1 |
M. S. Greenberg, J. C. Byington, T. Holding, D. G. Harper "Mobile Agents and Security" In IEEE Communications Magazine, 1998
과학기술학회마을
|
2 |
T. Hastie, R. Tibshirani, J. H. Friedman. The Elements of Statistical Learning. Springer, 2001
|
3 |
R. Becker, D. D. Corkill, "Determining Confidence When Integrating Contributions from Multiple Agents" In Sixth International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2007), Honolulu, Hawaii, May 2007
|
4 |
E. Bierman, E. Cloete, "Classification of Malicious Host Threats in Mobile Agent Computing" In Proceedings of SAICSIT, 2002, pp.141-148
|
5 |
P.-C. Chen, X. Fan, S. Zhu, J. Yen. "Boosting-based learning agents for experience classification" In Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, pp. 385-388, 2006
|
6 |
Y.-S. Wu, B. Foo, Y. Mei, S. Bagchi. "Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS" In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003) (c) 2003 IEEE
|
7 |
K. Deeter, K. Singh, S. Wilson, L. Filipozzi, S Vuong. "APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System" MATA 2004, LNCS 3284, pp. 244-253, 2004. (c) Springer-Verlag Berlin Heidelberg 2004
DOI
|
8 |
JSSE Internet Reference Guide. (n.d). Retrieved December 5th 2006, from http://java.sun.com/javase/6/docs/technotes/guides/security/jsse/JSSERefGuide.html
|
9 |
R. E. Schapire. The strength of weak learnability. Machine Learning, 5(2):197-227, 1990
DOI
|
10 |
A. Patcha, J.-M. Park. "An overview of anomaly detection techniques: Existing solutions and latest technological trends" In Computer Networks: The International Journal of Computer and Telecommunications Networking. Vol. 51, Issue 12 (August 2007) pp. 3448-3470
|
11 |
C. F. Tschudin. "Mobile Agent Security" In Intelligent Information Agents: Agent-Based Information Discovery and Management on the Internet, M. Klusch, Ed., Springer-Verlagu, New York, 1999, Chapter 18 pp. 431-446
|
12 |
I. H. Witten, E. Frank. Data Mining: Practical machine learning tools and techniques 2nd Edition, Morgan Kaufmann, San Francisco, 2005
|
13 |
Y. Jiao, A. R. Hurson, "Application of mobile agents in mobile data access systems: A prototype" In Journal of Database Management, 15(4): 1-24, 2004
|
14 |
K. E. B. Hickman "Secure Socket Library" Netscape Communications Corp., Internet Draft RFC (1995)
|
15 |
W. Jansen, T. Karygiannis, "NIST Special Publication 800-19 - Mobile Agent Security" National Institute of Standards and Technology, 2000
|
16 |
JCE Internet Reference Guide. (n.d). Retrieved December 5th 2006, from http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html
|
17 |
E. Jean, Y. Jiao, A. R. Hurson, T. E. Potok "SAS: A secure aglet server" In Proceedings of Computer Security Conference 2007
|
18 |
E. Jean, Y. Jiao, A. R. Hurson, T. E. Potok "Boosting-based Distributed Adaptive Security-Monitoring through Agent Collaboration" In Second International Workshop on Agent and Data Mining Interaction ADMI 2007
|
19 |
D. B. Lange, M. Oshima. Programming and deploying Java mobile agents with Aglets. Addison-Wesley, 1998
|
20 |
J. Claessens, B. Preneel, J. Vandewalle, "(How) Can Mobile Agents Do Secure Electronic Transactions on Untrusted Hosts? A Survey of the Security Issues and the Current Solutions" In ACM Transactions on Internet Technology, 3(1): 28-48, 2003
DOI
|
21 |
W. Diffie, M. E. Hellman. "New Directions in Cryptography" In IEEE Transactions on Information Theory, vol. IT-22: 644-654, 1976
DOI
|
22 |
O. Esparz, M. Fernandez, M. Soriano, "Protecting mobile agents by using traceability techniques" In IEEE (c) 2003
|
23 |
Y. Freund. Boosting a weak learning algorithm by majority. In Information and Computation, 121: 256-285, 1995
DOI
ScienceOn
|