-
10
-
-
84958977084
-
A stochastic model for intrusions. Recent advances in intrusion detection
-
Proceedings. Lecture Notes in Computer Science Springer Verlag
-
Goldman, R.P. 2002. "A Stochastic Model for Intrusions. Recent Advances in Intrusion Detection". Fifth International Symposium. RAID 2002. Proceedings. Lecture Notes in Computer Science, V.2516. Springer Verlag.
-
(2002)
Fifth International Symposium. RAID 2002
, vol.2516
-
-
Goldman, R.P.1
-
12
-
-
84958956850
-
Attacks against computer network: Formal grammar-based framework and simulation tool
-
Proceedings. Lecture Notes in Computer Science Springer Verlag
-
Gorodetski, V. and I. Kotenko. 2002. "Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool". Fifth International Symposium. RAID 2002. Proceedings. Lecture Notes in Computer Science, V.2516. Springer Verlag.
-
(2002)
Fifth International Symposium. RAID 2002
, vol.2516
-
-
Gorodetski, V.1
Kotenko, I.2
-
14
-
-
6344284549
-
Multi-agent information fusion: Methodology, architecture and software tool for learning of object and situation assessment
-
Proceedings. Stockholm, Sweden. June 28 - July 1
-
Gorodetski, V.; O. Karsayev; I. Kotenko, V. Samoilov. 2004. "Multi-Agent Information Fusion: Methodology, Architecture and Software Tool for Learning of Object and Situation Assessment". The 7th International Conference on Information Fusion. Proceedings. Stockholm, Sweden. June 28 - July 1, P.346-353.
-
(2004)
The 7th International Conference on Information Fusion
, pp. 346-353
-
-
Gorodetski, V.1
Karsayev, O.2
Kotenko, I.3
Samoilov, V.4
-
15
-
-
0030263767
-
Collaborative plans for complex group actions
-
Grosz, B. and S. Kraus. 1996. "Collaborative plans for complex group actions". Artificial Intelligence, Vol.86.
-
(1996)
Artificial Intelligence
, vol.86
-
-
Grosz, B.1
Kraus, S.2
-
17
-
-
0029326031
-
Controlling cooperative problem solving in industrial multi-agent systems using joint intentions
-
Jennings, N. 1995. "Controlling cooperative problem solving in industrial multi-agent systems using joint intentions". Artificial Intelligence, No.75.
-
(1995)
Artificial Intelligence
, Issue.75
-
-
Jennings, N.1
-
20
-
-
8344228427
-
Teamwork of hackers-agents: Modeling and simulation of coordinated distributed attacks on computer networks
-
Kotenko, I. 2003. "Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks". Lecture Notes in Artificial Intelligence, Vol.2691.
-
(2003)
Lecture Notes in Artificial Intelligence
, vol.2691
-
-
Kotenko, I.1
-
21
-
-
84856547585
-
Agent-based modeling and simulation of computer network attacks
-
Proceedings. Jean-Pierre Muller, Martina-M. Seidel (Editors). April 28-30. Montpellier. France
-
Kotenko, I. and E. Man'kov. 2003. "Agent-Based Modeling and Simulation of Computer Network Attacks". Fourth International Workshop "Agent-Based Simulation 4 (ABS 4)". Proceedings. Jean-Pierre Muller, Martina-M. Seidel (Editors). April 28-30. Montpellier. France.
-
(2003)
Fourth International Workshop "Agent-based Simulation 4 (ABS 4),"
-
-
Kotenko, I.1
Man'kov, E.2
-
23
-
-
15944389600
-
Foundations for survivable system development: Service traces, intrusion traces, and evaluation models
-
Linger, R.C. and A.P. Moore. 2001. Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models. Report CMU/SEI-2001-TR-029.
-
(2001)
Report CMU/SEI-2001-TR-029
-
-
Linger, R.C.1
Moore, A.P.2
-
25
-
-
84856544257
-
Modeling and simulation activities in support of information assurance
-
Modeling and Simulation Activities
-
Modeling and Simulation Activities. 1997. Modeling and Simulation Activities in Support of Information Assurance. Report IATAC TR-97-002.
-
(1997)
Report IATAC TR-97-002
-
-
-
33
-
-
0034300584
-
Intrusion-detection for incident-response, using a military battlefield-intelligence process
-
Yuill, J.; F. Wu; J. Settle; F. Gong; R. Forno; M. Huang; J. Asbery. 2000. Intrusion-detection for incident-response, using a military battlefield-intelligence process. Computer Networks, 34.
-
(2000)
Computer Networks
, vol.34
-
-
Yuill, J.1
Wu, F.2
Settle, J.3
Gong, F.4
Forno, R.5
Huang, M.6
Asbery, J.7
|