To see the other types of publications on this topic, follow the link: Security agents.

Journal articles on the topic 'Security agents'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security agents.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zrari, Chadha, Hela Hachicha, and Khaled Ghedira. "Agent's Security During Communication in Mobile Agents System." Procedia Computer Science 60 (2015): 17–26. http://dx.doi.org/10.1016/j.procs.2015.08.100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bagga, Pallavi, and Rahul Hans. "Mobile Agents System Security." ACM Computing Surveys 50, no. 5 (2017): 1–45. http://dx.doi.org/10.1145/3095797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Greenberg, M. S., L. C. Byington, and D. G. Harper. "Mobile agents and security." IEEE Communications Magazine 36, no. 7 (1998): 76–85. http://dx.doi.org/10.1109/35.689634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dadhich, Priyanka, Dr Kamlesh Dutta, and Dr M. C. Govil. "Security Issues in Mobile Agents." International Journal of Computer Applications 11, no. 4 (2010): 1–7. http://dx.doi.org/10.5120/1574-2104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bailey, Steve. "Intelligent agents: New security issues." Computers & Security 16, no. 6 (1997): 526. http://dx.doi.org/10.1016/s0167-4048(97)84700-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rafael, Páez, Yolima Uribe Mery, and Torres Miguel. "INTERNAL SECURITY ON AN IDS BASED ON AGENTS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 129–42. https://doi.org/10.5281/zenodo.4632591.

Full text
Abstract:
An Intrusion Detection System (IDS) can monitor different events that may occur in a determined network or host, and which affect any network security service (confidentiality, integrity, availability). Because of this, an IDS must be flexible and it must detect and trace each alert without affecting the system´s performance. On the other hand, agents ina Multi-Agent system have inherent security problems due to their mobility; that’s why we propose some techniques in order to provide internal security for the agents belonging to the system. The deployed IDS works with a multiagent
APA, Harvard, Vancouver, ISO, and other styles
7

A. C., Okoye,, Ezeanya, H. C., and Chikezie, A. E. "Securing Election Processes: Interrogating the Role of Security Agents in Nigeria’s Elections." African Journal of Social Sciences and Humanities Research 8, no. 1 (2025): 61–74. https://doi.org/10.52589/ajsshr-cftnaono.

Full text
Abstract:
Election is a democratic mechanism that measures and reflects the political will of the people. Ideally, the election ought to be a peaceful process of leadership recruitment and succession. However, given the nature of the Nigerian state and the character of its politics, elections in the country often result in violence. The violence takes different forms and is mostly targeted at stakeholders like members of the opposition, election officials, electoral materials, and public and private infrastructures. Worse still, the electoral violence compromises the integrity and credibility of the out
APA, Harvard, Vancouver, ISO, and other styles
8

Oleksandr, Milov, Hrebeniuk Andrii, Nalyvaiko Andrii, et al. "Development of the space-time structure of the methodology for modeling the behavior of antagonistic agents of the security system." Eastern-European Journal of Enterprise Technologies 6, no. 2(108) (2020): 30–52. https://doi.org/10.15587/1729-4061.2020.218660.

Full text
Abstract:
The rapid development of computer technology, the emergence of modern cyber threats with signs of hybridity and synergy put forward strict requirements for the economic component of national security and especially the processes of ensuring the economy cybersecurity. The cybersecurity industry is trying to meet today's requirements by introducing new and more advanced security technologies and methods, but it is believed that such a universal approach is not enough. The study is devoted to resolving the objective contradiction between the growing practical requirements for an appropriate l
APA, Harvard, Vancouver, ISO, and other styles
9

