A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is
The number of security-breaking attempts originated inside the organizations are increasing steadily. Attacks made in this way, usually done by "authorized" users of the system, cannot be immediately located. As the idea of filtering the traffic at the "entrance door" (by firewalls, for instance) is not completely successful, the use of other technologies should be considered to increase the defense capacity of a site. Therefore, the introduction of mobile agents to provide the computationaldoi:10.1109/pdse.2000.847862 dblp:conf/pdse/BernardesM00 fatcat:7qfepvyd4vg3jozrvwaytr2hxy