65,367 Hits in 9.6 sec

Intelligent agents in support of internet security

Krystian Baniak
2007 Annales UMCS Informatica  
With this paper we try to show that autonomous intelligent agent based systems are able to support or even offload humans in bringing Internet Security to the next level.  ...  The solutions devised by humans are prone to errors, which furthermore entail a new type of security challenge -cyber crime.  ...  The next chapters will present the outline of our research on Intelligent Agents in the support of Internet Security.  ... 
dblp:journals/umcs/Baniak07 fatcat:2ryhavsdgza3bnrrfbhxl3szq4

Multi-agent systems: Selected reading

I&S Monitor
2002 Information & Security An International Journal  
through Coordination in a Society of Agents  Informed Decision Making in Multi-Specialist Cooperation  Machine Learning for Intelligent Support of Conflict Resolution  Negotiation Planning: An AI Approach  ...  .  D'Agents: Security in a multiple-language, mobile-agent system.  A Game-Theoretic Formulation of Multi-Agent Resource Allocation  ... 
doi:10.11610/isij.0807 fatcat:ehdj4jiesfa4bosajcvgw6n2pe

Innovative Applications and Security of Internet of Things

Hung-Yu Chien, YingJiu Li, Nai-Wei Lo
2014 International Journal of Distributed Sensor Networks  
The resultant social-advertising system shows that this framework can support a wide range of different functionalities and is indispensable to an NFC-based intelligent agent for social Internet of things  ...  The study "Framework for NFC-based intelligent agents: a context-awareness enabler for social Internet of things" proposes a framework for developing an NFC-enabled intelligent agent, which combines the  ...  The resultant social-advertising system shows that this framework can support a wide range of different functionalities and is indispensable to an NFC-based intelligent agent for social Internet of things  ... 
doi:10.1155/2014/717898 fatcat:c3qbxqphfbca7ch57awrg6vzeq

Multi-agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology [chapter]

Marco Cremonini, Andrea Omicini, Franco Zambonelli
1999 Lecture Notes in Computer Science  
locality domains, where programmable coordination media are exploited to rule agent interaction and to support intelligent agent exploration.  ...  In particular, the dichotomy between the openness of the execution environment and the need for secure execution models makes governing agents' interaction a really complex matter, especially when mobile  ...  Acknowledgements This work has been carried out under the financial support of the MURST (the Italian "Ministero dell'Università e della Ricerca Scientifica e Tecnologica") in the framework of the Project  ... 
doi:10.1007/3-540-48437-x_7 fatcat:77m6wdk7hnem3fcytbw2lkxsnq


Ashraf Darwish, Cristina Turcu
2018 Journal of the Egyptian Mathematical Society  
The features of the proposed integration are based on the main characteristics of intelligent agents like intelligence, flexibility, proactivity and reactivity, and autonomy which can be employed in IoV  ...  services of Internet of Vehicles (IoV).  ...  Acknowledgement The authors would like to acknowledge the valuable comments and suggestions of reviewers, which have improved the quality of the paper.  ... 
doi:10.21608/joems.2018.2672.1022 fatcat:h55iqcgiuvcvfosyw3vx2tjrbq

Computational Intelligence in Cyber Security

Dipankar Dasgupta
2006 2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety  
The use of these techniques allowed building efficient and robust decision support modules, providing cross-linking solutions to different cyber security applications.  ...  Computational Intelligence techniques have proven to be flexible in decision making in dynamic environment.  ...  One of his current research interests are in Network and Internet security, in particular, applying intelligent agents, genetic algorithms, neural networks, Fuzzy Logic and immune system techniques in  ... 
doi:10.1109/cihsps.2006.313289 fatcat:t5wir63zwbedrdz2o5cmlwy6ei

Intelligent Agent approaches for Internet of Things Challenges: A Review

Hamdy AM Sayedahmed
2018 International Robotics & Automation Journal  
Artificial Intelligence (AI) has many techniques such as Multi-agent system (MAS), Artificial Neural Networks (ANNs), Fuzzy Systems (FS), Genetic Algorithms (GA) these techniques should be considered in  ...  Internet of Things (IoT) is a research field that develops communications and possesses many challenges although it is the development of communications.  ...  Conflict of Interest None.  ... 
doi:10.15406/iratj.2018.04.00092 fatcat:yhigtdm26rd4xk4rcekmfgtorq

Key Technologies of IoT Service Security and Privacy Protection

Dongxian Yu, Jiatao Kang, Junlei Dong
2021 Converter  
, then lists the key technical problems in Internet of things security and privacy protection.  ...  The core ideas of the Internet of things are perception, control, transmission and intelligence.  ...  For the security of the Internet of Things system itself, it is mainly reflected in the perception layer of the Internet of Things.  ... 
doi:10.17762/converter.158 fatcat:6kjzuhuvi5afhitf5nxdh36s3y

