Journal articles on the topic 'Security agents'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security agents.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zrari, Chadha, Hela Hachicha, and Khaled Ghedira. "Agent's Security During Communication in Mobile Agents System." Procedia Computer Science 60 (2015): 17–26. http://dx.doi.org/10.1016/j.procs.2015.08.100.
Full textBagga, Pallavi, and Rahul Hans. "Mobile Agents System Security." ACM Computing Surveys 50, no. 5 (2017): 1–45. http://dx.doi.org/10.1145/3095797.
Full textGreenberg, M. S., L. C. Byington, and D. G. Harper. "Mobile agents and security." IEEE Communications Magazine 36, no. 7 (1998): 76–85. http://dx.doi.org/10.1109/35.689634.
Full textDadhich, Priyanka, Dr Kamlesh Dutta, and Dr M. C. Govil. "Security Issues in Mobile Agents." International Journal of Computer Applications 11, no. 4 (2010): 1–7. http://dx.doi.org/10.5120/1574-2104.
Full textBailey, Steve. "Intelligent agents: New security issues." Computers & Security 16, no. 6 (1997): 526. http://dx.doi.org/10.1016/s0167-4048(97)84700-1.
Full textRafael, Páez, Yolima Uribe Mery, and Torres Miguel. "INTERNAL SECURITY ON AN IDS BASED ON AGENTS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 129–42. https://doi.org/10.5281/zenodo.4632591.
Full textA. C., Okoye,, Ezeanya, H. C., and Chikezie, A. E. "Securing Election Processes: Interrogating the Role of Security Agents in Nigeria’s Elections." African Journal of Social Sciences and Humanities Research 8, no. 1 (2025): 61–74. https://doi.org/10.52589/ajsshr-cftnaono.
Full textOleksandr, Milov, Hrebeniuk Andrii, Nalyvaiko Andrii, et al. "Development of the space-time structure of the methodology for modeling the behavior of antagonistic agents of the security system." Eastern-European Journal of Enterprise Technologies 6, no. 2(108) (2020): 30–52. https://doi.org/10.15587/1729-4061.2020.218660.
Full textMohamed, A. H., and K. H. Marzouk. "Mobile Agents for Wireless Network Security." IOSR Journal of Computer Engineering 18, no. 04 (2016): 77–82. http://dx.doi.org/10.9790/0661-1804017782.
Full textHassan, Razouki, and Hair Abdellatif. "Self-Adaptive Security for Mobiles Agents." International Journal of Computer Applications 94, no. 13 (2014): 24–29. http://dx.doi.org/10.5120/16404-6102.
Full textMedia Abdul Razak Ali. "Proposed Security Protocol for Mobile Agents." International Journal of Information Processing and Management 3, no. 2 (2012): 106–12. http://dx.doi.org/10.4156/ijipm.vol3.issue2.12.
Full textComon-Lundh, Hubert, and Véronique Cortier. "Security properties: two agents are sufficient." Science of Computer Programming 50, no. 1-3 (2004): 51–71. http://dx.doi.org/10.1016/j.scico.2003.12.002.
Full textKnoll, Gerald, Niranjan Suri, and Jeffrey M. Bradshaw. "Path-based Security for Mobile Agents." Electronic Notes in Theoretical Computer Science 63 (May 2002): 108–23. http://dx.doi.org/10.1016/s1571-0661(04)80340-2.
Full textRomain-Glassey, Nathalie, Melody Gut, Adam-Scott Feiner, Federico Cathieni, Marie-Claude Hofner, and Patrice Mangin. "When nightclub security agents assault clients." Journal of Forensic and Legal Medicine 19, no. 6 (2012): 341–44. http://dx.doi.org/10.1016/j.jflm.2012.02.020.
Full textConesa, Juan C., and Dirk Krueger. "Social Security Reform with Heterogeneous Agents." Review of Economic Dynamics 2, no. 4 (1999): 757–95. http://dx.doi.org/10.1006/redy.1998.0039.
Full textAllée, Guillaume, Samuel Pierre, Roch H. Glitho, and Abdelmorhit El Rhazi. "An Improved Itinerary Recording Protocol for Securing Distributed Architectures Based on Mobile Agents." Mobile Information Systems 1, no. 2 (2005): 129–47. http://dx.doi.org/10.1155/2005/346185.
Full textSengupta, Abhijeet. "Securing the Autonomous Future A Comprehensive Analysis of Security Challenges and Mitigation Strategies for AI Agents." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–2. https://doi.org/10.55041/ijsrem40091.
Full textBucciol, Alessandro. "A NOTE ON SOCIAL SECURITY WELFARE WITH SELF-CONTROL PROBLEMS." Macroeconomic Dynamics 15, no. 4 (2011): 579–94. http://dx.doi.org/10.1017/s1365100510000209.
