A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
SESSION – PACKET INSPECTOR MOBILE AGENT TO PREVENT ENCRYPTED COOKIES AND HTTP POST HIJACKING IN MANET
2016
Journal of Engineering Science and Technology
Capturing encrypted cookies by the man-in-the-middle can access the secure site and allows the intruder to be an authorized person. ...
Mobile agent is a piece of code that migrates and performs actions in the host and is used to prevent intrusion. ...
The TCM is an effective model to prevent the malicious mobile agent to penetrate into the hosts3. ...
doaj:8d0f8da9bd494a33b77db99b21cf7aa7
fatcat:wyzavik74zgbjp4msdqlcjksmu
Stochastic Strategies for Robotic Surveillance as Stackelberg Games
[article]
2020
arXiv
pre-print
The goal for the mobile robot is to design a stochastic strategy so as to maximize the probability of capturing the intruder. ...
The intruder is assumed to be omniscient: it knows the current location of the mobile agent and can learn the surveillance strategy. ...
goal of capturing potential intruders; see Fig. 1 for an illustration. ...
arXiv:2011.07604v1
fatcat:wgh4tcrvdnfszbkgmldyky5iee
Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework
2012
International Journal of Computer Applications
The mobile agents are used to collect and analyze the data collected from wireless network to identify attacks exploited by the intruders. ...
To address the security issues in the wireless environment an Intrusion Detection System (IDS) is proposed based on the features of the mobile agent. ...
This file is given as an input to the misuse detection agent.
Misuse Detection Agent The misuse detection agent is used to analyze the data captured by the collector agent. ...
doi:10.5120/7848-1084
fatcat:vmrqhw6drvfytgnolqjzdxvd2y
Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings
2009
2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology
Patrolling environments by means of autonomous mobile robots has received an increasing attention in the last few years. ...
The interest of the agent community is mainly in the development of effective patrolling strategies. Approaches based on game theory have been demonstrated to be very effective. ...
We denote by X 0 and Y 0 the payoffs to the patroller and to the intruder, respectively, when the outcome is intruder-capture. ...
doi:10.1109/wi-iat.2009.211
dblp:conf/iat/BasilicoGRCA09
fatcat:uztug24cf5a2folscmrunhwfpm
A Game-Theoretic Approach to Determining Efficient Patrolling Strategies for Mobile Robots
2008
2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
The patrolling agent is considered playing a game against an hostile possible intruder. ...
We consider, differently from most recent approaches presented in literature, patrolling as an extended-form game that can be solved, in an approximated way, by reduction to a sequence of repeated strategic-form ...
The patrolling agent is considered playing a game against an hostile adversary (e.g., a possible intruder). ...
doi:10.1109/wiiat.2008.324
dblp:conf/iat/AmigoniGI08
fatcat:jzmh3b3xsvdgtgacnrf7c7iczm
Layered mode selection logic control for border security
2007
Unattended Ground, Sea, and Air Sensor Technologies and Applications IX
The pattern of motion in the team of robots can be identified, either algorithmically by a computer or by a human monitor of a display. ...
When a robot detects an intruder, it will move away such that it attempts to maintain a constant distance from the intruder and move away from the border (i.e. into its home territory). ...
Implementing a flexible sensor array with a team of mobile robots requires a controller architecture which is capable of handling an unstructured environment, cooperating among multiple agents, and interacting ...
doi:10.1117/12.718713
fatcat:zruimdbayvdvlb2klx67rzunym
Study on Multi-Robot Cooperation Stalking Using Finite State Machine
2012
Procedia Engineering
This paper researches on cooperation capture for mobile multi-robots. We use finite state machine principle to do research on cooperation capture for mobile multi-robots. ...
So multi-robot system has gradually become an important branch of robotics research .In the numerous multi-robot system research direction, multi-robot operation stalking question has been the focus of ...
By recording the location of reference Follower robot predicts the intruder movement. ...
doi:10.1016/j.proeng.2012.01.520
fatcat:dzkwpzt5gvcrhp7bo2odgjezgy
Mobile Agent based System for Listing Fundamental Wi-Fi Peer-to-Peer Network Details
2015
International Journal of Computer Applications
They had the capacity to classify every computer on the network as either intruder or non intruder based on the list of authorized computers supplied by the user. ...
In developing this mobile agent, we used the MaSE agent methodology. The mobile agent was coded, implemented and tested. ...