Towards the Internet of Safe and Intelligent Postal+ Things

Massimo Ancona, Viviana Mascardi, Nicoletta Noceti, Francesca Odone, Waqas Ahsen, Antonino Scribellito
2019 Workshop From Objects to Agents  
In this paper we provide our vision of the Internet of Safe and Intelligent Postal + Things, IoSIP + T, highlighting challenges and opportunities.  ...  The IoSP + T can be further enriched and made smarter, more flexible, and intelligent, by adding agents below, inside, and on top of it.  ...  And by exploiting agents, IoSP + T could move towards the IoSIP + T, namely, the "Internet of Safe and Intelligent Postal + Things".  ... 
dblp:conf/woa/AnconaMNOAS19 fatcat:3cfbarh3vzcjxd5lhbbcm5l6xy

An Information Security and Privacy Self Assessment (ISPSA) Tool for Internet Users

2015 Acta Polytechnica Hungarica  
The main goal of this paper is to propose the solution that will raise awareness among Internet users on privacy and information security issues.  ...  Privacy and overall information security are significantly affected by an Internet users' awareness, knowledge and behavior.  ...  The structure of our intelligent agent is shown in Figure 6 .  ... 
doi:10.12700/aph.12.7.2015.7.9 fatcat:4vkslp4leff3dd7fovx3eeiwgu

The research on mobile Ipv6 security features

Feng Xiaorong, Lin Jun, Jia Shizhun
2013 2013 IEEE Symposium on Wireless Technology & Applications (ISWTA)  
By analyzing new features of mobile IPv6, the paper describes potential security threats hidden in protocol implementation, illustrates the principle of new security attacks and put forward corresponding  ...  along with the rapid progress and widely application of mobile network, mobile IPv6 security has become an important issue.  ...  ACKNOWLEDGMENT The work was partially supported by the important and special project "Research on Mobile Intelligent Terminal Security Assessment Technology" sponsored by Ministry of National Science and  ... 
doi:10.1109/iswta.2013.6688753 fatcat:au47i4wbzbhy3m6khm6fwnfsw4

Intelligent Agents and Information Resource Management

Jim Ryan, Charles Snyder
2004 Americas Conference on Information Systems  
For twenty years, the field of artificial intelligence promised success in developing digital assistants, known as intelligent agents, to aid in all types of mundane and repetitive tasks.  ...  This study recaps the advancement of technology in business applications enabling intelligent agent adaptation and describes the methodology available to intelligent agents to perform tasks within environments  ...  The IRM dimension of security in the Internet environment is daunting, but sustainable (Miller, 2000) .  ... 
dblp:conf/amcis/RyanS04 fatcat:7fhieb6xxfalbl374nhrwmo5me

Reviewing Effectiveness of Artificial Intelligence Techniques Against Cyber Security Risks: In Case of It Industry in Saudi Arabia

2020 Advances in Machine Learning & Artificial Intelligence  
Aim: The aim of the researcher was to determine the effectiveness of artificial intelligence techniques against cyber security risks particularly in case of Saudi Arabia Method: Researcher has opted for  ...  Findings: The P-values of all variables were obtained as significant apart from expert system which had no significant relation with artificial intelligence and cyber security.  ...  The next variable was intelligence agents with artificial intelligence and cyber security which obtained P value of 0.000.  ... 
doi:10.33140/amlai.01.01.05 fatcat:m3fg4s26ajbtra5dleeq5kixli

Unplanned effects of intelligent agents on Internet use: a social informatics approach

Alexander Serenko, Umar Ruhi, Mihail Cocosila
2006 AI & Society: The Journal of Human-Centred Systems and Machine Intelligence  
This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet.  ...  These effects of the use of intelligent agents have seldom been predicted and discussed by visionaries, researchers, and practitioners in the field.  ...  These captions are in line with the various applications of intelligent agents on the Internet.  ... 
doi:10.1007/s00146-006-0051-8 fatcat:xoz7xiq3xvcsrhjmejht5harsu

Review of the Main Security Problems with Multi-Agent Systems used in E-commerce Applications

2016 Advances in Distributed Computing and Artificial Intelligence Journal  
Advances in Distributed Computing and Artificial Intelligence Journal ©Ediciones Universidad de Salamanca / cc by-nc-nd 55 KEYWORD ABSTRACT Security problems; Multi-agent systems; E-commerce applications  ...  However, existing methods of development do not cover in depth the issue of security. It is necessary to present and classify the potential security flaws of multi-agent systems.  ...  Acknowledgment The research of Alfonso González-Briones, Pablo Chamoso and Alberto López Barriuso have been cofinanced by the European Social Fund (Operational Programme 2014-2020 for Castilla y León,  ... 
doi:10.14201/adcaij2016535561 fatcat:gtq2m3qddnalxep6lsd67mn7hy
« Previous Showing results 1 — 15 out of 65,367 results