25 Hits in 7.8 sec

Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications

Jose Duarte de Queiroz, Luiz F. Rust da Costa Carmo, Luci Pirmez
1999 International Symposium on Recent Advances in Intrusion Detection  
Here we present a research project to create and deploy an Intrusion Detection System based on Autonomous Mobile Software Agents.  ...  An Intrusion Detection System is an administration/management tool that identifies and reacts to intrusion and unauthorized use attempts.  ...  Micael System works with aid of autonomous, mobile, distributed software agents, so it can protect, with minimal r esource use, the hosts in a network, and in practice the whole of the network.  ... 
dblp:conf/raid/QueirozCP99 fatcat:25lbxod6mbc7tisuvh2npaxnpa

Multiagent Systems for Network Intrusion Detection: A Review [chapter]

Álvaro Herrero, Emilio Corchado
2009 Advances in Intelligent and Soft Computing  
This work focuses the development of network-based IDSs from an architectural point of view, in which multiagent systems are applied for the development of IDSs, presenting an up-to-date revision of the  ...  Thus, IDSs are common elements in modern infrastructures to enforce network policies.  ...  By adding new agents, this system can be easily adapted to an increased problem size.  ... 
doi:10.1007/978-3-642-04091-7_18 dblp:conf/cisis-spain/HerreroC09 fatcat:qo6lklarvvgihkqwz2iqr7iofy

Advanced Methods for Botnet Intrusion Detection Systems [chapter]

Son T., Mohammed S.
2011 Intrusion Detection Systems  
This chapter will cover a concise survey of botnet detection systems as well as provide a novel mobile-agent based method that has been adapted from mobile-agent based intrusion detection systems, for  ...  by researchers; and also focus on a mobile agent based technique to detect infected hosts.  ...  This is because the greater the mobility of an agent, the higher the latency introduced into the system caused by the time required to create it at a new location and to transfer the runtime state of the  ... 
doi:10.5772/15401 fatcat:sba5cb73kfcptkzkh7fqdc5pqu

APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System [chapter]

Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipozzi, Son Vuong
2004 Lecture Notes in Computer Science  
We propose an intrusion detection system architecture which takes advantage of the mobile agent paradigm to implement a system capable of efficient and flexible distribution of analysis and monitoring  ...  Our architecture defines a high-level application specific scripting language to specify the interaction between monitoring agents and analysis agents.  ...  We would like to thank Peter Chau, Os Monkewich and Sergio Gonzalez Valenzuela for fruitful discussions and for reviewing the drafts of the paper.  ... 
doi:10.1007/978-3-540-30178-3_23 fatcat:pebohiy4y5acvfjgqrvzwz7vkq

APHIDS++: Evolution of A Programmable Hybrid Intrusion Detection System [chapter]

Mohammed S. Alam, Abhishek Gupta, Jake Wires, Son Vuong
2005 Lecture Notes in Computer Science  
VoIP (Voice over IP) and generic intrusions; and an XML implementation of our Agent Deployment and Correlation Script (ADCS), which is used to initialize the agent environment, allowing for flexible user  ...  modifications to control the deployment and invocation of mobile agents. iii  ...  Special thanks goes to all those with whom I had the opportunity to interact with over the last couple of years including Christian, Kapil and Ken.  ... 
doi:10.1007/11569510_3 fatcat:wabp3jgoerd6bbi3qiwz5pz4zi

An Intelligent Multi-Agent Based Detection Framework for Classification of Android Malware [chapter]

Mohammed Alam, Son Thanh Vuong
2014 Lecture Notes in Computer Science  
The Android mobile operating system developed by Google is currently the most popular operating system for such smart devices.  ...  In this thesis, we developed a context-aware multi-agent based framework targeted towards protecting Android devices.  ...  The following code snippet shows how our ontology JASOntology is declared in an agent: private Codec slCodec = new SLCodec(); private Ontology jasOntology = JASOntology.getInstance(); protected void  ... 
doi:10.1007/978-3-319-09912-5_19 fatcat:h2452vxonfb5bjva6rfjlusubq

Merging the fields of swarm robotics and new media: Perceiving swarm robotics as new media

Monika O. Ivanova, Micael S. Couceiro, Fernando M. L. Martins
The aim of this paper is to provide evidence that swarm robotic systems can be perceived as new media objects.  ...  Also presented are examples of swarm robotics used in new media installations in order to illustrate the cutting-edge applications of robotics and artificial intelligence achieved through the unity of  ...  ACKNOWLEDGEMENTS This research is financed by a PhD scholarship (SFRH/BD/73382/2010) from the Portuguese Foundation for Science and Technology, the Institute of Systems and Robotics (ISR-Coimbra) and the  ... 
doi:10.14456/mijst.2014.13 fatcat:cvsspuliwvg5xe65yljl5viboi