Most mobile agents are heterogeneous so that they can travel around a heterogeneous network; hence they have all the characteristics of an agent. ...
doi:10.5120/19977-1907
fatcat:fm5kwi23yjgnhmboymnsuuq5aq
Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users over Mobile Collaborative Learning (MCL)
[article]
2012
arXiv
pre-print
The contribution specially provides privacy to users and enhances the security aspects of mobile supported collaborative framework (MSCF) explained in [24].The paper introduces multi-frame signature-cum ...
The major target of contribution is to detect the malicious attacks and blocks the illegal activities of rogue DHCP server. ...
The classification of typical IDS is discussed in [17] . The focus of the contribution is about reviewing the agent-based IDS for mobile devices. ...
arXiv:1210.2030v1
fatcat:65tc6oast5e5lb4gtgifceairq
Research on Multi-Robot Cooperation Capture Based on Virtual Reality Technology
2012
Procedia Engineering
This paper researches on cooperation capture for mobile multi-robots. We use finite state machine principle to do research on cooperation capture for mobile multi-robots. ...
Meanwhile this paper uses virtual reality technology to simulate the multi-robot operation stalking, namely, produces a realistic external environment and multiple mobile robot system by using computer ...
By recording the location of reference Follower robot predicts the intruder movement. ...
doi:10.1016/j.proeng.2012.01.521
fatcat:immbpdwrazgf5jugyzio77uvhy
Cleaning an Arbitrary Regular Network with Mobile Agents
[chapter]
2005
Lecture Notes in Computer Science
In this paper, we consider a contaminated network with an intruder. ...
of improvements in reducing the number of mobile agents used depending on the number of starting location in arbitrary regular graphs. ...
The intruder capture problem consists of deploying a team of collaborative software agents to capture the intruder. ...
doi:10.1007/11604655_17
fatcat:rim7l2prczfpneb7z3x3go2ueq
Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network
[chapter]
2012
Communications in Computer and Information Science
The work is particularly done to restore the privacy of users over MCL but can be implemented with all types of small to large networks. ...
This innovative security mechanism reinforces the confidence of users, protects network from illicit intervention. ...
The classification of typical IDS is discussed in [17] . The focus of the contribution is about reviewing the agent-based IDS for mobile devices. ...
doi:10.1007/978-3-642-30567-2_17
fatcat:jyovpgjcybdivcrthx2fokojvq
COMBINING AUDIO AND VIDEO SURVEILLANCE WITH A MOBILE ROBOT
2007
International journal on artificial intelligence tools
The robot extends the capabilities of the system by adding a mobile sensor (in this work an omnidirectional camera). ...
The mobile omnidirectional camera can be used to have a closer look of the scene or to inspect portions of the environment not covered by the fix sensory agents. ...
Acknowledgements The authors wish to thank: the students of the IAS-Lab, especially Nicola Milani, Nicola Brisotto, and Alberto Scarpa, for writing part of the software used in these experiments. ...
doi:10.1142/s0218213007003321
fatcat:hlyacpxjprdgfazkb7wh2p4cmm
Adaptivity: A Quality Goal for Agent-Oriented Models?
2011
IFAC Proceedings Volumes
This paper explores the nature of adaptivity in multi-agent systems by exploring how to represent adaptivity in agent-oriented models. ...
Examples are given from use of automated teller machines at mobile sites and intelligent information agents. ...
The author would also like to thank various members of the Agent Research groups at the University of Melbourne and Swinburne University of Technology, including Tim Miller and Sonja Pedell. ...
doi:10.3182/20110828-6-it-1002.03782
fatcat:d4p67noc6fhczajs2xxx3wm3ne
Cooperative Surveillance and Pursuit Using Unmanned Aerial Vehicles and Unattended Ground Sensors
2015
Sensors
The algorithm uses detections from the sensors to predict intruders' locations and selects the vehicles' paths by minimizing a linear combination of missed deadlines and the probability of not intercepting ...
An analysis of the algorithm's completeness and complexity is then provided. The effectiveness of the heuristic is illustrated through simulations in a variety of scenarios. ...
The research was supported in part by the United States Air Force grant, FA 8650-07-2-3744. ...
doi:10.3390/s150101365
pmid:25591168
pmcid:PMC4327082
fatcat:yvkk4bte7bavdnnzr2mqu2cs5i
« Previous
Showing results 1 — 15 out of 11,110 results