Full textVIVCHAR, Oksana, Volodymyr GEVKO, and Lubov KVASNYI. "SECURITY OF ECONOMIC AGENTS UNDER CONDITIONS OF DIGITALIZATION: METHODOLOGICAL BASIS AND APPLIED CONTEXTS." Herald of Khmelnytskyi National University. Economic sciences 308, no. 4 (2022): 247–51. http://dx.doi.org/10.31891/2307-5740-2022-308-4-38.
Full textPeigné, Pierre, Mikolaj Kniejski, Filip Sondej, et al. "Multi-Agent Security Tax: Trading Off Security and Collaboration Capabilities in Multi-Agent Systems." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 26 (2025): 27573–81. https://doi.org/10.1609/aaai.v39i26.34970.
Full textLin, Raz, Sarit Kraus, Noa Agmon, Samuel Barrett, and Peter Stone. "Comparing Agents' Success against People in Security Domains." Proceedings of the AAAI Conference on Artificial Intelligence 25, no. 1 (2011): 809–14. http://dx.doi.org/10.1609/aaai.v25i1.7940.
Full textRaji, F., and B. Tork Ladani. "Anonymity and security for autonomous mobile agents." IET Information Security 4, no. 4 (2010): 397. http://dx.doi.org/10.1049/iet-ifs.2009.0217.
Full textAbouzakhar, Nasser S., and Gordon A. Manson. "Networks security measures using neuro‐fuzzy agents." Information Management & Computer Security 11, no. 1 (2003): 33–38. http://dx.doi.org/10.1108/09685220310463713.
Full textStone, R. "SELECT AGENTS: Heightened Security or Neocolonial Science?" Science 306, no. 5705 (2004): 2177–78. http://dx.doi.org/10.1126/science.306.5705.2177.
Full textCorradi, Antonio, Rebecca Montanari, and Cesare Stefanelli. "Security of mobile agents on the Internet." Internet Research 11, no. 1 (2001): 84–95. http://dx.doi.org/10.1108/10662240110365751.
Full textChen, Kun, Xin Li, Baoxun Xu, Jiaqi Yan, and Huaiqing Wang. "Intelligent agents for adaptive security market surveillance." Enterprise Information Systems 11, no. 5 (2015): 652–71. http://dx.doi.org/10.1080/17517575.2015.1075593.
Full textShakshuki, Elhadi, Zhonghai Luo, and Jing Gong. "A security system implementation using software agents." International Journal of High Performance Computing and Networking 3, no. 5/6 (2005): 366. http://dx.doi.org/10.1504/ijhpcn.2005.009424.
Full textYampolskiy, Roman V. "Utility function security in artificially intelligent agents." Journal of Experimental & Theoretical Artificial Intelligence 26, no. 3 (2014): 373–89. http://dx.doi.org/10.1080/0952813x.2014.895114.
Full textChu, Hsun, and Chu-chuan Cheng. "Optimal social security tax with myopic agents." Economic Modelling 80 (August 2019): 320–27. http://dx.doi.org/10.1016/j.econmod.2018.11.017.
Full textLim, CJ. "Agents for Urban Food Education and Security." Architectural Design 85, no. 3 (2015): 92–99. http://dx.doi.org/10.1002/ad.1906.
Full textAdeola, R.G., O. O. Adebayo, and J.O. Akintonde. "ASSESSMENT OF THE KNOWLEDGE LEVEL OF FOOD SECURITY AMONG EXTENSION AGENTS IN OYO STATE AGRICULTURAL DEVELOPMENT PROGRAMME." Continental J. Agricultural Science 5, no. 3 (2011): 15–20. https://doi.org/10.5281/zenodo.840057.
Full textJohn, Biar Atem, Ruth Joyce Kaguta Dr., and Anthony Ngunyi Dr. "Financial Capacity of South Sudan Security Agents in Controlling Banditry along Nimule-Juba Highway." International Journal of Management Sciences and Business Research 11, no. 9 (2022): 10–17. https://doi.org/10.5281/zenodo.7147890.
Full textAliti, Admirim, Edmond Jajaga, and Kozeta Sevrani. "A need for an integrative security model for semantic stream reasoning systems." International Journal of Business & Technology 6, no. 3 (2018): 1–4. http://dx.doi.org/10.33107/ijbte.2018.6.3.01.
Full textBouchemal, Nardjes, Ramdane Maamri, and Mohammed Chihoub. "Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance." International Journal of Ambient Computing and Intelligence 5, no. 3 (2013): 44–60. http://dx.doi.org/10.4018/ijaci.2013070104.