Organizing and Steering Committees

2005 Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05)  
We would like to express our thanks to all participants. First of all to the authors, whose quality work is the essence of this conference.  ...  Our deep gratitude goes to the Scientific Organisations that kindly agreed to sponsor the Conference, and made it come true.  ...  ACKNOWLEDGMENTS The authors acknowledge the support, by their Pluriannual fundings, of the Institute for Systems and Robotics and the Instituto de Telecomunicações at Instituto Superior Técnico.  ... 
doi:10.1109/policy.2005.20 dblp:conf/policy/X05a fatcat:kkll4rj33zeolpb6tkjnnk3xoa

Your ad here: the cool sell of guerrilla marketing

2013 ChoiceReviews  
understand an emergent media environment where cultural producers like advertisers strategize and experiment with the dissemination of information and the application of persuasion through covert and  ...  By studying the practice of guerrilla marketing -the umbrella term here for an assortment of product placement, outdoor alternative-ambient, word-of-mouth, and consumer-generated approaches -we can better  ...  Decentralized participation in a networked communicative environment shows subjects to be, at once, resources for power and resourceful as autonomous agents; that their "immaterial labor" is mobilized  ... 
doi:10.5860/choice.51-0376 fatcat:ubulvivuavgbdkbt2qvdusoff4

Aphids : a mobile agent-based programmable hybrid intrusion detection and analysis system

Ken Deeter
Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure.  ...  Several baseline performance measurements are accompanied by a theoretical framework to describe the performance implications of using mobile agents for intrusion detection-related tasks.  ...  The Micael system [9] and the MA-IDS system [27] both use mobile agents to aggregate distributed information related to attacks.  ... 
doi:10.14288/1.0051224 fatcat:vc5qhlwwurhcdkn5tn5sylteg4

13th EBSA congress, July 24–28, 2021, Vienna, Austria

2021 European Biophysics Journal  
This obligated constraint has added an additional level of complexity to the local Organizing Committee that we all in EBSA have to heartily acknowledge.  ...  They are making every effort to have an at least partially physically present Congress, where we can start again to meet and restablish the irreplaceable flavor associated with exchanging ideas and collaboration  ...  new generations of cryo-EM scientists.  ... 
doi:10.1007/s00249-021-01558-w pmid:34245338 pmcid:PMC8272448 fatcat:z2svytd4kbamrmvarle4lxwtxm

MAIDS for VoIP : a Mobile Agents-based Intrusion Detection System for Voice over Internet Protocol

Christian Chita
We then leverage the mobile agent-based framework introduced by APHIDS to design an Intrusion Detection System implementing a gradual attack-response procedure, destined to inform and protect the End-Users  ...  While in the traditional voice networks one has to tap into a specific circuit to eavesdrop, in an IP network any equipment connected to the target LAN can identify, store and playback the VoIP packets  ...  The work by Asaka et al stands out by being among the first to leverage the mobility capability of the agent platform.The Micael system [100] constitutes an important step in agent based IDS technology  ... 
doi:10.14288/1.0051579 fatcat:3z5ccs4qafcgtmqxzp5oovatti

Does visual communication get through to its audiences

Tore Kristensen, Gorm Gabrielsen
2013 2013 IEEE Tsinghua International Design Management Symposium  
Acknowledgements: The authors wish to express their gratitude for the financial support received from the Spanish Government (ECO 2011/23027), the research group "Generés" (Government of Aragón) and the  ...  Acknowledgements: All authors contributed equally to this project.  ...  An application to retail chain CRM is presented.  ... 
doi:10.1109/tidms.2013.6981257 fatcat:gvtlla3dbvdj3oargnpi7x2d6e

Intrusion Detection: A Survey [chapter]

Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava
Managing Cyber Threats  
In distributed DoS (DDoS) attack, which is an advanced variation of DoS attack, multiple machines are deployed to attain this goal. DoS and DDoS attacks have posed an increasing threat to  ...  The taxonomy we provide in this survey is more general, and is obtained by examining and combining existing categorizations and taxonomies of host and network attacks published in the intrusion detection  ...  Micael [53] is a distributed IDS that uses autonomous mobile intelligent agents able to make various decisions in the process of intrusion detection (e.g. investigating intrusions and initiating countermeasures  ... 
doi:10.1007/0-387-24230-9_2 fatcat:bevjweagffhevc6xhjx633xtr4

D3.8- Abstract book for 1st Annual Scientific Meeting (ASM) [article]

2021 Zenodo  
Our current research aims to better understand these observations by examining changes in the transcriptome during exposure to these hormones.  ...  It is particularly important to determine how ongoing environmental changes are likely to affect existing currently non-oncogenic viruses harboured within animal and human hosts.  ...  Similar to other exchange information systems in Spain, it is built through a network that connects contact points in the 17 Autonomous Communities and the cities of Ceuta and Melilla with the Ministry  ... 
doi:10.5281/zenodo.4897288 fatcat:b6t7jvr5q5fgrlzouppu6wdiym
« Previous Showing results 1 — 15 out of 25 results