Filters








11,110 Hits in 8.1 sec

SESSION – PACKET INSPECTOR MOBILE AGENT TO PREVENT ENCRYPTED COOKIES AND HTTP POST HIJACKING IN MANET

ARUN V., SHUNMUGANATHAN K. L.
2016 Journal of Engineering Science and Technology  
Capturing encrypted cookies by the man-in-the-middle can access the secure site and allows the intruder to be an authorized person.  ...  Mobile agent is a piece of code that migrates and performs actions in the host and is used to prevent intrusion.  ...  The TCM is an effective model to prevent the malicious mobile agent to penetrate into the hosts3.  ... 
doaj:8d0f8da9bd494a33b77db99b21cf7aa7 fatcat:wyzavik74zgbjp4msdqlcjksmu

Stochastic Strategies for Robotic Surveillance as Stackelberg Games [article]

Xiaoming Duan, Dario Paccagnan, Francesco Bullo
2020 arXiv   pre-print
The goal for the mobile robot is to design a stochastic strategy so as to maximize the probability of capturing the intruder.  ...  The intruder is assumed to be omniscient: it knows the current location of the mobile agent and can learn the surveillance strategy.  ...  goal of capturing potential intruders; see Fig. 1 for an illustration.  ... 
arXiv:2011.07604v1 fatcat:wgh4tcrvdnfszbkgmldyky5iee

Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework

R. Sasikumar, D. Manjula
2012 International Journal of Computer Applications  
The mobile agents are used to collect and analyze the data collected from wireless network to identify attacks exploited by the intruders.  ...  To address the security issues in the wireless environment an Intrusion Detection System (IDS) is proposed based on the features of the mobile agent.  ...  This file is given as an input to the misuse detection agent. Misuse Detection Agent The misuse detection agent is used to analyze the data captured by the collector agent.  ... 
doi:10.5120/7848-1084 fatcat:vmrqhw6drvfytgnolqjzdxvd2y

Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings

Nicola Basilico, Nicola Gatti, Thomas Rossi, Sofia Ceppi, Francesco Amigoni
2009 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology  
Patrolling environments by means of autonomous mobile robots has received an increasing attention in the last few years.  ...  The interest of the agent community is mainly in the development of effective patrolling strategies. Approaches based on game theory have been demonstrated to be very effective.  ...  We denote by X 0 and Y 0 the payoffs to the patroller and to the intruder, respectively, when the outcome is intruder-capture.  ... 
doi:10.1109/wi-iat.2009.211 dblp:conf/iat/BasilicoGRCA09 fatcat:uztug24cf5a2folscmrunhwfpm

A Game-Theoretic Approach to Determining Efficient Patrolling Strategies for Mobile Robots

Francesco Amigoni, Nicola Gatti, Antonio Ippedico
2008 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology  
The patrolling agent is considered playing a game against an hostile possible intruder.  ...  We consider, differently from most recent approaches presented in literature, patrolling as an extended-form game that can be solved, in an approximated way, by reduction to a sequence of repeated strategic-form  ...  The patrolling agent is considered playing a game against an hostile adversary (e.g., a possible intruder).  ... 
doi:10.1109/wiiat.2008.324 dblp:conf/iat/AmigoniGI08 fatcat:jzmh3b3xsvdgtgacnrf7c7iczm

Layered mode selection logic control for border security

T. Born, G. Ferrer, A. M. Wright, A. B. Wright, Edward M. Carapezza
2007 Unattended Ground, Sea, and Air Sensor Technologies and Applications IX  
The pattern of motion in the team of robots can be identified, either algorithmically by a computer or by a human monitor of a display.  ...  When a robot detects an intruder, it will move away such that it attempts to maintain a constant distance from the intruder and move away from the border (i.e. into its home territory).  ...  Implementing a flexible sensor array with a team of mobile robots requires a controller architecture which is capable of handling an unstructured environment, cooperating among multiple agents, and interacting  ... 
doi:10.1117/12.718713 fatcat:zruimdbayvdvlb2klx67rzunym

Study on Multi-Robot Cooperation Stalking Using Finite State Machine

Hu Yulan, Zhang Qisong, Xue Pengfei
2012 Procedia Engineering  
This paper researches on cooperation capture for mobile multi-robots. We use finite state machine principle to do research on cooperation capture for mobile multi-robots.  ...  So multi-robot system has gradually become an important branch of robotics research .In the numerous multi-robot system research direction, multi-robot operation stalking question has been the focus of  ...  By recording the location of reference Follower robot predicts the intruder movement.  ... 
doi:10.1016/j.proeng.2012.01.520 fatcat:dzkwpzt5gvcrhp7bo2odgjezgy

Mobile Agent based System for Listing Fundamental Wi-Fi Peer-to-Peer Network Details

