메뉴 건너뛰기




Volumn , Issue , 2007, Pages 516-520

Boosting-based distributed and adaptive security-monitoring through agent collaboration

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE AGENTS; TECHNOLOGY;

EID: 48149094783     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIIATW.2007.4427641     Document Type: Conference Paper
Times cited : (5)

References (10)
  • 2
    • 23944459002 scopus 로고    scopus 로고
    • Classification of Malicious Host Threats in Mobile Agent Computing
    • E. Bierman, E. Cloete, "Classification of Malicious Host Threats in Mobile Agent Computing." In Proceedings of SAICSIT, ,2002. pp.141-148
    • (2002) Proceedings of SAICSIT , pp. 141-148
    • Bierman, E.1    Cloete, E.2
  • 4
    • 1142282727 scopus 로고    scopus 로고
    • (How) Can Mobile Agents Do Secure Electronic Transactions on Untrusted Hosts? A Survey of the Security Issues and the Current Solutions
    • J. Claessens, B. Preneel, J. Vandewalle, "(How) Can Mobile Agents Do Secure Electronic Transactions on Untrusted Hosts? A Survey of the Security Issues and the Current Solutions" In ACM Transactions on Internet Technology, Vol. 3 No. 1, 2003, pp. 28-48
    • (2003) ACM Transactions on Internet Technology , vol.3 , Issue.1 , pp. 28-48
    • Claessens, J.1    Preneel, B.2    Vandewalle, J.3
  • 8
    • 4444352732 scopus 로고    scopus 로고
    • Application of mobile agents in mobile data access systems: A prototype
    • Y. Jiao, A. R. Hurson, "Application of mobile agents in mobile data access systems: A prototype" In Journal of Database Management, 2004, pp. 1-24
    • (2004) Journal of Database Management , pp. 1-24
    • Jiao, Y.1    Hurson, A.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.