Using internal sensors and embedded detectors for intrusion detection
Journal of Computer Security
A Secure Group Solution for Multi-Agent EC System
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Decentralized Event Correlation for Intrusion Detection
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A Secure Route Structure for Information Gathering Agent
PRIMA '00 Proceedings of the Third Pacific Rim International Workshop on Multi-Agents: Design and Applications of Intelligent Agents
BASIS: A Biological Approach to System Information Security
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
An Intrusion Detection System for Aglets
MA '02 Proceedings of the 6th International Conference on Mobile Agents
ADMIT: anomaly-based data mining for intrusions
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Design and application of hybrid intelligent systems
An artificial immune based intrusion detection model for computer and telecommunication systems
Parallel Computing - Special issue: Parallel and nature-inspired computational paradigms and applications
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 6 - Volume 07
Autonomous Agents and Multi-Agent Systems
Investigating hidden Markov models capabilities in anomaly detection
Proceedings of the 43rd annual Southeast regional conference - Volume 1
Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Improving network security using genetic algorithm approach
Computers and Electrical Engineering
On Some Method for Intrusion Detection Used by the Multi-agent Monitoring System
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
Modeling Agents' Knowledge in Collective Evolutionary Systems
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part I
Collaborative architecture for distributed intrusion detection system
CISDA'09 Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications
Content-based methodology for anomaly detection on the web
AWIC'03 Proceedings of the 1st international Atlantic web intelligence conference on Advances in web intelligence
Adaptive agents applied to intrusion detection
CEEMAS'03 Proceedings of the 3rd Central and Eastern European conference on Multi-agent systems
A multi-agent system for computer network security monitoring
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Hybrid intrusion detection system for wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Building an inter-IDS central analysis platform in the network center of China's central bank
CTS'05 Proceedings of the 2005 international conference on Collaborative technologies and systems
Real-time risk assessment with network sensors and intrusion detection systems
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Topology-based macroscopical response and control technology for network security event
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A cost-optimized detection system location scheme for DDoS attack
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Adversarial organization modeling for network attack/defense
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A multiple agents based intrusion detection system
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Securing agents against malicious host in an intrusion detection system
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Traffic pattern analysis for distributed anomaly detection
PPAM'11 Proceedings of the 9th international conference on Parallel Processing and Applied Mathematics - Volume Part II
Intelligent agent-based intrusion detection system using enhanced multiclass SVM
Computational Intelligence and Neuroscience
Mobile Agent Based Network Defense System in Enterprise Network
International Journal of Handheld Computing Research
A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies
International Journal of Agent Technologies and Systems
Hi-index | 0.00 |