510,945 Hits in 3.6 sec

Agent-Community-Network-Based Secure Collaboration Support System [chapter]

Tsunenori Mine, Kosaku Kimura, Satoshi Amamiya, Ken'ichi Takahashi, Makoto Amamiya
2009 Lecture Notes in Business Information Processing  
It furthermore supports secure peer-to-peer communication between users. It is implemented with multi-agent Kodama framework.  ...  Considering these problems, we have been developing an agent-communitynetwork-based business matching and collaboration support system.  ...  Acknowledgment This research was partly supported by the Strategic Information and Communications R&D Promotion Program under grant 052310008 from the MIC, Japan.  ... 
doi:10.1007/978-3-642-01668-4_13 fatcat:pnrtciy43nc4dehy4niavwlbtq

An Agent-Based Self-Protective Method to Secure Communication between UAVs in Unmanned Aerial Vehicle Networks

Reza Fotohi, Eslam Nazemi, Fereidoon Shams Aliee
2020 Vehicular Communications  
Furthermore, we propose an agent-based self-protective method (ASP-UAVN) for UAVNs that is based on the Human Immune System (HIS).  ...  Then, once the route reply packet (RREP) is received, a self-protective method using agents and the knowledge base is employed to choose the safest route and detect the attacking UAVs.  ...  The knowledge base includes the following stages to choose the most secure route (based on the information received from the agents) for transmission of data in the immune memory: Affinity: as defined  ... 
doi:10.1016/j.vehcom.2020.100267 fatcat:eci5fopmorgmnhldjmruj4u45e

Agent-Based Modelling to Assess Community Food Security and Sustainable Livelihoods

Samantha Dobbie, Kate Schreckenberg, James G Dyke, Marije Schaafsma, Stefano Balbi
2018 Journal of Artificial Societies and Social Simulation  
We present a methodological approach for constructing an agent-based model (ABM) to assess community food security and variation among livelihood trajectories, using rural Malawi as a case study.  ...  Taking a systems approach may help to enhance the sustainability of livelihoods, target e orts and promote community food security.  ...  This study provides a methodological approach for the development of an agent-based model to assess community food security.  ... 
doi:10.18564/jasss.3639 fatcat:cad5l7a6t5enxnuvoezo36i7xm


Lathies BhaskerT., Arul Jagan G.
2014 ICTACT Journal on Communication Technology  
In this paper we proposed SPY Agent based secure data aggregation scheme.  ...  Here one SPY Agent moves around the network and monitors the aggregator nodes i.e, the Cluster Heads for secure data collection.  ...  In future we have the plan to improve our SPY agent based secure data aggregation scheme by using some standard encryption and decryption methods.  ... 
doi:10.21917/ijct.2014.0146 fatcat:ua5jby7udzgjthcknlppws6kei

Agent-based modeling of malware dynamics in heterogeneous environments

Abhijit Bose, Kang G. Shin
2011 Security and Communication Networks  
The framework, called Agent-Based Malware Modeling (AMM), allows different applications, network structure, network coordination, and user mobility in either a geographic or a logical domain to study various  ...  Since closed-form solutions of malware propagation considering these aspects are difficult to obtain, we describe an open-source, flexible agent-based emulation framework that can be used by malware researchers  ...  Our goal is to publish AMM as an open-source software for the malware research and network security community.  ... 
doi:10.1002/sec.298 fatcat:2kxffi3kgngpzgy3unep4ze2te

Hierarchical agent-based secure and reliable multicast in wireless mesh networks

Yinan Li, Ing-Ray Chen
2013 Computer Communications  
We propose and analyze a hierarchical agent-based secure and reliable multicast (HASRM) algorithm for efficiently supporting secure and reliable mobile multicast in wireless mesh networks, with design  ...  We also show that a variant of HASRM is superior to a recently proposed multicast algorithm for secure group communication in wireless mesh networks.  ...  Conclusions and Future Work In this paper, we proposed a hierarchical agent-based secure and reliable multicast (HASRM) algorithm for efficiently supporting secure and reliable mobile multicast in wireless  ... 
doi:10.1016/j.comcom.2013.07.006 fatcat:loyp6u4kw5d25jedve42q5qaoq

Mobile Agent Security Based on Cryptographic Trace and SOS Agent Mechanisms

Sophia Alami-Kamouri, Laboratory of Mathematics, Computer Sciences and Applications-Information Security Faculty of Sciences, Mohammed V University in Rabat. Morocco, Nabil Moukafih, Ghizlane Orhanou, Said Elhajji
2020 Journal of Communications  
In this paper, we propose two security mechanisms to enhance mobile agent security.  ...  Although mobile agent technology is considered as a powerful tool, it has some security problems that need to be overcome.  ...  Alami-Kamouri proposed the new Mobile agent security model based on the cryptographic trace and the SOS agent mechanim. N.  ... 
doi:10.12720/jcm.15.3.221-230 fatcat:ds3nzcmkyjb6tawgbi5qk3t4dm