Mohamed, A. H., and K. H. Marzouk. "Mobile Agents for Wireless Network Security." IOSR Journal of Computer Engineering 18, no. 04 (2016): 77–82. http://dx.doi.org/10.9790/0661-1804017782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hassan, Razouki, and Hair Abdellatif. "Self-Adaptive Security for Mobiles Agents." International Journal of Computer Applications 94, no. 13 (2014): 24–29. http://dx.doi.org/10.5120/16404-6102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Media Abdul Razak Ali. "Proposed Security Protocol for Mobile Agents." International Journal of Information Processing and Management 3, no. 2 (2012): 106–12. http://dx.doi.org/10.4156/ijipm.vol3.issue2.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Comon-Lundh, Hubert, and Véronique Cortier. "Security properties: two agents are sufficient." Science of Computer Programming 50, no. 1-3 (2004): 51–71. http://dx.doi.org/10.1016/j.scico.2003.12.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Knoll, Gerald, Niranjan Suri, and Jeffrey M. Bradshaw. "Path-based Security for Mobile Agents." Electronic Notes in Theoretical Computer Science 63 (May 2002): 108–23. http://dx.doi.org/10.1016/s1571-0661(04)80340-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Romain-Glassey, Nathalie, Melody Gut, Adam-Scott Feiner, Federico Cathieni, Marie-Claude Hofner, and Patrice Mangin. "When nightclub security agents assault clients." Journal of Forensic and Legal Medicine 19, no. 6 (2012): 341–44. http://dx.doi.org/10.1016/j.jflm.2012.02.020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Conesa, Juan C., and Dirk Krueger. "Social Security Reform with Heterogeneous Agents." Review of Economic Dynamics 2, no. 4 (1999): 757–95. http://dx.doi.org/10.1006/redy.1998.0039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Allée, Guillaume, Samuel Pierre, Roch H. Glitho, and Abdelmorhit El Rhazi. "An Improved Itinerary Recording Protocol for Securing Distributed Architectures Based on Mobile Agents." Mobile Information Systems 1, no. 2 (2005): 129–47. http://dx.doi.org/10.1155/2005/346185.

Full text
Abstract:
This paper proposes an improved itinerary recording protocol for securing distributed architectures based on mobile agents. The behavior of each of the cooperating agents is described, as well as the decision process establishing the identities of offenders when an attack is detected. Our protocol is tested on a set of potential attacks and the results confirm our assumption regarding offender designations and moments of detection. More precisely, the performance evaluation shows that our protocol detects the attack where there is collaboration between a platform on the cooperating agents' iti
APA, Harvard, Vancouver, ISO, and other styles
17

Sengupta, Abhijeet. "Securing the Autonomous Future A Comprehensive Analysis of Security Challenges and Mitigation Strategies for AI Agents." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–2. https://doi.org/10.55041/ijsrem40091.

Full text
Abstract:
The proliferation of Artificial Intelligence (AI) agents, characterized by their autonomy and capacity for independent decision-making, presents both unprecedented opportunities and novel security challenges. This research paper provides a comprehensive analysis of the security landscape surrounding AI agents, examining the unique vulnerabilities stemming from their inherent characteristics and the emerging threat vectors targeting these autonomous systems. We delve into a categorized framework of potential attacks, ranging from data poisoning and adversarial manipulation to physical tampering
APA, Harvard, Vancouver, ISO, and other styles
18

Bucciol, Alessandro. "A NOTE ON SOCIAL SECURITY WELFARE WITH SELF-CONTROL PROBLEMS." Macroeconomic Dynamics 15, no. 4 (2011): 579–94. http://dx.doi.org/10.1017/s1365100510000209.

Full text
Abstract:
We develop an overlapping-generations model for a closed economy with uncertainty on labor income and mortality risk to show that unfunded social security programs may increase welfare in economies where agents are affected by self-control problems à la Gul and Pesendorfer (2001, Econometrica 69, 1403). We depart from the existing literature by setting the agent's preference parameters to match target levels of macro-variables observed in the real U.S. economy. In our approach, economies with tempted and nontempted agents are indistinguishable in terms of aggregate consumption, labor, and savi
APA, Harvard, Vancouver, ISO, and other styles
19

VIVCHAR, Oksana, Volodymyr GEVKO, and Lubov KVASNYI. "SECURITY OF ECONOMIC AGENTS UNDER CONDITIONS OF DIGITALIZATION: METHODOLOGICAL BASIS AND APPLIED CONTEXTS." Herald of Khmelnytskyi National University. Economic sciences 308, no. 4 (2022): 247–51. http://dx.doi.org/10.31891/2307-5740-2022-308-4-38.

