuki Tahara, Akihiko Ohsuga, and Shinichi Honiden. "Security for Mobile Agents." In Agent-Oriented Software Engineering. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44564-1_15.
Full textWagner, Gerd. "Multi-level security in multiagent systems." In Cooperative Information Agents. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62591-7_40.
Full textStojkovic, Vojislav, and Hongwei Huo. "Software Agents Action Securities." In Computational Intelligence and Security. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74377-4_74.
Full textFischmeister, Sebastian, Giovanni Vigna, and Richard A. Kemmerer. "Evaluating the Security of Three Java-Based Mobile Agent Systems." In Mobile Agents. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45647-3_3.
Full textFoltz, Kevin, and William R. Simpson. "Enterprise Security with Endpoint Agents." In Enterprise Information Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-40783-4_1.
Full textMeier, Arion, and Susanne Röhrig. "Security Levels for Contracting Agents." In IFIP Advances in Information and Communication Technology. Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35586-3_39.
Full textCorsava, Sophia, and Vladimir Getov. "Autonomous Agents-Based Security Infrastructure." In Computational Science and Its Applications — ICCSA 2003. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44843-8_40.
Full textConference papers on the topic "Security agents"
He, Yifeng, Ethan Wang, Yuyang Rong, Zifei Cheng, and Hao Chen. "Security of AI Agents." In 2025 IEEE/ACM International Workshop on Responsible AI Engineering (RAIE). IEEE, 2025. https://doi.org/10.1109/raie66699.2025.00013.
Full textJabbar, Haidar, Samir Al-Janabi, and Francis Syms. "Securing Autonomous Vehicles with Smart AI Security Agents." In 2025 International Conference on New Trends in Computing Sciences (ICTCS). IEEE, 2025. https://doi.org/10.1109/ictcs65341.2025.10989346.
Full textKhan, Danish, Xujuan Zhou, Jianming Yong, and Xiaohui Tao. "User Equipment Privacy and Security Issues in 5G Network." In 2024 IEEE International Conference on Agents (ICA). IEEE, 2024. https://doi.org/10.1109/ica63002.2024.00043.
Full textAouadi, H., and M. B. Ahmed. "Mobile agents security." In IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEEE, 2005. http://dx.doi.org/10.1109/mtas.2005.207201.
Full textAouadi, H., and M. B. Ahmed. "Mobile agents security." In IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEE, 2005. http://dx.doi.org/10.1049/cp:20051518.
Full textVaradharajan, Vijay. "Security enhanced mobile agents." In the 7th ACM conference. ACM Press, 2000. http://dx.doi.org/10.1145/352600.352632.
Full textGreenstadt, Rachel, Sadia Afroz, and Michael Brennan. "Mixed-initiative security agents." In the 2nd ACM workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1654988.1654999.
Full textOruc, Orcun. "Role-Based Embedded Domain-Specific Language for Collaborative Multi-Agent Systems through Blockchain Technology." In 9th International Conference of Security, Privacy and Trust Management (SPTM 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110501.
Full textDuncan, Ishbel MacDonald. "Intelligent Biological Security Testing Agents." In 2012 International Conference on Software Security and Reliability Companion. IEEE, 2012. http://dx.doi.org/10.1109/sere-c.2012.42.
Full textMohite, Vaishali, and Lata Ragha. "Cooperative Security Agents for MANET." In 2012 World Congress on Information and Communication Technologies (WICT). IEEE, 2012. http://dx.doi.org/10.1109/wict.2012.6409138.
Full textReports on the topic "Security agents"
Kunreuther, Howard, and Geoffrey Heal. Interdependent Security: The Case of Identical Agents. National Bureau of Economic Research, 2002. http://dx.doi.org/10.3386/w8871.
Full textVolz, B., and Y. Pal. Security of Messages Exchanged between Servers and Relay Agents. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8213.
Full textJiang, Ruoyi, Brian Quanz, Hongliang Fei, and Jun Huan. Rail Sensor Testbed Program: Active Agents in Containers for Transport Chain Security: Algorithms. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada539045.
Full textMinden, Gary J., Victor S. Frost, Joseph B. Evans, et al. Final Report-Rail Sensor Testbed Program: Active Agents in Containers for Transport Chain Security. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada539038.
Full textHerbert, Sian. Women’s Meaningful Participation in Water Security. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/k4d.2022.063.
Full textRahman, Habibur, and Wahid bin Ahsan. Fraud Mitigation, Usability Challenges, and Financial Literacy in Mobile Financial Services for Rural Bangladesh. Userhub, 2024. http://dx.doi.org/10.58947/journal.wpgr45.
Full textArnold, E., M. Simpson, S. Larsen, et al. Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1012428.
Full textShah, Tavseef Mairaj, Olivia Riemer, Nadia El-Hage Scialabba, and Alexander Müller. The Agri-Food Systems Transformation Protocol: Mapping the Agents and Drivers of Transformation. TMG Research gGmbH, 2023. http://dx.doi.org/10.35435/1.2023.4.
Full textBrown, Jesse Daniel, Adrian Raudaschl, Prashant Kumar, Donald Johnson, and Tsukanov Vladislav Aleksandrovich. Anchoring Global Security: Autonomous Shipping with Mind Reading AI, GPT-core and MAMBA- core Agents, RAG-Fusion, AI Communities, Hive- AI, and the Human Psyche. ResearchHub Technologies, Inc., 2025. https://doi.org/10.55277/researchhub.nl5249y9.1.
Full textBrown, Jesse Daniel, Adrian Raudaschl, Prashant Kumar, Donald Johnson, and Tsukanov Vladislav Aleksandrovich. Anchoring Global Security: Autonomous Shipping with Mind Reading AI, GPT-core and MAMBA- core Agents, RAG-Fusion, AI Communities, Hive- AI, and the Human Psyche. ResearchHub Technologies, Inc., 2025. https://doi.org/10.55277/researchhub.nl5249y9.
Full text