A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning

Nadiya El Kamel, Mohamed Eddabbah, Youssef Lmoumen, Raja Touahni
2020 Security and Communication Networks  
In this paper, we present an introduction of machine learning and honeypot systems, and based on these technologies, we design a smart agent for cyber-attack prevention and prediction.  ...  Therefore, the network information security cannot be ignored as a problem.  ...  Smart Agent for Cyber Security Attacks Prevention and a Prediction-Based Machine Learning and Honeypot System Companies have invested a great deal on time and money in manual networks reconfiguration,  ... 
doi:10.1155/2020/8865474 fatcat:daepvtw72zgmhifyxmd5f4px6q

Agent-Based Data Extraction in Bioinformatics

Shakir Ullah Shah, Abdul Hameed, Abdulwahab Ali Almazroi, Mohammed A. Alqarni, Thippa Reddy G
2022 Security and Communication Networks  
In the proposed solution, (i) an agent visits service provider containing biological data, say sequences requested by the client, (ii) agent fetches the required data, and on the server side it will manipulate  ...  On the other hand, our approach takes 46.82% less time than the other with respect to data that the agent carries.  ...  It is compliant with the FIPA Agent Communication Language (ACL) specification and with the FIPA Agent Communication Framework (ACF).  ... 
doi:10.1155/2022/4865209 fatcat:qvptnwu5onds5g6mdhnjycuhzu

Multi-Agent based Framework for Secure and Reliable Communication among Open Clouds

Amjad Mehmood, Houbing Song, Jaime Lloret
2014 Network Protocols and Algorithms  
In order to address the problem, a Secure Multi-Agent based framework for Communication among Open Clouds is proposed in this paper.  ...  In the framework, each cloud has a secure Mobile Agent which is responsible of the secure communication among clouds. Thus, authentication of Mobile Agents is performed by the Directory Agent.  ...  The figure 6 shows the overall architecture of the proposed solution, i.e. to develop secure and reliable communication using Multi-Agent based frame.  ... 
doi:10.5296/npa.v6i4.6028 fatcat:4hnoqhsglbaa5a5bb4exruadgm

MadCD: A Mobile Agent Based Distributed Clone Detection Method in Mobile WSNs

2014 International journal of computer networks and communications security  
In recent years, mobile agents have been suggested for effective data broadcasting in sensor networks and a number of researchists use mobile agents as a novel template for distributed purpose to dominate  ...  In this paper the Macdc method is proposed to encounter the replication attacks using mobile agent technology in mobile WSNs.  ...  The agents are some programming codes for finding trusted neighbors based on the HIP model and the HOP model, hence the secured routes are established.  ... 
doi:10.47277/ijcncs/2(7)2 fatcat:dr2kyy72mnd6dfyd4vwju272wi

BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

Dina Shehada, Chan Yeob Yeun, M. Jamal Zemerly, Mahmoud Al Qutayri, Yousof Al Hammadi, Ernesto Damiani, Jiankun Hu
2017 Security and Communication Networks  
In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP) for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation  ...  Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern.  ...  Acknowledgments The authors wish to acknowledge Information and Communication Technology Fund (ICT Fund) for the continued support for the educational development and research.  ... 
doi:10.1155/2017/3606424 fatcat:ferkfqwslndmrknweho3diowki

Secure Cloud Computing Based On Mobile Agents

Sanjivanee R
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
In this paper, we propose a new approach that provides confidentiality for the services request by the user by using mobile agents for communication between user and cloud layer; we provide security at  ...  According to various researches user verification is the most significant security concern and demanding issue in cloud-based environment.  ...  that have kept the goal of secure communication in cloud computing.  ... 
doi:10.17762/ijritcc2321-8169.1503182 fatcat:s2q4qd4gffhr5agqljpsla2u24

ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks

Iván García-Magariño, Raquel Lacuesta
2017 Security and Communication Networks  
The current work introduces a novel agent-based framework that simulates SDN isolation protocols by means of trust and reputation models.  ...  Software-defined networks (SDNs) have become a mechanism to separate the control plane and the data plane in the communication in networks.  ...  In order to protect a network, one should secure data, controllers and devices, and communications.  ... 
doi:10.1155/2017/8575842 fatcat:hhs25diu65h5fdasfmgrc6n2li

A Temporal Logic Based Approach to Multi-Agent Intrusion Detection and Prevention

Paritosh Das, Rajdeep Niyogi
2011 International Journal of Communication Networks and Security  
This work introduces a new architecture for intrusion detection and prevention based on multiple autonomous agents working collectively.  ...  We also incorporate logics of knowledge into the agents. We implement a prototype tool, called MIDTL and use this tool to detect a variety of security attacks in large log-files provided by DARPA.  ...  International Journal of Communication Network & Security, Volume-1, Issue-1, 2011  ... 
doi:10.47893/ijcns.2011.1009 fatcat:qidg2mhfu5bm5id54rwlrjhiru
« Previous Showing results 1 — 15 out of 510,945 results