Full text
Abstract:
The article examines the conceptual and categorical apparatus of «digitalization» and the algorithm of digitalization process of economic agents in the context of security conditions. A practical toolkit of methods and algorithms (SADT, IDEF, UML, BPMN) that ensure the automation of work flow management using web technologies has been substantiated. As a result of scientific research, the main vectors of ensuring the safety of economic agents in the modern conditions of the digitalization of economic processes have been identified. On the basis of which, the key forms of implementation of digi
APA, Harvard, Vancouver, ISO, and other styles
20

Peigné, Pierre, Mikolaj Kniejski, Filip Sondej, et al. "Multi-Agent Security Tax: Trading Off Security and Collaboration Capabilities in Multi-Agent Systems." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 26 (2025): 27573–81. https://doi.org/10.1609/aaai.v39i26.34970.

Full text
Abstract:
As AI agents are increasingly adopted to collaborate on complex objectives, ensuring the security of autonomous multi-agent systems becomes crucial. We develop simulations of agents collaborating on shared objectives to study these security risks and security trade-offs. We focus on scenarios where an attacker compromises one agent, using it to steer the entire system toward misaligned outcomes by corrupting other agents. In this context, we observe infectious malicious prompts - the multi-hop spreading of malicious instructions. To mitigate this risk, we evaluated several strategies: two "vac
APA, Harvard, Vancouver, ISO, and other styles
21

Lin, Raz, Sarit Kraus, Noa Agmon, Samuel Barrett, and Peter Stone. "Comparing Agents' Success against People in Security Domains." Proceedings of the AAAI Conference on Artificial Intelligence 25, no. 1 (2011): 809–14. http://dx.doi.org/10.1609/aaai.v25i1.7940.

Full text
Abstract:
The interaction of people with autonomous agents has become increasingly prevalent. Some of these settings include security domains, where people can be characterized as uncooperative, hostile, manipulative, and tending to take advantage of the situation for their own needs. This makes it challenging to design proficient agents to interact with people in such environments. Evaluating the success of the agents automatically before evaluating them with people or deploying them could alleviate this challenge and result in better designed agents. In this paper we show how Peer Designed Agents (PDA
APA, Harvard, Vancouver, ISO, and other styles
22

Raji, F., and B. Tork Ladani. "Anonymity and security for autonomous mobile agents." IET Information Security 4, no. 4 (2010): 397. http://dx.doi.org/10.1049/iet-ifs.2009.0217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Abouzakhar, Nasser S., and Gordon A. Manson. "Networks security measures using neuro‐fuzzy agents." Information Management & Computer Security 11, no. 1 (2003): 33–38. http://dx.doi.org/10.1108/09685220310463713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Stone, R. "SELECT AGENTS: Heightened Security or Neocolonial Science?" Science 306, no. 5705 (2004): 2177–78. http://dx.doi.org/10.1126/science.306.5705.2177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Corradi, Antonio, Rebecca Montanari, and Cesare Stefanelli. "Security of mobile agents on the Internet." Internet Research 11, no. 1 (2001): 84–95. http://dx.doi.org/10.1108/10662240110365751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Kun, Xin Li, Baoxun Xu, Jiaqi Yan, and Huaiqing Wang. "Intelligent agents for adaptive security market surveillance." Enterprise Information Systems 11, no. 5 (2015): 652–71. http://dx.doi.org/10.1080/17517575.2015.1075593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Shakshuki, Elhadi, Zhonghai Luo, and Jing Gong. "A security system implementation using software agents." International Journal of High Performance Computing and Networking 3, no. 5/6 (2005): 366. http://dx.doi.org/10.1504/ijhpcn.2005.009424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Yampolskiy, Roman V. "Utility function security in artificially intelligent agents." Journal of Experimental & Theoretical Artificial Intelligence 26, no. 3 (2014): 373–89. http://dx.doi.org/10.1080/0952813x.2014.895114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Chu, Hsun, and Chu-chuan Cheng. "Optimal social security tax with myopic agents." Economic Modelling 80 (August 2019): 320–27. http://dx.doi.org/10.1016/j.econmod.2018.11.017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lim, CJ. "Agents for Urban Food Education and Security." Architectural Design 85, no. 3 (2015): 92–99. http://dx.doi.org/10.1002/ad.1906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Adeola, R.G., O. O. Adebayo, and J.O. Akintonde. "ASSESSMENT OF THE KNOWLEDGE LEVEL OF FOOD SECURITY AMONG EXTENSION AGENTS IN OYO STATE AGRICULTURAL DEVELOPMENT PROGRAMME." Continental J. Agricultural Science 5, no. 3 (2011): 15–20. https://doi.org/10.5281/zenodo.840057.