Kevin OtienoGogo, Elisha Toyne Opiyo
2015 International Journal of Computer Applications  
They had the capacity to classify every computer on the network as either intruder or non intruder based on the list of authorized computers supplied by the user.  ...  In developing this mobile agent, we used the MaSE agent methodology. The mobile agent was coded, implemented and tested.  ...  Most mobile agents are heterogeneous so that they can travel around a heterogeneous network; hence they have all the characteristics of an agent.  ... 
doi:10.5120/19977-1907 fatcat:fm5kwi23yjgnhmboymnsuuq5aq

Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users over Mobile Collaborative Learning (MCL) [article]

Abdul Razaque, Khaled Elleithy
2012 arXiv   pre-print
The contribution specially provides privacy to users and enhances the security aspects of mobile supported collaborative framework (MSCF) explained in [24].The paper introduces multi-frame signature-cum  ...  The major target of contribution is to detect the malicious attacks and blocks the illegal activities of rogue DHCP server.  ...  The classification of typical IDS is discussed in [17] . The focus of the contribution is about reviewing the agent-based IDS for mobile devices.  ... 
arXiv:1210.2030v1 fatcat:65tc6oast5e5lb4gtgifceairq

Research on Multi-Robot Cooperation Capture Based on Virtual Reality Technology

Hu Yulan, Zhang Qisong, Qin Lijuan, Xue Pengfei
2012 Procedia Engineering  
This paper researches on cooperation capture for mobile multi-robots. We use finite state machine principle to do research on cooperation capture for mobile multi-robots.  ...  Meanwhile this paper uses virtual reality technology to simulate the multi-robot operation stalking, namely, produces a realistic external environment and multiple mobile robot system by using computer  ...  By recording the location of reference Follower robot predicts the intruder movement.  ... 
doi:10.1016/j.proeng.2012.01.521 fatcat:immbpdwrazgf5jugyzio77uvhy

Cleaning an Arbitrary Regular Network with Mobile Agents [chapter]

Paola Flocchini, Amiya Nayak, Arno Schulz
2005 Lecture Notes in Computer Science  
In this paper, we consider a contaminated network with an intruder.  ...  of improvements in reducing the number of mobile agents used depending on the number of starting location in arbitrary regular graphs.  ...  The intruder capture problem consists of deploying a team of collaborative software agents to capture the intruder.  ... 
doi:10.1007/11604655_17 fatcat:rim7l2prczfpneb7z3x3go2ueq

Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network [chapter]

Abdul Razaque, Khaled Elleithy
2012 Communications in Computer and Information Science  
The work is particularly done to restore the privacy of users over MCL but can be implemented with all types of small to large networks.  ...  This innovative security mechanism reinforces the confidence of users, protects network from illicit intervention.  ...  The classification of typical IDS is discussed in [17] . The focus of the contribution is about reviewing the agent-based IDS for mobile devices.  ... 
doi:10.1007/978-3-642-30567-2_17 fatcat:jyovpgjcybdivcrthx2fokojvq

COMBINING AUDIO AND VIDEO SURVEILLANCE WITH A MOBILE ROBOT

EMANUELE MENEGATTI, MANUEL CAVASIN, ENRICO PAGELLO, ENZO MUMOLO, MASSIMILIANO NOLICH
2007 International journal on artificial intelligence tools  
The robot extends the capabilities of the system by adding a mobile sensor (in this work an omnidirectional camera).  ...  The mobile omnidirectional camera can be used to have a closer look of the scene or to inspect portions of the environment not covered by the fix sensory agents.  ...  Acknowledgements The authors wish to thank: the students of the IAS-Lab, especially Nicola Milani, Nicola Brisotto, and Alberto Scarpa, for writing part of the software used in these experiments.  ... 
doi:10.1142/s0218213007003321 fatcat:hlyacpxjprdgfazkb7wh2p4cmm

Adaptivity: A Quality Goal for Agent-Oriented Models?

Leon Sterling
2011 IFAC Proceedings Volumes  
This paper explores the nature of adaptivity in multi-agent systems by exploring how to represent adaptivity in agent-oriented models.  ...  Examples are given from use of automated teller machines at mobile sites and intelligent information agents.  ...  The author would also like to thank various members of the Agent Research groups at the University of Melbourne and Swinburne University of Technology, including Tim Miller and Sonja Pedell.  ... 
doi:10.3182/20110828-6-it-1002.03782 fatcat:d4p67noc6fhczajs2xxx3wm3ne

Cooperative Surveillance and Pursuit Using Unmanned Aerial Vehicles and Unattended Ground Sensors

Jonathan Las Fargeas, Pierre Kabamba, Anouck Girard
2015 Sensors  
The algorithm uses detections from the sensors to predict intruders' locations and selects the vehicles' paths by minimizing a linear combination of missed deadlines and the probability of not intercepting  ...  An analysis of the algorithm's completeness and complexity is then provided. The effectiveness of the heuristic is illustrated through simulations in a variety of scenarios.  ...  The research was supported in part by the United States Air Force grant, FA 8650-07-2-3744.  ... 
doi:10.3390/s150101365 pmid:25591168 pmcid:PMC4327082 fatcat:yvkk4bte7bavdnnzr2mqu2cs5i
« Previous Showing results 1 — 15 out of 11,110 results