메뉴 건너뛰기




Volumn , Issue , 2004, Pages 90-99

Detecting malicious groups of agents

Author keywords

[No Author keywords available]

Indexed keywords

COORDINATION GRAPHS; MULTIPLE MALICIOUS AGENTS; NEUTRAL AGENTS; SOFTWARE ROBOTS;

EID: 17644409790     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (40)
  • 7
    • 0027694889 scopus 로고
    • A bayesian model of plan recognition
    • E. Charniak and R. Goldman. A bayesian model of plan recognition. Artificial Intelligence, 64(1):53-79, 1993.
    • (1993) Artificial Intelligence , vol.64 , Issue.1 , pp. 53-79
    • Charniak, E.1    Goldman, R.2
  • 22
  • 23
    • 0030677523 scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • C. Ko, M. Ruschitzka, and K. Levitt. Execution monitoring of security-critical programs in distributed systems: A specification-based approach. In IEEE Symposium on Security and Privacy, pages 175-187, 1987.
    • (1987) IEEE Symposium on Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 24
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • L. Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, pages 558-565, 1978.
    • (1978) Communications of the ACM , pp. 558-565
    • Lamport, L.1
  • 25
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the production-based expert system toolset (p-best)
    • Oakland, California
    • U. Lindqvist and P. Porras. Detecting computer and network misuse through the production-based expert system toolset (p-best). In Proceedings of the 1999 IEEE Symposium on Security: and Privacy, pages 146-161, Oakland, California, 1999.
    • (1999) Proceedings of the 1999 IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.2
  • 26
    • 84860924611 scopus 로고    scopus 로고
    • Information-technology promotion agency, Japan
    • Linux Security Module. Information-technology promotion agency, Japan, http://www.ipa.go.jp/stc/ida/download.html, 2003.
    • (2003) Linux Security Module
  • 34
    • 84860935029 scopus 로고    scopus 로고
    • Restore Exploit. http://www.securiteam.com/exploits/6u0061f0ak.html, 2004.
    • (2004) Restore Exploit
  • 35
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modelling security threats
    • December
    • B. Schneier. Attack trees: Modelling security threats. Dr. Dobb's Journal, December, 1999.
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 36
    • 17644387396 scopus 로고    scopus 로고
    • Honeypot Technologies Inc. Personal communication
    • L. Spitzner. Honeypot Technologies Inc. Personal communication, 2003.
    • (2003)
    • Spitzner, L.1
  • 38
    • 17644384237 scopus 로고
    • Sun security and auditing
    • November
    • Sun Microsystem. Sun Security and Auditing, SunSHIELD Basic Security Module, November 1993.
    • (1993) SunSHIELD Basic Security Module


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.