Full text
Abstract:
The study was carried out to identify and describe extension agents’ knowledge levels of food security in order to ascertain their education and training needs within the extension system. Simple random sampling technique was adopted in selecting 50% of all the extension agents across the four agricultural zones in the state. A total of 85 extension agents were proposed for the study but 82 extension agent were eventually considered due to number questionnaires retrieved from them. Majority (63.4%) of extension agents sampled were in the active age of 31 – 40 years with a mean age of 43 years.
APA, Harvard, Vancouver, ISO, and other styles
32

John, Biar Atem, Ruth Joyce Kaguta Dr., and Anthony Ngunyi Dr. "Financial Capacity of South Sudan Security Agents in Controlling Banditry along Nimule-Juba Highway." International Journal of Management Sciences and Business Research 11, no. 9 (2022): 10–17. https://doi.org/10.5281/zenodo.7147890.

Full text
Abstract:
<em>The paper is extracted from a study that sought to examine the financial capacity of South Sudan security agents in controlling banditry along Nimule-Juba Highway. This study was informed by Resource-Based View theory. Both the quantitative and qualitative data was collected, analysed and then interpreted by the researcher and presented as research findings. The study found that a change in financial capacity of South Sudan security agents leads to significant change in control of banditry in South Sudan; the level of funding to the South Sudan Security agents was moderate and hence needs
APA, Harvard, Vancouver, ISO, and other styles
33

Aliti, Admirim, Edmond Jajaga, and Kozeta Sevrani. "A need for an integrative security model for semantic stream reasoning systems." International Journal of Business & Technology 6, no. 3 (2018): 1–4. http://dx.doi.org/10.33107/ijbte.2018.6.3.01.

Full text
Abstract:
State-of-the-art security frameworks have been extensively addressing security issues for web resources, agents and services in the Semantic Web. The provision of Stream Reasoning as a new area spanning Semantic Web and Data Stream Management Systems has eventually opened up new challenges. Namely, their decentralized nature, the metadata descriptions, the number of users, agents, and services, make securing Stream Reasoning systems difficult to handle. Thus, there is an inherent need of developing new security models which will handle security and automate security mechanisms to a more autono
APA, Harvard, Vancouver, ISO, and other styles
34

Bouchemal, Nardjes, Ramdane Maamri, and Mohammed Chihoub. "Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance." International Journal of Ambient Computing and Intelligence 5, no. 3 (2013): 44–60. http://dx.doi.org/10.4018/ijaci.2013070104.

Full text
Abstract:
Ubiquitous computing and ambient intelligence (or AmI) models raise the need for secured systems, due to increased heterogeneity, intelligence and dynamism. Information in such environments is managed by systems formed mostly of devices with limited capabilities. Indeed, AmI characteristics, difficult to handle by traditional computing concepts, are making the agent paradigm to gain impetus and increasing the interest of researchers and industry in this concept. However, the inherent complexity of information security is bigger in agent-based AmI systems built by gathering distributed informat
APA, Harvard, Vancouver, ISO, and other styles
35

Ezumalai, R., G. Aghila, and R. Rajalakshmi. "Design and Architecture for Efficient Load Balancing with Security Using Mobile Agents." International Journal of Engineering and Technology 2, no. 1 (2010): 57–60. http://dx.doi.org/10.7763/ijet.2010.v2.100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Ojesanmi, O. A. "Security Issues in Mobile Agent Applications." International Journal of Agent Technologies and Systems 2, no. 4 (2010): 39–55. http://dx.doi.org/10.4018/jats.2010100104.

Full text
Abstract:
An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly dynamic movement of code and data enable a program to take advantage of the locality of data. It also allows one to optimize between the requirements of low bandwidth, high latency and disconnected network connections. This computing paradigm, which exploits code, data and state mobility, raises many
APA, Harvard, Vancouver, ISO, and other styles
37

Yadav, Neera, Dharamveer Singh, and Anil Kumar. "Communication Network with Secure, Reputable Mobile Agent Structure." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 3213–23. http://dx.doi.org/10.22214/ijraset.2023.50533.