Full textEzumalai, R., G. Aghila, and R. Rajalakshmi. "Design and Architecture for Efficient Load Balancing with Security Using Mobile Agents." International Journal of Engineering and Technology 2, no. 1 (2010): 57–60. http://dx.doi.org/10.7763/ijet.2010.v2.100.
Full textOjesanmi, O. A. "Security Issues in Mobile Agent Applications." International Journal of Agent Technologies and Systems 2, no. 4 (2010): 39–55. http://dx.doi.org/10.4018/jats.2010100104.
Full textYadav, Neera, Dharamveer Singh, and Anil Kumar. "Communication Network with Secure, Reputable Mobile Agent Structure." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 3213–23. http://dx.doi.org/10.22214/ijraset.2023.50533.
Full textHassan, Razouki, and Hair Abdellatif. "Security for Mobile Agents: Trust Estimate for Platforms." TELKOMNIKA Indonesian Journal of Electrical Engineering 15, no. 2 (2015): 381. http://dx.doi.org/10.11591/tijee.v15i2.1553.
Full textHUNG, PATRICK C. K., KAMALAKAR KARLAPALEM, and JAMES GRAY. "LEAST PRIVILEGE SECURITY IN CAPBASED-AMS." International Journal of Cooperative Information Systems 08, no. 02n03 (1999): 139–68. http://dx.doi.org/10.1142/s0218843099000083.
Full textKumar, Pradeep, Niraj Singhal, Dhiraj Pandey, and Avimanyou Vatsa. "Secure Mobile Agent Migration Using Lagrange Interpolation and Fast Fourier Transformation." International Journal of Computer Network and Information Security 15, no. 4 (2023): 72–83. http://dx.doi.org/10.5815/ijcnis.2023.04.07.
Full textOsei, Jones Ebenenzer, Enock Kwame Tham-Agyekum, Benjamin Sarfo-Mensah, Peter Kombat, and Fred Ankuyi. "Perception of Agricultural Extension Agents Towards the Performance of Project-Based Extension Delivery on Food Security in Ghana." International Journal on Food, Agriculture and Natural Resources 4, no. 4 (2023): 103–12. http://dx.doi.org/10.46676/ij-fanres.v4i4.177.
Full textYoo, Jeong Do, Eunji Park, Gyungmin Lee, et al. "Cyber Attack and Defense Emulation Agents." Applied Sciences 10, no. 6 (2020): 2140. http://dx.doi.org/10.3390/app10062140.
Full textSabir, B. E., M. Youssi, O. Bouattane, and H. Allali. "Towards a New Model to Secure IoT-based Smart Home Mobile Agents using Blockchain Technology." Engineering, Technology & Applied Science Research 10, no. 2 (2020): 5441–47. https://doi.org/10.5281/zenodo.3748336.
Full textBerguig, Yousra, Jalal Laassiri, and Salaheddine Krit. "A survey on distributed mobile agents' system security." International Journal of Knowledge Engineering and Soft Data Paradigms 7, no. 1 (2020): 14. http://dx.doi.org/10.1504/ijkesdp.2020.112617.
Full textBerguig, Yousra, Jalal Laassiri, and Salaheddine Krit. "A survey on distributed mobile agents' system security." International Journal of Knowledge Engineering and Soft Data Paradigms 7, no. 1 (2020): 14. http://dx.doi.org/10.1504/ijkesdp.2020.10034776.
Full textPaez, Rafael, Mery Yolima Uribe, and Miguel Torres. "Internal Security on an IDS Based on Agents." International Journal of Network Security & Its Applications 5, no. 4 (2013): 129–42. http://dx.doi.org/10.5121/ijnsa.2013.5410.
Full textAbdullah Marich Ali, Abdullah Marich Ali. "Network Security Management Using Ontology-Based Mobile Agents." journal of king abdulaziz university computing and information technology sciences 1, no. 2 (2012): 25–44. http://dx.doi.org/10.4197/comp.1-2.2.
Full textWegener Friis, Thomas, and Helmut Müller-Enbergs. "Women Agents in the East German State Security." Security science journal 2, no. 1 (2021): 61–84. http://dx.doi.org/10.37458/ssj.2.1.5.
Full textKadali, Ravi Sastry. "AI SECURITY AGENTS: ADVANCED CYBERSECURITY THROUGH INTELLIGENT MONITORING." INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY 8, no. 1 (2025): 1353–66. https://doi.org/10.34218/ijrcait_08_01_100.
Full textBates, John. "Commercial platforms for Security Sensitive Biological Agents testing." Microbiology Australia 41, no. 3 (2020): 143. http://dx.doi.org/10.1071/ma20038.
Full text