참고문헌
- R. Becker, D. D. Corkill, "Determining Confidence When Integrating Contributions from Multiple Agents" In Sixth International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2007), Honolulu, Hawaii, May 2007
- E. Bierman, E. Cloete, "Classification of Malicious Host Threats in Mobile Agent Computing" In Proceedings of SAICSIT, 2002, pp.141-148
- P.-C. Chen, X. Fan, S. Zhu, J. Yen. "Boosting-based learning agents for experience classification" In Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, pp. 385-388, 2006
- J. Claessens, B. Preneel, J. Vandewalle, "(How) Can Mobile Agents Do Secure Electronic Transactions on Untrusted Hosts? A Survey of the Security Issues and the Current Solutions" In ACM Transactions on Internet Technology, 3(1): 28-48, 2003 https://doi.org/10.1145/643477.643479
- K. Deeter, K. Singh, S. Wilson, L. Filipozzi, S Vuong. "APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System" MATA 2004, LNCS 3284, pp. 244-253, 2004. (c) Springer-Verlag Berlin Heidelberg 2004 https://doi.org/10.1007/b101423
- W. Diffie, M. E. Hellman. "New Directions in Cryptography" In IEEE Transactions on Information Theory, vol. IT-22: 644-654, 1976 https://doi.org/10.1109/TIT.1976.1055638
- O. Esparz, M. Fernandez, M. Soriano, "Protecting mobile agents by using traceability techniques" In IEEE (c) 2003
- Y. Freund. Boosting a weak learning algorithm by majority. In Information and Computation, 121: 256-285, 1995 https://doi.org/10.1006/inco.1995.1136
- M. S. Greenberg, J. C. Byington, T. Holding, D. G. Harper "Mobile Agents and Security" In IEEE Communications Magazine, 1998
- T. Hastie, R. Tibshirani, J. H. Friedman. The Elements of Statistical Learning. Springer, 2001
- K. E. B. Hickman "Secure Socket Library" Netscape Communications Corp., Internet Draft RFC (1995)
- W. Jansen, T. Karygiannis, "NIST Special Publication 800-19 - Mobile Agent Security" National Institute of Standards and Technology, 2000
- JCE Internet Reference Guide. (n.d). Retrieved December 5th 2006, from http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html
- E. Jean, Y. Jiao, A. R. Hurson, T. E. Potok "SAS: A secure aglet server" In Proceedings of Computer Security Conference 2007
- E. Jean, Y. Jiao, A. R. Hurson, T. E. Potok "Boosting-based Distributed Adaptive Security-Monitoring through Agent Collaboration" In Second International Workshop on Agent and Data Mining Interaction ADMI 2007
- Y. Jiao, A. R. Hurson, "Application of mobile agents in mobile data access systems: A prototype" In Journal of Database Management, 15(4): 1-24, 2004
- JSSE Internet Reference Guide. (n.d). Retrieved December 5th 2006, from http://java.sun.com/javase/6/docs/technotes/guides/security/jsse/JSSERefGuide.html
- D. B. Lange, M. Oshima. Programming and deploying Java mobile agents with Aglets. Addison-Wesley, 1998
- A. Patcha, J.-M. Park. "An overview of anomaly detection techniques: Existing solutions and latest technological trends" In Computer Networks: The International Journal of Computer and Telecommunications Networking. Vol. 51, Issue 12 (August 2007) pp. 3448-3470
- R. E. Schapire. The strength of weak learnability. Machine Learning, 5(2):197-227, 1990 https://doi.org/10.1007/BF00116037
- C. F. Tschudin. "Mobile Agent Security" In Intelligent Information Agents: Agent-Based Information Discovery and Management on the Internet, M. Klusch, Ed., Springer-Verlagu, New York, 1999, Chapter 18 pp. 431-446
- I. H. Witten, E. Frank. Data Mining: Practical machine learning tools and techniques 2nd Edition, Morgan Kaufmann, San Francisco, 2005
- Y.-S. Wu, B. Foo, Y. Mei, S. Bagchi. "Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS" In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003) (c) 2003 IEEE
피인용 문헌
- PERCEPOLIS: Pervasive Cyberinfrastructure for Personalized Learning and Instructional Support vol.02, pp.10, 2010, https://doi.org/10.4236/iim.2010.210067