Full text
Abstract:
Abstract: The proposed multiphase security model for mobile agents appears to address a critical issue in their mainstream deployment. The use of symmetric key cryptography is a sensible choice for securing mobile agent code and data, as it is more efficient than asymmetric key cryptography. The focus on defending against a meet-in-the-middle attack is also appropriate, as this is a common type of attack that mobile agents are vulnerable to. However, it would be helpful to provide more details about the specific authenticated encryption mechanism that will be used. This will help to evaluate t
APA, Harvard, Vancouver, ISO, and other styles
38

Hassan, Razouki, and Hair Abdellatif. "Security for Mobile Agents: Trust Estimate for Platforms." TELKOMNIKA Indonesian Journal of Electrical Engineering 15, no. 2 (2015): 381. http://dx.doi.org/10.11591/tijee.v15i2.1553.

Full text
Abstract:
The mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent makes it to travel often in open network. In this scenario, it is obvious that the mobile agents are vulnerable to various security threats. Protecting free-roaming mobile agents from malicious host and from other mobile agents has drawn much attention in recent years. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present
APA, Harvard, Vancouver, ISO, and other styles
39

HUNG, PATRICK C. K., KAMALAKAR KARLAPALEM, and JAMES GRAY. "LEAST PRIVILEGE SECURITY IN CAPBASED-AMS." International Journal of Cooperative Information Systems 08, no. 02n03 (1999): 139–68. http://dx.doi.org/10.1142/s0218843099000083.

Full text
Abstract:
Workflow systems are becoming very popular and are being used to support many of the day to day activities in large organizations. One of the major problems with workflow systems is that they often use heterogeneous and distributed hardware and software systems to execute a given activity. This gives rise to decentralized security policies and mechanisms, which, in order to enable activity execution, give too many privileges (for accessing resources like documents) to the agents (humans or systems) for executing the work. We develop the concept of least priviledge, wherein the set of agents ar
APA, Harvard, Vancouver, ISO, and other styles
40

Kumar, Pradeep, Niraj Singhal, Dhiraj Pandey, and Avimanyou Vatsa. "Secure Mobile Agent Migration Using Lagrange Interpolation and Fast Fourier Transformation." International Journal of Computer Network and Information Security 15, no. 4 (2023): 72–83. http://dx.doi.org/10.5815/ijcnis.2023.04.07.

Full text
Abstract:
Mobile agent is a processing unit works on the behalf of host computer. Mobile agent with intelligence provides a new computing prototype that is totally different from conventional prototype. Mobile agents are automatically itinerating from one host Computer to another host computer and execute assigned task on the behalf of user in heterogeneous environment under own control. Because mobile agents roam around distributed networks automatically, the security of the agents and platforms is a major concern. The number of mobile agents-based software applications has increased dramatically over
APA, Harvard, Vancouver, ISO, and other styles
41

Osei, Jones Ebenenzer, Enock Kwame Tham-Agyekum, Benjamin Sarfo-Mensah, Peter Kombat, and Fred Ankuyi. "Perception of Agricultural Extension Agents Towards the Performance of Project-Based Extension Delivery on Food Security in Ghana." International Journal on Food, Agriculture and Natural Resources 4, no. 4 (2023): 103–12. http://dx.doi.org/10.46676/ij-fanres.v4i4.177.

Full text
Abstract:
Agricultural extension agents in Ghana's Upper East Region relied on project-based extension delivery services during the Covid-19 period. Using the perspectives of extension agents, this research looked at the effect of project-based extension delivery services on food security. A sample size of 144 agricultural extension agents from three distinct zones in the Region participated in this research, which used a descriptive correlation survey approach. Frequencies, percentages, means, standard deviation, correlation coefficients, and regression were used to analyse the data. In terms of effect
APA, Harvard, Vancouver, ISO, and other styles
42

Yoo, Jeong Do, Eunji Park, Gyungmin Lee, et al. "Cyber Attack and Defense Emulation Agents." Applied Sciences 10, no. 6 (2020): 2140. http://dx.doi.org/10.3390/app10062140.

Full text
Abstract:
As the scale of the system and network grows, IT infrastructure becomes more complex and hard to be managed. Many organizations have a serious problem to manage their system and network security. In addition, vulnerabilities of hardware and software are increasing in number rapidly. In such a complex IT environment, security administrators need more practical and automated threat assessment methods to reduce their manual tasks. Adversary emulation based automated assessment is one of the solutions to solve the aforementioned problems because it helps to discover the attack paths and vulnerabil
APA, Harvard, Vancouver, ISO, and other styles
43

Sabir, B. E., M. Youssi, O. Bouattane, and H. Allali. "Towards a New Model to Secure IoT-based Smart Home Mobile Agents using Blockchain Technology." Engineering, Technology & Applied Science Research 10, no. 2 (2020): 5441–47. https://doi.org/10.5281/zenodo.3748336.

Full text
Abstract:
The Internet of Things (IoT) is becoming an indispensable part of the actual Internet and continues to extend deeper into the daily lives of people, offering distributed and critical services. Mobile agents are widely used in the context of IoT and due to the possibility of transmitting their execution status from one device to another in an IoT network, they offer many advantages such as reducing network load, encapsulating protocols, exceeding network latency, etc. Also, Blockchain Technology is growing rapidly allowing for the addition of an approved security layer in many areas. Security i
APA, Harvard, Vancouver, ISO, and other styles
44

Berguig, Yousra, Jalal Laassiri, and Salaheddine Krit. "A survey on distributed mobile agents' system security." International Journal of Knowledge Engineering and Soft Data Paradigms 7, no. 1 (2020): 14. http://dx.doi.org/10.1504/ijkesdp.2020.112617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Berguig, Yousra, Jalal Laassiri, and Salaheddine Krit. "A survey on distributed mobile agents' system security." International Journal of Knowledge Engineering and Soft Data Paradigms 7, no. 1 (2020): 14. http://dx.doi.org/10.1504/ijkesdp.2020.10034776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Paez, Rafael, Mery Yolima Uribe, and Miguel Torres. "Internal Security on an IDS Based on Agents." International Journal of Network Security & Its Applications 5, no. 4 (2013): 129–42. http://dx.doi.org/10.5121/ijnsa.2013.5410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Abdullah Marich Ali, Abdullah Marich Ali. "Network Security Management Using Ontology-Based Mobile Agents." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (2012): 25–44. http://dx.doi.org/10.4197/comp.1-2.2.

Full text
Abstract:
Automatic means to manage the security in moderate and large networks are of extreme importance to avoid error-prone manual techniques. This paper paves the way to develop an automatic network security management (NSM) system that is both flexible in deciding the system’s objectives and efficient in using the valuable network bandwidth with a relatively low transmission overhead. The required flexibility and efficiency are obtained using mobile agents (MA) to collect the required security information from various network components and devices, and using ontology to specify the required securi
APA, Harvard, Vancouver, ISO, and other styles
48

Wegener Friis, Thomas, and Helmut Müller-Enbergs. "Women Agents in the East German State Security." Security science journal 2, no. 1 (2021): 61–84. http://dx.doi.org/10.37458/ssj.2.1.5.

Full text
Abstract:
In the communist camp during the Cold War, exercising power was a male domain. The Ministry of State Security (MfS) of the former German Democratic Republic (GDR) was no exception. Within the organization, women were employed but they rarely made a career. In the bottom of the State Security hierarchy were the agents. This article examines who were the women agents in the rank of the MfS. Based on statistical materials, it gives an overview of women’s role and the character of their covert work. Inspired by Andrea Petö’s introduction of the concept of controlling images to intelligence studies
APA, Harvard, Vancouver, ISO, and other styles
49

Kadali, Ravi Sastry. "AI SECURITY AGENTS: ADVANCED CYBERSECURITY THROUGH INTELLIGENT MONITORING." INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY 8, no. 1 (2025): 1353–66. https://doi.org/10.34218/ijrcait_08_01_100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Bates, John. "Commercial platforms for Security Sensitive Biological Agents testing." Microbiology Australia 41, no. 3 (2020): 143. http://dx.doi.org/10.1071/ma20038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!